Skip to content

Commit 331fc47

Browse files
committed
update
1 parent 97e98b9 commit 331fc47

File tree

1 file changed

+51
-38
lines changed

1 file changed

+51
-38
lines changed

articles/active-directory/saas-apps/iprova-tutorial.md

Lines changed: 51 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,8 @@ ms.service: active-directory
1212
ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
15-
ms.devlang: na
1615
ms.topic: tutorial
17-
ms.date: 08/27/2019
16+
ms.date: 03/12/2020
1817
ms.author: jeedes
1918

2019
ms.collection: M365-identity-device-management
@@ -28,7 +27,7 @@ In this tutorial, you'll learn how to integrate iProva with Azure Active Directo
2827
* Enable your users to be automatically signed-in to iProva with their Azure AD accounts.
2928
* Manage your accounts in one central location - the Azure portal.
3029

31-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
30+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
3231

3332
## Prerequisites
3433

@@ -43,6 +42,8 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4342

4443
* iProva supports **SP** initiated SSO
4544

45+
* Once you configure iProva you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
46+
4647
## Adding iProva from the gallery
4748

4849
To configure the integration of iProva into Azure AD, you need to add iProva from the gallery to your list of managed SaaS apps.
@@ -60,13 +61,13 @@ Configure and test Azure AD SSO with iProva using a test user called **B.Simon**
6061

6162
To configure and test Azure AD SSO with iProva, complete the following building blocks:
6263

63-
1. **[Retrieve configuration information from iProva](#retrieve-configuration-information-from-iprova)** as a preparation for the next steps.
64-
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
65-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
66-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67-
1. **[Configure iProva SSO](#configure-iprova-sso)** - to configure the single sign-on settings on application side.
68-
1. **[Create iProva test user](#create-iprova-test-user)** - to have a counterpart of B.Simon in iProva that is linked to the Azure AD representation of user.
69-
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
64+
1. **[Retrieve configuration information from iProva](#retrieve-configuration-information-from-iprova)** - as a preparation for the next steps.
65+
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
66+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68+
1. **[Create iProva test user](#create-iprova-test-user)** - to have a counterpart of B.Simon in iProva that is linked to the Azure AD representation of user.
69+
1. **[Configure iProva Single Sign-On](#configure-iprova-single-sign-on)** - to configure the Single Sign-On settings on application side.
70+
1. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
7071

7172
## Retrieve configuration information from iProva
7273

@@ -96,19 +97,27 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9697

9798
1. On the **Basic SAML Configuration** section, perform the following steps:
9899

99-
![iProva Domain and URLs single sign-on information](common/sp-identifier-reply.png)
100-
101100
a. Fill the **Sign-on URL** box with the value that's displayed behind the label **Sign-on URL** on the **iProva SAML2 info** page. This page is still open in your other browser tab.
102101

103102
b. Fill the **Identifier** box with the value that's displayed behind the label **EntityID** on the **iProva SAML2 info** page. This page is still open in your other browser tab.
104103

105104
c. Fill the **Reply-URL** box with the value that's displayed behind the label **Reply URL** on the **iProva SAML2 info** page. This page is still open in your other browser tab.
106105

106+
1. iProva application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
107+
108+
![image](common/default-attributes.png)
109+
110+
1. In addition to above, iProva application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
111+
112+
| Name | Source Attribute| Namespace |
113+
| ---------------| -------- | -----|
114+
| `samaccountname` | `user.onpremisessamaccountname`| `http://schemas.xmlsoap.org/ws/2005/05/identity/claims`|
115+
107116
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
108117

109118
![The Certificate download link](common/copy-metadataurl.png)
110119

111-
### Create an Azure AD test user
120+
## Create an Azure AD test user
112121

113122
In this section, you'll create a test user in the Azure portal called B.Simon.
114123

@@ -120,7 +129,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
120129
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
121130
1. Click **Create**.
122131

123-
### Assign the Azure AD test user
132+
## Assign the Azure AD test user
124133

125134
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to iProva.
126135

@@ -138,6 +147,28 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
138147
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
139148
1. In the **Add Assignment** dialog, click the **Assign** button.
140149

150+
## Create iProva test user
151+
152+
1. Sign in to iProva by using the **Administrator** account.
153+
154+
2. Open the **Go to** menu.
155+
156+
3. Select **Application management**.
157+
158+
4. Select **Users** in the **Users and user groups** panel.
159+
160+
5. Select **Add**.
161+
162+
6. In the **Username** box, enter the username of user like `[email protected]`.
163+
164+
7. In the **Full name** box, enter a full name of user like **B.Simon**.
165+
166+
8. Select the **No password (use single sign-on)** option.
167+
168+
9. In the **E-mail address** box, enter the email address of user like `[email protected]`.
169+
170+
10. Scroll down to the end of the page, and select **Finish**.
171+
141172
## Configure iProva SSO
142173

143174
1. Sign in to iProva by using the **Administrator** account.
@@ -180,28 +211,6 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
180211

181212
18. You now return to the **Edit general settings** screen. Scroll down to the bottom of the page, and select **OK** to save your configuration.
182213

183-
### Create iProva test user
184-
185-
1. Sign in to iProva by using the **Administrator** account.
186-
187-
2. Open the **Go to** menu.
188-
189-
3. Select **Application management**.
190-
191-
4. Select **Users** in the **Users and user groups** panel.
192-
193-
5. Select **Add**.
194-
195-
6. In the **Username** box, enter the username of user like `[email protected]`.
196-
197-
7. In the **Full name** box, enter a full name of user like **B.Simon**.
198-
199-
8. Select the **No password (use single sign-on)** option.
200-
201-
9. In the **E-mail address** box, enter the email address of user like `[email protected]`.
202-
203-
10. Scroll down to the end of the page, and select **Finish**.
204-
205214
## Test SSO
206215

207216
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
@@ -212,8 +221,12 @@ When you click the iProva tile in the Access Panel, you should be automatically
212221

213222
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
214223

215-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
224+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
216225

217226
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
218227

219-
- [Try iProva with Azure AD](https://aad.portal.azure.com/)
228+
- [Try iProva with Azure AD](https://aad.portal.azure.com/)
229+
230+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
231+
232+
- [How to protect iProva with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)