Skip to content

Commit 3723e5b

Browse files
authored
Merge pull request #197809 from bhavana-129/travelperk-update
Product Backlog Item 1896449: SaaS App Tutorial: TravelPerk Update
2 parents 490915a + 50b9c84 commit 3723e5b

File tree

1 file changed

+24
-10
lines changed

1 file changed

+24
-10
lines changed

articles/active-directory/saas-apps/travelperk-tutorial.md

Lines changed: 24 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with TravelPerk | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with TravelPerk'
33
description: Learn how to configure single sign-on between Azure Active Directory and TravelPerk.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/02/2021
12+
ms.date: 05/11/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with TravelPerk
17+
# Tutorial: Azure AD SSO integration with TravelPerk
1818

1919
In this tutorial, you'll learn how to integrate TravelPerk with Azure Active Directory (Azure AD). When you integrate TravelPerk with Azure AD, you can:
2020

@@ -28,6 +28,8 @@ To get started, you need the following items:
2828

2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3030
* A TravelPerk account with Premium subscription.
31+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
32+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3133

3234
## Scenario description
3335

@@ -71,7 +73,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7173
1. On the **Select a single sign-on method** page, select **SAML**.
7274
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7375

74-
![Edit Basic SAML Configuration](common/edit-urls.png)
76+
![Screenshot shows to edit Basic S A M L Configuration.](common/edit-urls.png "Basic Configuration")
7577

7678
1. On the **Basic SAML Configuration** section, perform the following steps:
7779

@@ -85,19 +87,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8587
`https://<COMPANY>.travelperk.com/`
8688

8789
> [!NOTE]
88-
> These values are not real. Update these values with the actual Identifier,Reply URL and Sign on URL. The values can be found inside your TravelPerk account: go to **Company Settings** > **Integrations** > **Single Sign On**. For assistance, visit the [TravelPerk helpcenter](https://support.travelperk.com/hc/articles/360052450271-How-can-I-setup-SSO-for-Azure-SAML).
90+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. The values can be found inside your TravelPerk account: go to **Company Settings** > **Integrations** > **Single Sign On**. For assistance, visit the [TravelPerk helpcenter](https://support.travelperk.com/hc/articles/360052450271-How-can-I-setup-SSO-for-Azure-SAML).
8991

9092
1. Your TravelPerk application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. In the default mapping, **emailaddress** is mapped with **user.mail**. However, the TravelPerk application expects **emailaddress** to be mapped with **user.userprincipalname**. For TravelPerk, you must edit the attribute mapping: click the **Edit** icon, and then change the attribute mapping. To edit an attribute, just click the attribute to open edit mode.
9193

92-
![image](common/default-attributes.png)
94+
![Screenshot shows the image of TravelPerk application.](common/default-attributes.png "Attributes")
9395

9496
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9597

96-
![The Certificate download link](common/metadataxml.png)
98+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
9799

98100
1. On the **Set up TravelPerk** section, copy the appropriate URL(s) based on your requirement.
99101

100-
![Copy configuration URLs](common/copy-configuration-urls.png)
102+
![Screenshot shows to copy configuration appropriate U R L.](common/copy-configuration-urls.png "Configuration")
101103

102104
### Create an Azure AD test user
103105

@@ -125,7 +127,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
125127

126128
## Configure TravelPerk SSO
127129

128-
To configure single sign-on on **TravelPerk** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [TravelPerk support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
130+
To configure single sign-on on **TravelPerk** side, you need to set up the integration in the TravelPerk app.
131+
132+
1. Go to https://app.travelperk.com as an Admin user, and under **Account Settings** > **Integrations** open **Single sign-on (SSO)**.
133+
134+
1. Select **SAML** as the option, and click **New Integration** then perform the following steps:
135+
136+
a. In the **IdP entity ID** textbox, paste the **Azure AD Identifier** value which you have copied from the Azure portal.
137+
138+
b. In the **IdP SSO service URL** textbox, paste the **Login URL** value which you have copied from the Azure portal.
139+
140+
c. In the **IdP x509 cert** textbox, paste the **Federation Metadata XML** file (Without the X509Certificate tag) from the Azure portal.
141+
142+
d. Save and proceed with the testing.
129143

130144
### Create TravelPerk test user
131145

@@ -145,4 +159,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
145159

146160
## Next steps
147161

148-
Once you configure TravelPerk you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
162+
Once you configure TravelPerk you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)