You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/travelperk-tutorial.md
+24-10Lines changed: 24 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with TravelPerk | Microsoft Docs'
2
+
title: 'Tutorial: Azure AD SSO integration with TravelPerk'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and TravelPerk.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 09/02/2021
12
+
ms.date: 05/11/2022
13
13
ms.author: jeedes
14
14
15
15
---
16
16
17
-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with TravelPerk
17
+
# Tutorial: Azure AD SSO integration with TravelPerk
18
18
19
19
In this tutorial, you'll learn how to integrate TravelPerk with Azure Active Directory (Azure AD). When you integrate TravelPerk with Azure AD, you can:
20
20
@@ -28,6 +28,8 @@ To get started, you need the following items:
28
28
29
29
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30
30
* A TravelPerk account with Premium subscription.
31
+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
32
+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
31
33
32
34
## Scenario description
33
35
@@ -71,7 +73,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
71
73
1. On the **Select a single sign-on method** page, select **SAML**.
72
74
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.

75
77
76
78
1. On the **Basic SAML Configuration** section, perform the following steps:
77
79
@@ -85,19 +87,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
85
87
`https://<COMPANY>.travelperk.com/`
86
88
87
89
> [!NOTE]
88
-
> These values are not real. Update these values with the actual Identifier,Reply URL and Sign on URL. The values can be found inside your TravelPerk account: go to **Company Settings** > **Integrations** > **Single Sign On**. For assistance, visit the [TravelPerk helpcenter](https://support.travelperk.com/hc/articles/360052450271-How-can-I-setup-SSO-for-Azure-SAML).
90
+
> These values are not real. Update these values with the actual Identifier,Reply URL and Sign on URL. The values can be found inside your TravelPerk account: go to **Company Settings** > **Integrations** > **Single Sign On**. For assistance, visit the [TravelPerk helpcenter](https://support.travelperk.com/hc/articles/360052450271-How-can-I-setup-SSO-for-Azure-SAML).
89
91
90
92
1. Your TravelPerk application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. In the default mapping, **emailaddress** is mapped with **user.mail**. However, the TravelPerk application expects **emailaddress** to be mapped with **user.userprincipalname**. For TravelPerk, you must edit the attribute mapping: click the **Edit** icon, and then change the attribute mapping. To edit an attribute, just click the attribute to open edit mode.
91
93
92
-

94
+

93
95
94
96
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.

101
103
102
104
### Create an Azure AD test user
103
105
@@ -125,7 +127,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
125
127
126
128
## Configure TravelPerk SSO
127
129
128
-
To configure single sign-on on **TravelPerk** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [TravelPerk support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
130
+
To configure single sign-on on **TravelPerk** side, you need to set up the integration in the TravelPerk app.
131
+
132
+
1. Go to https://app.travelperk.com as an Admin user, and under **Account Settings** > **Integrations** open **Single sign-on (SSO)**.
133
+
134
+
1. Select **SAML** as the option, and click **New Integration** then perform the following steps:
135
+
136
+
a. In the **IdP entity ID** textbox, paste the **Azure AD Identifier** value which you have copied from the Azure portal.
137
+
138
+
b. In the **IdP SSO service URL** textbox, paste the **Login URL** value which you have copied from the Azure portal.
139
+
140
+
c. In the **IdP x509 cert** textbox, paste the **Federation Metadata XML** file (Without the X509Certificate tag) from the Azure portal.
141
+
142
+
d. Save and proceed with the testing.
129
143
130
144
### Create TravelPerk test user
131
145
@@ -145,4 +159,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
145
159
146
160
## Next steps
147
161
148
-
Once you configure TravelPerk you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
162
+
Once you configure TravelPerk you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments