You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/cloudtamer-io-tutorial.md
+35-29Lines changed: 35 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,6 +61,7 @@ To configure and test Azure AD SSO with cloudtamer.io, perform the following ste
61
61
1.**[Configure cloudtamer.io SSO](#configure-cloudtamerio-sso)** - to configure the single sign-on settings on application side.
62
62
1.**[Create cloudtamer.io test user](#create-cloudtamerio-test-user)** - to have a counterpart of B.Simon in cloudtamer.io that is linked to the Azure AD representation of user.
63
63
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
64
+
1.**[Group assertions](#group-assertions)** - to set group assertions for Azure AD and cloudtamer.io.
64
65
65
66
### Begin cloudtamer.io SSO Configuration
66
67
@@ -175,35 +176,40 @@ In this section, you test your Azure AD single sign-on configuration with follow
175
176
176
177
You can also use Microsoft My Apps to test the application in any mode. When you click the cloudtamer.io tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the cloudtamer.io for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
177
178
178
-
## Group Assertions
179
-
180
-
In order to easily manage cloudtamer.io user permissions using existing Azure Active Directory groups, you can follow the steps below:
181
-
182
-
### Azure Active Directory Configuration
183
-
1. Within Azure Active Directory, navigate to Azure Active Directory > Enterprise Applications.
184
-
2. Select the Enterprise Application for cloudtamer.io from the list.
185
-
3. On the Overview screen that appears, select **Single sign-on** from the menu on the left.
186
-
4. On the Single Sign-On screen, locate the User Attributes & Claims box and select **Edit**.
187
-
5. Select **Add a group claim** from the top. (Note: You can only have one group claim. If this option is disabled, you may already have a group claim defined.)
188
-
6. On the Group Claims screen that appears, make a selection for the groups that should be returned in the claim:
189
-
1. If you will always have every group you intend to use in cloudtamer.io assigned to this Enterprise Application, select **Groups assigned to the application**.
190
-
1. Otherwise, if you want all groups to appear (this can cause a large number of group assertions and may be subject to limits), select **Groups assigned to the application**.
191
-
7. For **Source attribute**, leave Group ID by default.
192
-
8. Place a checkmark in the box labeled **Customize the name of the group claim** and specify the name **memberOf** in the **Name** field.
193
-
9. Select **Save** to complete the configuration with Azure Active Directory.
194
-
195
-
### cloudtamer.io Configuration
196
-
1. Within cloudtamer.io, navigate to Users > Identity Management Systems.
197
-
2. Select the IDMS that you've created for Azure Active Directory.
198
-
3. On the overview screen that appears, select the User Group Associations tab.
199
-
4. For each user group mapping you desire, follow these steps:
200
-
1. Select Add > Add New.
201
-
1. On the dialog that appears:
202
-
1. In the Name field, specify **memberOf**.
203
-
1. In the Regex field, specify the Object Id (from Azure Active Directory) of the group you wish to match.
204
-
1. In the User Group field, select the cloudtamer.io internal group you wish to map to the group in the Regex field.
205
-
1. Place a checkmark in **Update on Login**.
206
-
1. Select **Add** to add the group association.
179
+
## Group assertions
180
+
181
+
To easily manage cloudtamer.io user permissions by using existing Azure Active Directory groups, complete these steps:
182
+
183
+
### Azure Active Directory configuration
184
+
185
+
1. In the Azure portal, go to **Azure Active Directory** > **Enterprise Applications**.
186
+
1. In the list, select the enterprise application for cloudtamer.io.
187
+
1. On **Overview**, in the left menu, select **Single sign-on**.
188
+
1. On **Single Sign-On**, under **User Attributes & Claims**, select **Edit**.
189
+
1. Select **Add a group claim**.
190
+
> [!NOTE]
191
+
> You can have only one group claim. If this option is disabled, you might already have a group claim defined.
192
+
1. On **Group Claims**, select the groups that should be returned in the claim:
193
+
- If you will always have every group you intend to use in cloudtamer.io assigned to this enterprise application, select **Groups assigned to the application**.
194
+
- If you want all groups to appear (this selection can cause a large number of group assertions and might be subject to limits), select **Groups assigned to the application**.
195
+
1. For **Source attribute**, leave the default **Group ID**.
196
+
1. Select the **Customize the name of the group claim** checkbox.
197
+
1. For **Name**, enter **memberOf**.
198
+
1. Select **Save** to complete the configuration with Azure Active Directory.
199
+
200
+
### cloudtamer.io configuration
201
+
202
+
1. In cloudtamer.io, go to **Users** > **Identity Management Systems**.
203
+
1. Select the IDMS that you've created for Azure Active Directory.
204
+
1. On the overview page, select the **User Group Associations** tab.
205
+
1. For each user group mapping that you want, complete these steps:
206
+
1. Select **Add** > **Add New**.
207
+
1. In the dialog that appears:
208
+
1. For **Name**, enter **memberOf**.
209
+
1. For **Regex**, enter the object ID (from Azure Active Directory) of the group you want to match.
210
+
1. For **User Group**, select the cloudtamer.io internal group you want to map to the group in **Regex**.
0 commit comments