Skip to content

Commit 45c6a90

Browse files
authored
Merge pull request #51268 from mihai-netvision/netvision_compas_tutorial_improvements
Added Netvision Compas configuration procedure
2 parents 77f2458 + ef9755e commit 45c6a90

File tree

8 files changed

+51
-12
lines changed

8 files changed

+51
-12
lines changed
3.26 KB
Loading
6.05 KB
Loading
21.3 KB
Loading
8.76 KB
Loading
33.9 KB
Loading
26.8 KB
Loading
25.6 KB
Loading

articles/active-directory/saas-apps/netvision-compas-tutorial.md

Lines changed: 51 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To get started, you need the following items:
4141
In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

4343
* Netvision Compas supports **SP and IDP** initiated SSO
44-
* Once you configure Netvision Compas you can enforce Session Control, which protects exfiltration and infiltration of your organizations sensitive data in real time. Session Control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
44+
* Once you configure Netvision Compas you can enforce Session Control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session Control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-aad)
4545

4646

4747
## Adding Netvision Compas from the gallery
@@ -92,16 +92,14 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9292
In the **Sign-on URL** text box, type a URL using the following pattern:
9393
`https://<TENANT>.compas.cloud/Identity/Auth/AssertionConsumerService`
9494

95-
> [!NOTE]
96-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Netvision Compas Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
95+
> [!NOTE]
96+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Netvision Compas Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9797
98-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
98+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the metadata file and save it on your computer.
9999

100-
![The Certificate download link](common/certificatebase64.png)
100+
![The Certificate download link](common/metadataxml.png)
101101

102-
1. On the **Set up Netvision Compas** section, copy the appropriate URL(s) based on your requirement.
103102

104-
![Copy configuration URLs](common/copy-configuration-urls.png)
105103

106104
### Create an Azure AD test user
107105

@@ -127,26 +125,67 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
127125

128126
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
129127

130-
![The Add User link](common/add-assign-user.png)
128+
![The Add User link](common/add-assign-user.png)
131129

132130
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
133131
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
134132
1. In the **Add Assignment** dialog, click the **Assign** button.
135133

136134
## Configure Netvision Compas SSO
137135

138-
To configure single sign-on on **Netvision Compas** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Netvision Compas support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
136+
In this section you enable SAML SSO in **Netvision Compas**.
137+
1. Log into **Netvision Compas** using an administrative account and access the administration area.
139138

140-
### Create Netvision Compas test user
139+
![Admin area](media/netvision-compas-tutorial/admin.png)
141140

142-
In this section, you create a user called B.Simon in Netvision Compas. Work with [Netvision Compas support team](mailto:[email protected]) to add the users in the Netvision Compas platform. Users must be created and activated before you use single sign-on.
141+
1. Locate the **System** area and select **Identity Providers**.
142+
143+
![Admin IDPs](media/netvision-compas-tutorial/admin-idps.png)
144+
145+
1. Select the **Add** action to register Azure AD as a new IDP.
146+
147+
![Add IDP](media/netvision-compas-tutorial/idps-add.png)
148+
149+
1. Select **SAML** for the **Provider type**.
150+
1. Enter meaningful values for the **Display name** and **Description** fields.
151+
1. Assign **Netvision Compas** users to the IDP by selecting from the **Available users** list and then selecting the **Add selected** button. Users can also be assigned to the IDP while following the provisioning procedure.
152+
1. For the **Metadata** SAML option click the **Choose File** button and select the metadata file previously saved on your computer.
153+
1. Click **Save**.
154+
155+
![Edit IDP](media/netvision-compas-tutorial/idp-edit.png)
156+
157+
158+
### Configure Netvision Compas test user
159+
160+
In this section, you configure an existing user in **Netvision Compas** to use Azure AD for SSO.
161+
1. Follow the **Netvision Compas** user provisioning procedure, as defined by your company or edit an existing user account.
162+
1. While defining the user's profile, make sure that the user's **Email (Personal)** address matches the Azure AD username: [email protected]. For example, `[email protected]`.
163+
164+
![Edit user](media/netvision-compas-tutorial/user-config.png)
165+
166+
Users must be created and activated before you use single sign-on.
143167

144168
## Test SSO
145169

146-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
170+
In this section, you test your Azure AD single sign-on configuration.
171+
172+
### Using the Access Panel (IDP initiated).
147173

148174
When you click the Netvision Compas tile in the Access Panel, you should be automatically signed in to the Netvision Compas for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
149175

176+
### Directly accessing Netvision Compas (SP initiated).
177+
178+
1. Access the **Netvision Compas** URL. For example, `https://tenant.compas.cloud`.
179+
1. Enter the **Netvision Compas** username and select **Next**.
180+
181+
![Login user](media/netvision-compas-tutorial/login-user.png)
182+
183+
1. **(optional)** If the user is assigned multiple IDPs within **Netvision Compas**, a list of available IDPs is presented. Select the Azure AD IDP configured previously in **Netvision Compas**.
184+
185+
![Login choose](media/netvision-compas-tutorial/login-choose.png)
186+
187+
1. You are redirected to Azure AD to perform the authentication. Once you are successfully authenticated, you should be automatically signed in to **Netvision Compas** for which you set up SSO.
188+
150189
## Additional resources
151190

152191
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)

0 commit comments

Comments
 (0)