Skip to content

Commit 47d10f3

Browse files
committed
Updated
1 parent 3f01df2 commit 47d10f3

File tree

1 file changed

+26
-8
lines changed

1 file changed

+26
-8
lines changed

articles/active-directory/saas-apps/taskize-connect-tutorial.md

Lines changed: 26 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 12/12/2019
17+
ms.date: 12/13/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -83,19 +83,37 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8383

8484
![Edit Basic SAML Configuration](common/edit-urls.png)
8585

86-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
87-
88-
a. In the **Identifier** text box, type a URL:
89-
`connect.taskize.com/entity`
90-
91-
b. In the **Reply URL** text box, type a URL:
92-
`https://connect.taskize.com/Shibboleth.sso/SAML2/POST`
86+
1. On the **Basic SAML Configuration** section the application is pre-configured in **IDP** initiated mode and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
9387

9488
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9589

9690
In the **Sign-on URL** text box, type a URL:
9791
`https://connect.taskize.com/connect/`
9892

93+
1. Taskize Connect application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog.
94+
95+
![image](common/edit-attribute.png)
96+
97+
1. In addition to above, Taskize Connect application expects few more attributes to be passed back in SAML response. In the User Claims section on the User Attributes dialog, perform the following steps to add SAML token attribute as shown in the below table:
98+
99+
| Name | Source Attribute|
100+
| ------------------- | -------------------- |
101+
| urn:oid:0.9.2342.19200300.100.1.3 | user.userprincipalname |
102+
103+
1. Click **Add new claim** to open the **Manage user claims** dialog.
104+
105+
1. In the **Name** textbox, type the attribute name shown for that row.
106+
107+
1. Leave the **Namespace** blank.
108+
109+
1. Select Source as **Attribute**.
110+
111+
1. From the **Source attribute** list, type the attribute value shown for that row.
112+
113+
1. Click **Ok**
114+
115+
1. Click **Save**.
116+
99117
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
100118

101119
![The Certificate download link](common/metadataxml.png)

0 commit comments

Comments
 (0)