Skip to content

Commit 47d8549

Browse files
authored
Merge pull request #192751 from bhavana-129/intsights-update
Product Backlog Item 1673441: SaaS App Tutorial: IntSights Update
2 parents 8649785 + bebc795 commit 47d8549

File tree

1 file changed

+14
-13
lines changed

1 file changed

+14
-13
lines changed

articles/active-directory/saas-apps/intsights-tutorial.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with IntSights | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with IntSights'
33
description: Learn how to configure single sign-on between Azure Active Directory and IntSights.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/06/2020
12+
ms.date: 03/24/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with IntSights
16+
# Tutorial: Azure AD SSO integration with IntSights
1717

1818
In this tutorial, you'll learn how to integrate IntSights with Azure Active Directory (Azure AD). When you integrate IntSights with Azure AD, you can:
1919

@@ -27,16 +27,18 @@ To get started, you need the following items:
2727

2828
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
2929
* IntSights single sign-on (SSO) enabled subscription.
30+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
31+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3032

3133
## Scenario description
3234

3335
In this tutorial, you configure and test Azure AD SSO in a test environment.
3436

35-
* IntSights supports **SP and IDP** initiated SSO
37+
* IntSights supports **SP and IDP** initiated SSO.
3638

37-
* IntSights supports **Just In Time** user provisioning
39+
* IntSights supports **Just In Time** user provisioning.
3840

39-
## Adding IntSights from the gallery
41+
## Add IntSights from the gallery
4042

4143
To configure the integration of IntSights into Azure AD, you need to add IntSights from the gallery to your list of managed SaaS apps.
4244

@@ -47,7 +49,6 @@ To configure the integration of IntSights into Azure AD, you need to add IntSigh
4749
1. In the **Add from the gallery** section, type **IntSights** in the search box.
4850
1. Select **IntSights** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4951

50-
5152
## Configure and test Azure AD SSO for IntSights
5253

5354
Configure and test Azure AD SSO with IntSights using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in IntSights.
@@ -67,25 +68,25 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6768

6869
1. In the Azure portal, on the **IntSights** application integration page, find the **Manage** section and select **single sign-on**.
6970
1. On the **Select a single sign-on method** page, select **SAML**.
70-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
71+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7172

7273
![Edit Basic SAML Configuration](common/edit-urls.png)
7374

74-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
75+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
7576

7677
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
77-
`https://<SUBDOMAIN>.intsights.com/auth/saml-callback/azure`
78+
`https://<SUBDOMAIN>.ti.insight.rapid7.com/auth/saml-callback/azure`
7879

7980
b. In the **Reply URL** text box, type a URL using the following pattern:
80-
`https://<SUBDOMAIN>.intsights.com/auth/saml-callback/azure`
81+
`https://<SUBDOMAIN>.ti.insight.rapid7.com/auth/saml-callback/azure`
8182

8283
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8384

8485
In the **Sign-on URL** text box, type a URL using the following pattern:
85-
`https://<SUBDOMAIN>.intsights.com/auth/saml-callback/azure`
86+
`https://<SUBDOMAIN>.ti.insight.rapid7.com/auth/saml-callback/azure`
8687

8788
> [!NOTE]
88-
> These values are not real. Update these values with the actual Sign-on URL, Identifier and Reply URL. Contact [IntSights Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [IntSights Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8990

9091
1. IntSights application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9192

0 commit comments

Comments
 (0)