You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/intsights-tutorial.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with IntSights | Microsoft Docs'
2
+
title: 'Tutorial: Azure AD SSO integration with IntSights'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and IntSights.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 11/06/2020
12
+
ms.date: 03/24/2022
13
13
ms.author: jeedes
14
14
---
15
15
16
-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with IntSights
16
+
# Tutorial: Azure AD SSO integration with IntSights
17
17
18
18
In this tutorial, you'll learn how to integrate IntSights with Azure Active Directory (Azure AD). When you integrate IntSights with Azure AD, you can:
19
19
@@ -27,16 +27,18 @@ To get started, you need the following items:
27
27
28
28
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
29
29
* IntSights single sign-on (SSO) enabled subscription.
30
+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
31
+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
30
32
31
33
## Scenario description
32
34
33
35
In this tutorial, you configure and test Azure AD SSO in a test environment.
34
36
35
-
* IntSights supports **SP and IDP** initiated SSO
37
+
* IntSights supports **SP and IDP** initiated SSO.
36
38
37
-
* IntSights supports **Just In Time** user provisioning
39
+
* IntSights supports **Just In Time** user provisioning.
38
40
39
-
## Adding IntSights from the gallery
41
+
## Add IntSights from the gallery
40
42
41
43
To configure the integration of IntSights into Azure AD, you need to add IntSights from the gallery to your list of managed SaaS apps.
42
44
@@ -47,7 +49,6 @@ To configure the integration of IntSights into Azure AD, you need to add IntSigh
47
49
1. In the **Add from the gallery** section, type **IntSights** in the search box.
48
50
1. Select **IntSights** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
49
51
50
-
51
52
## Configure and test Azure AD SSO for IntSights
52
53
53
54
Configure and test Azure AD SSO with IntSights using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in IntSights.
@@ -67,25 +68,25 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
67
68
68
69
1. In the Azure portal, on the **IntSights** application integration page, find the **Manage** section and select **single sign-on**.
69
70
1. On the **Select a single sign-on method** page, select **SAML**.
70
-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
71
+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
75
+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
75
76
76
77
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
> These values are not real. Update these values with the actual Sign-on URL, Identifier and Reply URL. Contact [IntSights Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [IntSights Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89
90
90
91
1. IntSights application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
0 commit comments