You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/pluralsight-tutorial.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to configure single sign-on between Azure Active Director
4
4
services: active-directory
5
5
documentationCenter: na
6
6
author: jeevansd
7
-
manager: daveba
7
+
manager: mtillman
8
8
ms.reviewer: barbkess
9
9
10
10
ms.assetid: 4c3f07d2-4e1f-4ea3-9025-c663f1f2b7b4
@@ -13,10 +13,9 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: tutorial
16
-
ms.date: 12/26/2018
16
+
ms.date: 03/01/2019
17
17
ms.author: jeedes
18
18
19
-
ms.collection: M365-identity-device-management
20
19
---
21
20
# Tutorial: Azure Active Directory integration with Pluralsight
22
21
@@ -113,14 +112,13 @@ To configure Azure AD single sign-on with Pluralsight, perform the following ste
113
112
> [!NOTE]
114
113
> These values are not real. Update these values with the actual Sign-On URL and Reply URL. Contact [Pluralsight Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
115
114
116
-
5. Pluralsight application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the **User Attributes** section on application integration page. On the **Set up Single Sign-On with SAML** page, click **Edit** button to open **User Attributes** dialog.
117
-
115
+
5. Pluralsight application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
118
116

119
117
120
118
>[!NOTE]
121
119
>You can also add the **"Unique ID"** attribute with the appropriate value like EmployeeID or something else which suits for your organization. Also note that this is not the required attribute; however, you can add it to identify the unique user.
122
120
123
-
6. In the **User Claims** section on the **User Attributes** dialog, configure SAML token attribute as shown in the image above and perform the following steps:
121
+
6. In addition to above, Pluralsight application expects few more attributes to be passed back in SAML response. In the **User Claims** section on the **User Attributes** dialog, perform the following steps to add SAML token attribute as shown in the below table:
124
122
125
123
| Name | Source Attribute|
126
124
| --------------- | --------- |
@@ -207,7 +205,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
207
205
208
206
### Create Pluralsight test user
209
207
210
-
The objective of this section is to create a user called Britta Simon in Pluralsight. Please work with [Pluralsight Client support team](mailto:[email protected]) to add the users in the Pluralsight account. Users must be created and activated before you use single sign-on.
208
+
In this section, a user called Britta Simon is created in Pluralsight. Pluralsight supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Pluralsight, a new one is created after authentication.
211
209
212
210
### Test single sign-on
213
211
@@ -217,7 +215,7 @@ When you click the Pluralsight tile in the Access Panel, you should be automatic
217
215
218
216
## Additional Resources
219
217
220
-
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
218
+
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
221
219
222
220
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
0 commit comments