You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/intacct-tutorial.md
+17-15Lines changed: 17 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory integration with Sage Intacct'
2
+
title: 'Tutorial: Azure AD SSO integration with Sage Intacct'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and Sage Intacct.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 01/05/2022
12
+
ms.date: 03/16/2022
13
13
ms.author: jeedes
14
14
---
15
15
16
-
# Tutorial: Integrate Sage Intacct with Azure Active Directory
16
+
# Tutorial: Azure AD SSO integration with Sage Intacct
17
17
18
18
In this tutorial, you'll learn how to integrate Sage Intacct with Azure Active Directory (Azure AD). When you integrate Sage Intacct with Azure AD, you can:
19
19
@@ -34,7 +34,10 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
34
34
35
35
* Sage Intacct supports **IDP** initiated SSO.
36
36
37
-
## Adding Sage Intacct from the gallery
37
+
> [!NOTE]
38
+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
39
+
40
+
## Add Sage Intacct from the gallery
38
41
39
42
To configure the integration of Sage Intacct into Azure AD, you need to add Sage Intacct from the gallery to your list of managed SaaS apps.
40
43
@@ -49,7 +52,7 @@ To configure the integration of Sage Intacct into Azure AD, you need to add Sage
49
52
50
53
Configure and test Azure AD SSO with Sage Intacct using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Sage Intacct.
51
54
52
-
To configure and test Azure AD SSO with Sage Intacct, complete the following steps:
55
+
To configure and test Azure AD SSO with Sage Intacct, perform the following steps:
53
56
54
57
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
55
58
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
@@ -58,7 +61,7 @@ To configure and test Azure AD SSO with Sage Intacct, complete the following ste
58
61
1.**[Set up individual users in Intacct](#set-up-individual-users-in-intacct)** - to have a counterpart of B.Simon in Sage Intacct that is linked to the Azure AD representation of user.
59
62
6.**[Test SSO](#test-sso)** - to verify whether the configuration works.
60
63
61
-
###Configure Azure AD SSO
64
+
## Configure Azure AD SSO
62
65
63
66
Follow these steps to enable Azure AD SSO in the Azure portal.
64
67
@@ -68,17 +71,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
1. The Sage Intacct application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog..
@@ -198,11 +201,10 @@ When SSO is enabled for your company, you can individually require users to use
198
201
199
202
In this section, you test your Azure AD single sign-on configuration with following options.
200
203
201
-
* Click on Test this application in Azure portal and you should be automatically signed in to the Sage Intacct for which you set up the SSO
204
+
* Click on Test this application in Azure portal and you should be automatically signed in to the Sage Intacct for which you set up the SSO.
202
205
203
206
* You can use Microsoft My Apps. When you click the Sage Intacct tile in the My Apps, you should be automatically signed in to the Sage Intacct for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
204
207
205
-
206
208
## Next steps
207
209
208
-
Once you configure Sage Intacct you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
210
+
Once you configure Sage Intacct you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments