Skip to content

Commit 48be040

Browse files
authored
Merge pull request #191874 from bhavana-129/sage-intacct-update
Product Backlog Item 1822306: SaaS App Tutorial: Sage Intacct Update
2 parents 726655a + 9aad0d3 commit 48be040

File tree

1 file changed

+17
-15
lines changed

1 file changed

+17
-15
lines changed

articles/active-directory/saas-apps/intacct-tutorial.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Sage Intacct'
2+
title: 'Tutorial: Azure AD SSO integration with Sage Intacct'
33
description: Learn how to configure single sign-on between Azure Active Directory and Sage Intacct.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 01/05/2022
12+
ms.date: 03/16/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Integrate Sage Intacct with Azure Active Directory
16+
# Tutorial: Azure AD SSO integration with Sage Intacct
1717

1818
In this tutorial, you'll learn how to integrate Sage Intacct with Azure Active Directory (Azure AD). When you integrate Sage Intacct with Azure AD, you can:
1919

@@ -34,7 +34,10 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
3434

3535
* Sage Intacct supports **IDP** initiated SSO.
3636

37-
## Adding Sage Intacct from the gallery
37+
> [!NOTE]
38+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
39+
40+
## Add Sage Intacct from the gallery
3841

3942
To configure the integration of Sage Intacct into Azure AD, you need to add Sage Intacct from the gallery to your list of managed SaaS apps.
4043

@@ -49,7 +52,7 @@ To configure the integration of Sage Intacct into Azure AD, you need to add Sage
4952

5053
Configure and test Azure AD SSO with Sage Intacct using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Sage Intacct.
5154

52-
To configure and test Azure AD SSO with Sage Intacct, complete the following steps:
55+
To configure and test Azure AD SSO with Sage Intacct, perform the following steps:
5356

5457
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5558
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
@@ -58,7 +61,7 @@ To configure and test Azure AD SSO with Sage Intacct, complete the following ste
5861
1. **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)** - to have a counterpart of B.Simon in Sage Intacct that is linked to the Azure AD representation of user.
5962
6. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6063

61-
### Configure Azure AD SSO
64+
## Configure Azure AD SSO
6265

6366
Follow these steps to enable Azure AD SSO in the Azure portal.
6467

@@ -68,17 +71,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6871

6972
![Edit Basic SAML Configuration](common/edit-urls.png)
7073

71-
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
74+
1. On the **Basic SAML Configuration** section, perform the following step:
7275

73-
In the **Reply URL** text box, add the following URLs:
76+
In the **Reply URL** text box, type one of the following URLs:
7477

7578
| Reply URL |
7679
| ------------- |
7780
| `https://www.intacct.com/ia/acct/sso_response.phtml` (Select as the default.) |
78-
| `https://www.p-02.intacct.com/ia/acct/sso_response.phtml` |
79-
| `https://www.p-03.intacct.com/ia/acct/sso_response.phtml` |
80-
| `https://www.p-04.intacct.com/ia/acct/sso_response.phtml` |
81-
| `https://www.p-05.intacct.com/ia/acct/sso_response.phtml` |
81+
| `https://www-p02.intacct.com/ia/acct/sso_response.phtml` |
82+
| `https://www-p03.intacct.com/ia/acct/sso_response.phtml` |
83+
| `https://www-p04.intacct.com/ia/acct/sso_response.phtml` |
84+
| `https://www-p05.intacct.com/ia/acct/sso_response.phtml` |
8285
|
8386

8487
1. The Sage Intacct application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog..
@@ -198,11 +201,10 @@ When SSO is enabled for your company, you can individually require users to use
198201

199202
In this section, you test your Azure AD single sign-on configuration with following options.
200203

201-
* Click on Test this application in Azure portal and you should be automatically signed in to the Sage Intacct for which you set up the SSO
204+
* Click on Test this application in Azure portal and you should be automatically signed in to the Sage Intacct for which you set up the SSO.
202205

203206
* You can use Microsoft My Apps. When you click the Sage Intacct tile in the My Apps, you should be automatically signed in to the Sage Intacct for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
204207

205-
206208
## Next steps
207209

208-
Once you configure Sage Intacct you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
210+
Once you configure Sage Intacct you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)