You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/diffchecker-tutorial.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,7 +75,7 @@ Follow these steps to enable Microsoft Entra SSO in the Microsoft Entra admin ce
75
75
76
76
1. On the **Basic SAML Configuration** section, perform the following steps:
77
77
78
-
a. In the **Identifier** text box, type a URL using the following pattern:
78
+
a. In the **Identifier** text box, type the URL:
79
79
`http://www.diffchecker.com/saml/metadata`
80
80
81
81
b. In the **Reply URL** text box, type a URL using the following pattern:
@@ -133,22 +133,20 @@ In this section, you create a user called B.Simon in Diffchecker. Work with [Di
133
133
134
134
## Test SSO
135
135
136
-
In this section, you test your Azure AD single sign-on configuration with following options.
136
+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
137
137
138
138
#### SP initiated:
139
139
140
-
* Click on **Test this application** in Azure portal. This will redirect to Diffchecker Sign on URL where you can initiate the login flow.
140
+
* Click on **Test this application** in Microsoft Entra admin center. This will redirect to Diffchecker Sign on URL where you can initiate the login flow.
141
141
142
142
* Go to Diffchecker Sign-on URL directly and initiate the login flow from there.
143
143
144
144
#### IDP initiated:
145
145
146
-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Diffchecker for which you set up the SSO.
146
+
* Click on **Test this application** in Microsoft Entra admin center and you should be automatically signed in to the Diffchecker for which you set up the SSO.
147
147
148
148
You can also use Microsoft My Apps to test the application in any mode. When you click the Diffchecker tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Diffchecker for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
149
149
150
-
151
150
## Next Steps
152
151
153
-
Once you configure Diffchecker you can enforce session control, which protects exfiltration and infiltration of your organization�s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
154
-
152
+
Once you configure Diffchecker you can enforce session control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments