Skip to content

Commit 4be8a91

Browse files
authored
Merge pull request #187824 from bhavana-129/recurly-update
Product Backlog Item 1761007: SaaS App Tutorial: Recurly Update
2 parents ebf2767 + ad7efb2 commit 4be8a91

File tree

7 files changed

+54
-17
lines changed

7 files changed

+54
-17
lines changed
34.6 KB
Loading
8.98 KB
Loading
17.2 KB
Loading
12.3 KB
Loading
-15.3 KB
Loading
8.82 KB
Loading

articles/active-directory/saas-apps/recurly-tutorial.md

Lines changed: 54 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 01/19/2022
12+
ms.date: 02/08/2022
1313
ms.author: jeedes
1414

1515
---
@@ -67,31 +67,34 @@ To configure and test Azure AD SSO with Recurly, perform the following steps:
6767
Follow these steps to enable Azure AD SSO in the Azure portal.
6868

6969
1. In the Azure portal, on the **Recurly** application integration page, find the **Manage** section and select **single sign-on**.
70-
1. On the **Select a single sign-on method** page, select **SAML**.
71-
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
70+
2. On the **Select a single sign-on method** page, select **SAML**.
71+
3. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7272

7373
![Edit Basic SAML Configuration](common/edit-urls.png)
7474

75-
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
75+
4. On the **Basic SAML Configuration** section, the **Identifier** and **Reply URL** values are pre-configured with `https://app.recurly.com` and `https://app.recurly.com/login/sso` respectively. Perform the following step to complete the configuration:
7676

77-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **SP** initiated mode then perform the following steps:
77+
a. In the **Sign-on URL** text box, type the URL:
78+
`https://app.recurly.com/login/sso`
7879

79-
a. In the **Identifier** text box, type the URL:
80-
`https://app.recurly.com`
80+
5. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, click **Edit**, select the `...` next to the thumbprint status, select **PEM certificate download** to download the certificate and save it on your computer.
8181

82-
b. In the **Reply URL** text box, type the URL:
83-
`https://app.recurly.com/login/sso`
82+
![The Certificate download link](common/certificate-base64-download.png)
8483

85-
c. In the **Sign-on URL** text box, type the URL:
86-
`https://app.recurly.com/login/sso`
84+
6. Your Recurly application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration.
85+
The following screenshot shows an example of this. The default value of **Unique User Identifier** is **user.userprincipalname** but Recurly expects this to be mapped with the user's email address. For that you can use **user.mail** attribute from the list or use the appropriate attribute value based on your organization configuration.
86+
87+
![image](common/default-attributes.png)
8788

88-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (PEM)** and select **Download** to download the certificate and save it on your computer.
89+
7. Recurly application expects to enable token encryption in order to make SSO work. To activate token encryption, go to the **Azure Active Directory** > **Enterprise applications** and select **Token encryption**.
8990

90-
![The Certificate download link](common/certificate-base64-download.png)
91+
![Screenshot shows the activation of Token Encryption.](./media/recurly-tutorial/token.png "Token Encryption")
9192

92-
1. Recurly application expects to enable token encryption in order to make SSO work. To activate token encryption, go to the **Azure Active Directory** > **Enterprise applications** and select **Token encryption**. For more information, please refer this [link](../manage-apps/howto-saml-token-encryption.md).
93+
a. Please contact [Recurly Support](mailto:[email protected]) to get a copy of the certificate to import.
9394

94-
![Screenshot shows the activation of Token Encryption.](./media/recurly-tutorial/token.png "Token Encryption")
95+
b. After importing the certificate, select the `...` next to the thumbprint status, click `Activate token encryption certificate`.
96+
97+
c. For more information on configuring token encryption, please refer this [link](../manage-apps/howto-saml-token-encryption.md).
9598

9699
### Create an Azure AD test user
97100

@@ -119,11 +122,45 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
119122

120123
## Configure Recurly SSO
121124

122-
To configure single sign-on on **Recurly** side, you need to send the downloaded **Certificate (PEM)** and appropriate copied URLs from Azure portal to [Recurly support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
125+
Follow these steps to configure single sign-on for your **Recurly** site.
126+
127+
1. Log into your Recurly company site as an administrator.
128+
129+
2. Navigate to **Admin** > **Users**.
130+
131+
![Screenshot shows Navigating to Users menu](./media/recurly-tutorial/menu.png)
132+
133+
3. Click the **Configure Single Sign on** button on the top right.
134+
135+
![Screenshot shows navigating to SSO configuration page](./media/recurly-tutorial/configure-button.png)
136+
137+
4. In the **Single Sign-On** section, select the **Enabled** radio button and perform the following steps in the **Identity Provider** section:
138+
139+
![Screenshot shows complete SSO configuration](./media/recurly-tutorial/configuration.png)
140+
141+
a. In **PROVIDER NAME**, select **Azure**.
142+
143+
b. In the **SAML ISSUER ID** textbox, paste the **Identifier URL** value which you have copied from the Azure portal.
144+
145+
c. In the **LOGIN URL** textbox, paste the **Login URL** value which you have copied from the Azure portal.
146+
147+
d. Open the downloaded Certificate (PEM) from the Azure portal into Notepad and paste the content into the **CERTIFICATE** textbox.
148+
149+
e. Click **Save Changes**.
123150

124151
### Create Recurly test user
125152

126-
In this section, you create a user called Britta Simon in Recurly. Work with [Recurly support team](mailto:[email protected]) to add the users in the Recurly platform. Users must be created and activated before you use single sign-on.
153+
In this section, you will invite a new user to join your site and require them to use SSO to test the configuration.
154+
155+
1. Navigate to **Admin** > **Users**, click **Invite User** and type the email address of the Azure test user that was previously created. Your invitation will default to requiring them to use SSO.
156+
157+
![Screenshot shows Navigating to Invite User page](./media/recurly-tutorial/user-button.png)
158+
159+
![Screenshot shows Invite User page](./media/recurly-tutorial/invite-user.png)
160+
161+
2. The test user will receive an email from Recurly inviting them to join your site.
162+
163+
3. After accepting the invite, the test user will be listed under **Company Users** in your site and will be able to log in using SSO.
127164

128165
## Test SSO
129166

0 commit comments

Comments
 (0)