Skip to content

Commit 4f482b3

Browse files
committed
update
1 parent 0d3db34 commit 4f482b3

File tree

3 files changed

+21
-27
lines changed

3 files changed

+21
-27
lines changed

articles/active-directory/saas-apps/catchpoint-tutorial.md

Lines changed: 21 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -78,31 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878

7979
![Edit Basic SAML Configuration](common/edit-urls.png)
8080

81-
1. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file** and wish to configure in **IDP** intiated mode, perform the following steps:
82-
83-
a. Click **Upload metadata file**.
84-
85-
![Upload metadata file](common/upload-metadata.png)
86-
87-
b. Click on **folder logo** to select the metadata file and click **Upload**.
88-
89-
![choose metadata file](common/browse-upload-metadata.png)
90-
91-
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
92-
93-
![image](common/idp-intiated.png)
94-
95-
> [!Note]
96-
> If the **Identifier** and **Reply URL** values do not get auto polulated, then fill in the values manually according to your requirement.
97-
98-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
99-
100-
![image](common/metadata-upload-additional-signon.png)
101-
102-
In the **Sign-on URL** text box, type the URL:
103-
`https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx`
104-
105-
1. If you do not have **Service Provider metadata file**, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
81+
1. If you do not have **Service Provider metadata file** and wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
10682

10783
a. In the **Identifier** text box, type the URL:
10884
`https://portal.catchpoint.com/SAML2`
@@ -115,7 +91,20 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
11591
In the **Sign-on URL** text box, type the URL:
11692
`https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx`
11793

118-
1. On the **Setup single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
94+
1. Catchpoint application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
95+
96+
![image](common/default-attributes.png)
97+
98+
1. In addition to above, Catchpoint application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
99+
100+
| Name | Source Attribute|
101+
| ------------ | --------- |
102+
| namespace | user.assignedrole |
103+
104+
> [!NOTE]
105+
> namespace claim needs to be mapped with the account name. This account name should be setup as the roles in Azure AD which will be passed back in SAML response. Please refer this [article](https://docs.microsoft.com/azure/active-directory/develop/active-directory-enterprise-app-role-management) to learn how to setup the roles
106+
107+
1. On the **Setup single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
119108

120109
![The Certificate download link](common/certificatebase64.png)
121110

@@ -165,7 +154,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
165154

166155
![Catchpoint configuration](./media/catchpoint-tutorial/configuration2.png)
167156

168-
1. In the **Namespace** textbox, enter namespace as `azure AD test`.
157+
1. In the **Namespace** textbox, enter a valid namespace value.
169158

170159
1. In the **Identity Provider Issuer** textbox, enter the **Azure AD Identifier** value, which you have copied from the Azure portal.
171160

@@ -187,6 +176,11 @@ In this section, you test your Azure AD single sign-on configuration using the A
187176

188177
When you click the Catchpoint tile in the Access Panel, you should be automatically signed in to the Catchpoint for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
189178

179+
> [!NOTE]
180+
> When you are sign into the Catchpoint application through the login page, after providing **Catchpoint Credentials**, enter the valid **Namespace** value in the **Company Credentials(SSO)** textbox and click **Login**.
181+
182+
![Catchpoint configuration](./media/catchpoint-tutorial/loginimage.png)
183+
190184
## Additional resources
191185

192186
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
-6.72 KB
Loading
15 KB
Loading

0 commit comments

Comments
 (0)