You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Beable support team](https://beable.com/contact/) to get these values. You can also refer to the patterns shown in the Basic SAML Configuration section in the Azure portal.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/qradar-soar-tutorial.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,20 +9,20 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 12/14/2022
12
+
ms.date: 04/11/2023
13
13
ms.author: jeedes
14
14
15
15
---
16
16
17
17
# Azure Active Directory SSO integration with QRadar SOAR
18
18
19
-
In this article, you'll learn how to integrate QRadar SOAR with Azure Active Directory (Azure AD). QRadar SOAR enhances the analyst experience through accelerated incident response with simple automation, process standardization, and integration with your existing security tools. When you integrate QRadar SOAR with Azure AD, you can:
19
+
In this article, you learn how to integrate QRadar SOAR with Azure Active Directory (Azure AD). QRadar SOAR enhances the analyst experience through accelerated incident response with simple automation, process standardization, and integration with your existing security tools. When you integrate QRadar SOAR with Azure AD, you can:
20
20
21
21
* Control in Azure AD who has access to QRadar SOAR.
22
22
* Enable your users to be automatically signed-in to QRadar SOAR with their Azure AD accounts.
23
23
* Manage your accounts in one central location - the Azure portal.
24
24
25
-
You'll configure and test Azure AD single sign-on for QRadar SOAR in a test environment. QRadar SOAR supports both **SP** and **IDP** initiated single sign-on.
25
+
You configure and test Azure AD single sign-on for QRadar SOAR in a test environment. QRadar SOAR supports both **SP** and **IDP** initiated single sign-on.
26
26
27
27
## Prerequisites
28
28
@@ -63,24 +63,24 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
63
63
64
64
|**Identifier**|
65
65
|-------|
66
-
|`https://<UPS>.domain.extension/<ID>`|
67
-
|`https://<SOAR>.domain.extension`|
66
+
|`https://<CustomerName>.domain.extension/<ID>`|
67
+
|`https://<CustomerName>.domain.extension`|
68
68
69
69
b. In the **Reply URL** textbox, type a URL using one of the following patterns:
70
70
71
71
|**Reply URL**|
72
72
|-------|
73
-
|`https://<UPS>.domain.extension/<ID>`|
74
-
|`https://<SOAR>.domain.extension`|
73
+
|`https://<CustomerName>.domain.extension/<ID>`|
74
+
|`https://<CustomerName>.domain.extension`|
75
75
76
76
1. If you want to configure **SP** initiated SSO, then perform the following step:
77
77
78
78
In the **Sign on URL** textbox, type a URL using one of the following patterns:
79
79
80
80
|**Sign on URL**|
81
81
|-------|
82
-
|`https://<UPS>.domain.extension/<ID>`|
83
-
|`https://<SOAR>.domain.extension`|
82
+
|`https://<CustomerName>.domain.extension/<ID>`|
83
+
|`https://<CustomerName>.domain.extension`|
84
84
85
85
> [!Note]
86
86
> These values are not the real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [QRadar SOAR Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
0 commit comments