Skip to content

Commit 520f2ce

Browse files
Merge pull request #234041 from bhavana-129/updates-for-Qradar-and-Beable
Updating Qradar Soar and Beable tutorials
2 parents 52a05e8 + bfaa7a0 commit 520f2ce

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

articles/active-directory/saas-apps/beable-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/09/2023
12+
ms.date: 04/11/2023
1313
ms.author: jeedes
1414

1515
---
@@ -22,7 +22,7 @@ In this article, you learn how to integrate Beable with Azure Active Directory (
2222
* Enable your users to be automatically signed-in to Beable with their Azure AD accounts.
2323
* Manage your accounts in one central location - the Azure portal.
2424

25-
You'll configure and test Azure AD single sign-on for Beable in a test environment. Beable supports **IDP** initiated single sign-on.
25+
You configure and test Azure AD single sign-on for Beable in a test environment. Beable supports **IDP** initiated single sign-on.
2626

2727
## Prerequisites
2828

@@ -63,7 +63,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6363
`https://<SUBDOMAIN>.beable.com`
6464

6565
b. In the **Reply URL** textbox, type a URL using the following pattern:
66-
`https://prod-literacy-backend-alb-12049610218161332941.beable.com/login/ssoVerification/?providerId=1466658d-11ae-11ed-b1a0-b9e58c7ef6cc&identifier=<DOMAIN>`
66+
`https://prod-literacy-backend-alb-<ID>.beable.com/login/ssoVerification/?providerId=<ProviderID>&identifier=<DOMAIN>`
6767

6868
> [!Note]
6969
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Beable support team](https://beable.com/contact/) to get these values. You can also refer to the patterns shown in the Basic SAML Configuration section in the Azure portal.

articles/active-directory/saas-apps/qradar-soar-tutorial.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,20 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/14/2022
12+
ms.date: 04/11/2023
1313
ms.author: jeedes
1414

1515
---
1616

1717
# Azure Active Directory SSO integration with QRadar SOAR
1818

19-
In this article, you'll learn how to integrate QRadar SOAR with Azure Active Directory (Azure AD). QRadar SOAR enhances the analyst experience through accelerated incident response with simple automation, process standardization, and integration with your existing security tools. When you integrate QRadar SOAR with Azure AD, you can:
19+
In this article, you learn how to integrate QRadar SOAR with Azure Active Directory (Azure AD). QRadar SOAR enhances the analyst experience through accelerated incident response with simple automation, process standardization, and integration with your existing security tools. When you integrate QRadar SOAR with Azure AD, you can:
2020

2121
* Control in Azure AD who has access to QRadar SOAR.
2222
* Enable your users to be automatically signed-in to QRadar SOAR with their Azure AD accounts.
2323
* Manage your accounts in one central location - the Azure portal.
2424

25-
You'll configure and test Azure AD single sign-on for QRadar SOAR in a test environment. QRadar SOAR supports both **SP** and **IDP** initiated single sign-on.
25+
You configure and test Azure AD single sign-on for QRadar SOAR in a test environment. QRadar SOAR supports both **SP** and **IDP** initiated single sign-on.
2626

2727
## Prerequisites
2828

@@ -63,24 +63,24 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6363

6464
| **Identifier** |
6565
|-------|
66-
| `https://<UPS>.domain.extension/<ID>` |
67-
| `https://<SOAR>.domain.extension` |
66+
| `https://<CustomerName>.domain.extension/<ID>` |
67+
| `https://<CustomerName>.domain.extension` |
6868

6969
b. In the **Reply URL** textbox, type a URL using one of the following patterns:
7070

7171
| **Reply URL** |
7272
|-------|
73-
| `https://<UPS>.domain.extension/<ID>` |
74-
| `https://<SOAR>.domain.extension` |
73+
| `https://<CustomerName>.domain.extension/<ID>` |
74+
| `https://<CustomerName>.domain.extension` |
7575

7676
1. If you want to configure **SP** initiated SSO, then perform the following step:
7777

7878
In the **Sign on URL** textbox, type a URL using one of the following patterns:
7979

8080
| **Sign on URL** |
8181
|-------|
82-
| `https://<UPS>.domain.extension/<ID>` |
83-
| `https://<SOAR>.domain.extension` |
82+
| `https://<CustomerName>.domain.extension/<ID>` |
83+
| `https://<CustomerName>.domain.extension` |
8484

8585
> [!Note]
8686
> These values are not the real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [QRadar SOAR Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.

0 commit comments

Comments
 (0)