Skip to content

Commit 5891498

Browse files
authored
Merge pull request #185552 from bhavana-129/mihcm
Product Backlog Item 1736380: SaaS App Tutorial: MiHCM
2 parents 10d11f0 + 9ca8376 commit 5891498

File tree

2 files changed

+136
-0
lines changed

2 files changed

+136
-0
lines changed
Lines changed: 134 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,134 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with MiHCM'
3+
description: Learn how to configure single sign-on between Azure Active Directory and MiHCM.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 01/20/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with MiHCM
18+
19+
In this tutorial, you'll learn how to integrate MiHCM with Azure Active Directory (Azure AD). When you integrate MiHCM with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to MiHCM.
22+
* Enable your users to be automatically signed-in to MiHCM with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* MiHCM single sign-on (SSO) enabled subscription.
31+
32+
## Scenario description
33+
34+
In this tutorial, you configure and test Azure AD SSO in a test environment.
35+
36+
* MiHCM supports **SP** initiated SSO.
37+
38+
## Add MiHCM from the gallery
39+
40+
To configure the integration of MiHCM into Azure AD, you need to add MiHCM from the gallery to your list of managed SaaS apps.
41+
42+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
43+
1. On the left navigation pane, select the **Azure Active Directory** service.
44+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
45+
1. To add new application, select **New application**.
46+
1. In the **Add from the gallery** section, type **MiHCM** in the search box.
47+
1. Select **MiHCM** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
48+
49+
## Configure and test Azure AD SSO for MiHCM
50+
51+
Configure and test Azure AD SSO with MiHCM using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in MiHCM.
52+
53+
To configure and test Azure AD SSO with MiHCM, perform the following steps:
54+
55+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
56+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
57+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
58+
1. **[Configure MiHCM SSO](#configure-mihcm-sso)** - to configure the single sign-on settings on application side.
59+
1. **[Create MiHCM test user](#create-mihcm-test-user)** - to have a counterpart of B.Simon in MiHCM that is linked to the Azure AD representation of user.
60+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
61+
62+
## Configure Azure AD SSO
63+
64+
Follow these steps to enable Azure AD SSO in the Azure portal.
65+
66+
1. In the Azure portal, on the **MiHCM** application integration page, find the **Manage** section and select **single sign-on**.
67+
1. On the **Select a single sign-on method** page, select **SAML**.
68+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
69+
70+
![Edit Basic SAML Configuration](common/edit-urls.png)
71+
72+
1. On the **Basic SAML Configuration** section, perform the following steps:
73+
74+
a. In the **Identifier** box, type a URL using the following pattern:
75+
`https://<subdomain>.mihcm.com`
76+
77+
b. In the **Reply URL** text box, type a URL using the following pattern:
78+
`https://login.mihcm.com/<subdomain>/Acs`
79+
80+
c. In the **Sign-on URL** text box, type a URL using the following pattern:
81+
`https://<subdomain>.mihcm.com`
82+
83+
> [!NOTE]
84+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [MiHCM Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
85+
86+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
87+
88+
![The Certificate download link](common/copy-metadataurl.png)
89+
90+
### Create an Azure AD test user
91+
92+
In this section, you'll create a test user in the Azure portal called B.Simon.
93+
94+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
95+
1. Select **New user** at the top of the screen.
96+
1. In the **User** properties, follow these steps:
97+
1. In the **Name** field, enter `B.Simon`.
98+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
99+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
100+
1. Click **Create**.
101+
102+
### Assign the Azure AD test user
103+
104+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to MiHCM.
105+
106+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
107+
1. In the applications list, select **MiHCM**.
108+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
109+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
110+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
111+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
112+
1. In the **Add Assignment** dialog, click the **Assign** button.
113+
114+
## Configure MiHCM SSO
115+
116+
To configure single sign-on on **MiHCM** side, you need to send the **App Federation Metadata Url** to [MiHCM support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
117+
118+
### Create MiHCM test user
119+
120+
In this section, you create a user called Britta Simon in MiHCM. Work with [MiHCM support team](mailto:[email protected]) to add the users in the MiHCM platform. Users must be created and activated before you use single sign-on.
121+
122+
## Test SSO
123+
124+
In this section, you test your Azure AD single sign-on configuration with following options.
125+
126+
* Click on **Test this application** in Azure portal. This will redirect to MiHCM Sign-on URL where you can initiate the login flow.
127+
128+
* Go to MiHCM Sign-on URL directly and initiate the login flow from there.
129+
130+
* You can use Microsoft My Apps. When you click the MiHCM tile in the My Apps, this will redirect to MiHCM Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
131+
132+
## Next steps
133+
134+
Once you configure MiHCM you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1342,6 +1342,8 @@
13421342
href: mevisio-tutorial.md
13431343
- name: Michigan Data Hub Single Sign-On
13441344
href: michigan-data-hub-single-sign-on-tutorial.md
1345+
- name: MiHCM
1346+
href: mihcm-tutorial.md
13451347
- name: Mimecast Admin Console
13461348
href: mimecast-admin-console-tutorial.md
13471349
- name: Mimecast Personal Portal

0 commit comments

Comments
 (0)