Skip to content

Commit 59abffa

Browse files
committed
Product Backlog Item 2455355: SaaS App Tutorial: Infinite Campus Update
1 parent 1026929 commit 59abffa

File tree

1 file changed

+31
-29
lines changed

1 file changed

+31
-29
lines changed

articles/active-directory/saas-apps/infinitecampus-tutorial.md

Lines changed: 31 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Infinite Campus | Microsoft Docs'
2+
title: 'Tutorial: Azure Active Directory SSO integration with Infinite Campus'
33
description: Learn how to configure single sign-on between Azure Active Directory and Infinite Campus.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 03/07/2023
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Azure Active Directory integration with Infinite Campus
15+
# Tutorial: Azure Active Directory SSO integration with Infinite Campus
1616

17-
In this tutorial, you'll learn how to integrate Infinite Campus with Azure Active Directory (Azure AD). When you integrate Infinite Campus with Azure AD, you can:
17+
In this tutorial, you learn how to integrate Infinite Campus with Azure Active Directory (Azure AD). When you integrate Infinite Campus with Azure AD, you can:
1818

1919
* Control in Azure AD who has access to Infinite Campus.
2020
* Enable your users to be automatically signed-in to Infinite Campus with their Azure AD accounts.
@@ -57,7 +57,6 @@ To configure and test Azure AD SSO with Infinite Campus, perform the following s
5757
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
5858
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
5959
1. **[Configure Infinite Campus SSO](#configure-infinite-campus-sso)** - to configure the single sign-on settings on application side.
60-
1. **[Create Infinite Campus test user](#create-infinite-campus-test-user)** - to have a counterpart of B.Simon in Infinite Campus that is linked to the Azure AD representation of user.
6160
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6261

6362
## Configure Azure AD SSO
@@ -108,43 +107,46 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
108107

109108
## Configure Infinite Campus SSO
110109

111-
1. In a different web browser window, sign in to Infinite Campus as a Security Administrator.
110+
For detailed steps on how to configure SSO within Infinite Campus, [please follow the steps in this document](https://kb.infinitecampus.com/help/sso-service-provider-configuration#SSOServiceProviderConfiguration-EnableandConfigureSAMLSSOFunctionality).
112111

113-
2. On the left side of menu, click **System Administration**.
112+
Once you have completed configuring SSO within Infinite Campus, if you would like users to be signed out their Azure SSO connection when logging out of Infinite Campus, [follow these steps](https://kb.infinitecampus.com/help/sso-service-provider-configuration#SSOServiceProviderConfiguration-AddtheInfiniteCampusLogoutURLtotheMicrosoftAzureSAMLSSOConfiguration).
114113

115-
![The Admin](./media/infinitecampus-tutorial/admin.png)
116-
117-
3. Navigate to **User Security** > **SAML Management** > **SSO Service Provider Configuration**.
118-
119-
![The saml](./media/infinitecampus-tutorial/security.png)
120-
121-
4. On the **SSO Service Provider Configuration** page, perform the following steps:
122-
123-
![The sso](./media/infinitecampus-tutorial/configuration.png)
124-
125-
a. Select **Enable SAML Single Sign On**.
114+
## Test SSO
126115

127-
b. Edit the **Optional Attribute Name** to contain **name**.
116+
In this section, you test your Azure AD single sign-on configuration with following options.
128117

129-
c. On the **Select an option to retrieve Identity Provider (IDP) server data** section, select **Metadata URL**, paste the **App Federation Metadata Url** value, which you have copied from the Azure portal in the box, and then click **Sync**.
118+
* Click on **Test this application** in Azure portal. This will redirect to Infinite Campus Sign-on URL where you can initiate the login flow.
130119

131-
d. After clicking **Sync** the values get auto-populated in **SSO Service Provider Configuration** page. These values can be verified to match the values seen in Step 4 above.
120+
* Go to Infinite Campus Sign-on URL directly and initiate the login flow from there.
132121

133-
e. Click **Save**.
122+
* You can use Microsoft My Apps. When you click the Infinite Campus tile in the My Apps, this will redirect to Infinite Campus Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
134123

135-
### Create Infinite Campus test user
124+
## Configure Azure SSO for Non-Production Infinite Campus Environments (Sandbox, Staging)
136125

137-
Infinite Campus has a demographics centered architecture. Please contact [Infinite Campus support team](mailto:[email protected]) to add the users in the Infinite Campus platform.
126+
If your district has additional Infinite Campus environments, this entire setup process must be repeated for each environment. For example, if your district has an Infinite Campus sandbox site, add the Infinite Campus app from the gallery again and complete the process while referencing the SSO Service Provider Configuration screen within your Infinite Campus sandbox site. If your district also has, for example, an Infinite Campus staging site, you will need to complete this process a third time.
138127

139-
## Test SSO
128+
See Infinite Campus [documentation](https://kb.infinitecampus.com/help/sso-service-provider-configuration#sandbox/staging/non-production-environments) for more information about this process.
140129

141-
In this section, you test your Azure AD single sign-on configuration with following options.
130+
## Replacing an Expiring SAML Certificate
142131

143-
* Click on **Test this application** in Azure portal. This will redirect to Infinite Campus Sign-on URL where you can initiate the login flow.
132+
The SAML certificate of this integration relies on which eventually need to be renewed so users can continue logging into Infinite Campus through single sign-on. For districts with proper Campus Messenger Email Settings established, Infinite Campus will send warning emails as the certificate expiration approaches. (Subject: "Action required: Your certificate is expiring.")
144133

145-
* Go to Infinite Campus Sign-on URL directly and initiate the login flow from there.
134+
These are the steps to take to replace an expiring SAML certificate:
135+
1. Have your district's Microsoft Azure Active Directory admin sign in to the Azure portal.
136+
1. On the left navigation pane, select the Azure Active Directory service.
137+
1. Navigate to Enterprise Applications and select your Infinite Campus application set up previously. (If you have multiple Infinite Campus environments like a sandbox or staging site, you will have multiple Infinite Campus applications set up here. You will need to complete this process in each respective Infinite Campus environment for any with an expiring certificate.)
138+
1. Select Single Sign-On.
139+
1. Navigate to the SAML Certificate and copy the App Federation Metadata URL.
140+
1. Within Infinite Campus, navigate to the SSO Service Provider Configuration tool, select the configuration, and paste the App Federation Metadata URL copied in the previous step into the Metadata URL field.
141+
1. In a separate window, go back to the Azure portal. Under SAML Certificates, in the Token Signing Certificate area, select Edit.
142+
1. Select New Certificate. Modify the expiration date if desired.
143+
1. Select Save. (Leave the Signing Option and Signing Algorithm as-is)
144+
1. Return to the Infinite Campus window and click the Sync button next to the Metadata URL. It will say "IDP Synchronization successful". Select OK and Save.
145+
1. Return to the Azure portal, still on the SAML Signing Certificate edit screen, select the three dots (...) next to the new certificate. Select Make Certificate Active and click Save.
146+
1. Select the three dots next to the old certificate. Select Delete Certificate.
147+
1. Return to Infinite Campus and hit the Sync button next to the Metadata URL again. It will say "IDP Synchronization successful" again. Hit OK and Save again.
146148

147-
* You can use Microsoft My Apps. When you click the Infinite Campus tile in the My Apps, this will redirect to Infinite Campus Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
149+
This completes the process of replacing an expiring certificate. For additional details see Infinite Campus [documentation](https://kb.infinitecampus.com/help/sso-service-provider-configuration#SSOServiceProviderConfiguration-CertificateExpirationWarnings).
148150

149151
## Next steps
150152

0 commit comments

Comments
 (0)