You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/timelive-tutorial.md
+26-26Lines changed: 26 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
---
1
+
---
2
2
title: 'Tutorial: Azure Active Directory integration with TimeLive | Microsoft Docs'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and TimeLive.
4
4
services: active-directory
@@ -50,7 +50,7 @@ In this tutorial, you test Azure AD single sign-on in a test environment.
50
50
The scenario outlined in this tutorial consists of two main building blocks:
51
51
52
52
1. Adding TimeLive from the gallery
53
-
2. Configuring and testing Azure AD single sign-on
53
+
1. Configuring and testing Azure AD single sign-on
54
54
55
55
## Adding TimeLive from the gallery
56
56
To configure the integration of TimeLive into Azure AD, you need to add TimeLive from the gallery to your list of managed SaaS apps.
@@ -61,15 +61,15 @@ To configure the integration of TimeLive into Azure AD, you need to add TimeLive
61
61
62
62
![The Azure Active Directory button][1]
63
63
64
-
2. Navigate to **Enterprise applications**. Then go to **All applications**.
64
+
1. Navigate to **Enterprise applications**. Then go to **All applications**.
65
65
66
66
![The Enterprise applications blade][2]
67
67
68
-
3. To add new application, click **New application** button on the top of dialog.
68
+
1. To add new application, click **New application** button on the top of dialog.
69
69
70
70
![The New application button][3]
71
71
72
-
4. In the search box, type **TimeLive**, select **TimeLive** from result panel then click **Add** button to add the application.
72
+
1. In the search box, type **TimeLive**, select **TimeLive** from result panel then click **Add** button to add the application.
73
73
74
74

75
75
@@ -84,10 +84,10 @@ In TimeLive, assign the value of the **user name** in Azure AD as the value of t
84
84
To configure and test Azure AD single sign-on with TimeLive, you need to complete the following building blocks:
85
85
86
86
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
87
-
2.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
88
-
3.**[Create a TimeLive test user](#create-a-timelive-test-user)** - to have a counterpart of Britta Simon in TimeLive that is linked to the Azure AD representation of user.
89
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
90
-
5.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
87
+
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
88
+
1.**[Create a TimeLive test user](#create-a-timelive-test-user)** - to have a counterpart of Britta Simon in TimeLive that is linked to the Azure AD representation of user.
89
+
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
90
+
1.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
91
91
92
92
### Configure Azure AD single sign-on
93
93
@@ -99,11 +99,11 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
99
99
100
100
![Configure single sign-on link][4]
101
101
102
-
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
102
+
1. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
3. On the **TimeLive Domain and URLs** section, perform the following steps:
106
+
1. On the **TimeLive Domain and URLs** section, perform the following steps:
107
107
108
108

109
109
@@ -114,25 +114,25 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
114
114
> [!NOTE]
115
115
> These values are not real. Update these values with the actual Identifier and Sign-On URL. Contact [TimeLive Client support team](mailto:[email protected]) to get these values.
116
116
117
-
4. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.
117
+
1. On the **SAML Signing Certificate** section, click **Certificate(Base64)** and then save the certificate file on your computer.

124
124
125
-
6. On the **TimeLive Configuration** section, click **Configure TimeLive** to open **Configure sign-on** window. Copy the **Sign-Out URL and SAML Single Sign-On Service URL** from the **Quick Reference section.**
125
+
1. On the **TimeLive Configuration** section, click **Configure TimeLive** to open **Configure sign-on** window. Copy the **Sign-Out URL and SAML Single Sign-On Service URL** from the **Quick Reference section.**
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/timeoffmanager-tutorial.md
+28-28Lines changed: 28 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
---
1
+
---
2
2
title: 'Tutorial: Azure Active Directory integration with TimeOffManager | Microsoft Docs'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and TimeOffManager.
4
4
services: active-directory
@@ -50,7 +50,7 @@ In this tutorial, you test Azure AD single sign-on in a test environment.
50
50
The scenario outlined in this tutorial consists of two main building blocks:
51
51
52
52
1. Add TimeOffManager from the gallery
53
-
2. Configure and test Azure AD single sign-on
53
+
1. Configure and test Azure AD single sign-on
54
54
55
55
## Add TimeOffManager from the gallery
56
56
To configure the integration of TimeOffManager into Azure AD, you need to add TimeOffManager from the gallery to your list of managed SaaS apps.
@@ -61,15 +61,15 @@ To configure the integration of TimeOffManager into Azure AD, you need to add Ti
61
61
62
62
![Active Directory][1]
63
63
64
-
2. Navigate to **Enterprise applications**. Then go to **All applications**.
64
+
1. Navigate to **Enterprise applications**. Then go to **All applications**.
65
65
66
66
![Applications][2]
67
67
68
-
3. To add new application, click **New application** button on the top of dialog.
68
+
1. To add new application, click **New application** button on the top of dialog.
69
69
70
70
![Applications][3]
71
71
72
-
4. In the search box, type **TimeOffManager**, select **TimeOffManager** from result panel and then click **Add** button to add the application.
72
+
1. In the search box, type **TimeOffManager**, select **TimeOffManager** from result panel and then click **Add** button to add the application.
73
73
74
74

75
75
@@ -83,10 +83,10 @@ In TimeOffManager, assign the value of the **user name** in Azure AD as the valu
83
83
To configure and test Azure AD single sign-on with TimeOffManager, you need to complete the following building blocks:
84
84
85
85
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
86
-
2.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
87
-
3.**[Create a TimeOffManager test user](#create-a-timeoffmanager-test-user)** - to have a counterpart of Britta Simon in TimeOffManager that is linked to the Azure AD representation of user.
88
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
89
-
5.**[Test Single Sign-On](#test-single-sign-on)** - to verify whether the configuration works.
86
+
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
87
+
1.**[Create a TimeOffManager test user](#create-a-timeoffmanager-test-user)** - to have a counterpart of Britta Simon in TimeOffManager that is linked to the Azure AD representation of user.
88
+
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
89
+
1.**[Test Single Sign-On](#test-single-sign-on)** - to verify whether the configuration works.
90
90
91
91
### Configure Azure AD single sign-on
92
92
@@ -98,11 +98,11 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
98
98
99
99
![Configure Single Sign-On][4]
100
100
101
-
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
101
+
1. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
102
102
103
103

104
104
105
-
3. On the **TimeOffManager Domain and URLs** section, perform the following:
105
+
1. On the **TimeOffManager Domain and URLs** section, perform the following:
106
106
107
107

108
108
@@ -111,11 +111,11 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
111
111
> [!NOTE]
112
112
> This value is not real. Update this value with the actual Reply URL. You can get this value from **Single Sign on settings page** which is explained later in the tutorial or Contact [TimeOffManager support team](https://www.purelyhr.com/contact-us).
113
113
114
-
4. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
114
+
1. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
5. The objective of this section is to outline how to enable users to authenticate to TimeOffManger with their account in Azure AD using federation based on the SAML protocol.
118
+
1. The objective of this section is to outline how to enable users to authenticate to TimeOffManger with their account in Azure AD using federation based on the SAML protocol.
119
119
120
120
Your TimeOffManger application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this.
121
121
@@ -139,20 +139,20 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
139
139
140
140
d. Click **Ok**.
141
141
142
-
6. Click **Save** button.
142
+
1. Click **Save** button.
143
143
144
144

145
145
146
-
7. On the **TimeOffManager Configuration** section, click **Configure TimeOffManager** to open **Configure sign-on** window. Copy the **Sign-Out URL, SAML Entity ID, and SAML Single Sign-On Service URL** from the **Quick Reference section.**
146
+
1. On the **TimeOffManager Configuration** section, click **Configure TimeOffManager** to open **Configure sign-on** window. Copy the **Sign-Out URL, SAML Entity ID, and SAML Single Sign-On Service URL** from the **Quick Reference section.**
@@ -170,7 +170,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
170
170
171
171
g. click **Save Changes**.
172
172
173
-
11. In **Single Sign on settings** page, copy the value of **Assertion Consumer Service URL** and paste it in the **Reply URL** text box under **TimeOffManager Domain and URLs** section in Azure portal.
173
+
1. In **Single Sign on settings** page, copy the value of **Assertion Consumer Service URL** and paste it in the **Reply URL** text box under **TimeOffManager Domain and URLs** section in Azure portal.
0 commit comments