Skip to content

Commit 64efd7e

Browse files
authored
Merge pull request #234200 from v-hgampala/citi-program
Product Backlog Item 2520107: SaaS App Tutorial: CITI Program Update
2 parents b87e373 + 7a81bfd commit 64efd7e

File tree

1 file changed

+23
-11
lines changed

1 file changed

+23
-11
lines changed

articles/active-directory/saas-apps/citi-program-tutorial.md

Lines changed: 23 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/26/2023
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414

1515
---
@@ -46,7 +46,7 @@ Add CITI Program from the Azure AD application gallery to configure single sign-
4646

4747
### Create and assign Azure AD test user
4848

49-
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
49+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal.
5050

5151
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
5252

@@ -76,17 +76,24 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
7676

7777
1. CITI Program application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
7878

79-
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Image")
79+
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Default Attributes")
8080

81-
1. In addition to above, CITI Program application expects few more attributes to be passed back in SAML response, which are shown below. These attributes are also pre populated but you can review them as per your requirements.
81+
1. CITI Program application expects urn:oid named attributes to be passed back in the SAML response, which are shown below. These attributes are also pre-populated but you can review them as per your requirements. These are all required.
8282

8383
| Name | Source Attribute|
8484
| ---------------| --------- |
8585
| urn:oid:1.3.6.1.4.1.5923.1.1.1.6 | user.userprincipalname |
86-
| urn:oid:0.9.2342.19200300.100.1.3 | user.userprincipalname |
86+
| urn:oid:0.9.2342.19200300.100.1.3 | user.mail |
8787
| urn:oid:2.5.4.42 | user.givenname |
8888
| urn:oid:2.5.4.4 | user.surname |
8989

90+
1. If you wish to pass additional information in the SAML response, CITI Program can also accept the following optional attributes.
91+
92+
| Name | Source Attribute|
93+
| ---------------| --------- |
94+
| urn:oid:2.16.840.1.113730.3.1.241 | user.displayname |
95+
| urn:oid:2.16.840.1.113730.3.1.3 | user.employeeid |
96+
9097
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
9198

9299
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
@@ -97,11 +104,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
97104

98105
## Configure CITI Program SSO
99106

100-
To configure single sign-on on **CITI Program** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CITI Program support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
101-
102-
### Create CITI Program test user
103-
104-
In this section, a user called B.Simon is created in CITI Program. CITI Program supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in CITI Program, a new one is commonly created after authentication.
107+
To configure single sign-on on **CITI Program** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [CITI Program support team](mailto:[email protected]). This is required to have the SAML SSO connection set properly on both sides.
105108

106109
## Test SSO
107110

@@ -113,10 +116,19 @@ In this section, you test your Azure AD single sign-on configuration with follow
113116

114117
* You can use Microsoft My Apps. When you click the CITI Program tile in the My Apps, this will redirect to CITI Program Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
115118

119+
CITI Program supports just-in-time user provisioning. First time SSO users will be prompted to either:
120+
121+
* Link their existing CITI Program account, in the case that they already have one
122+
![SSOHaveAccount](https://user-images.githubusercontent.com/46728557/228357500-a74489c7-8c5f-4cbe-ad47-9757d3d9fbe6.PNG "Link existing CITI Program account")
123+
124+
* Or Create a new CITI Program account, which is automatically provisioned
125+
![SSONotHaveAccount](https://user-images.githubusercontent.com/46728557/228357503-f4eba4bb-f3fa-43e9-a98a-f0da87074eeb.PNG "Provision new CITI Program account")
126+
116127
## Additional resources
117128

129+
* [CITI Program SSO Technical Information](https://support.citiprogram.org/s/article/single-sign-on-sso-and-shibboleth-technical-specs#EntityInformation)
118130
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
119-
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
131+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md)
120132

121133
## Next steps
122134

0 commit comments

Comments
 (0)