You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/descartes-tutorial.md
+27-13Lines changed: 27 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 01/09/2023
12
+
ms.date: 01/16/2023
13
13
ms.author: jeedes
14
14
15
15
---
@@ -64,7 +64,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
64
64
65
65
1. If you want to configure **SP** initiated SSO, then perform the following step:
66
66
67
-
In the **Sign on URL** textbox, type the URL:
67
+
In the **Relay State** textbox, type the URL:
68
68
`https://auth.gln.com/Welcome`
69
69
70
70
1. Descartes application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
@@ -81,37 +81,51 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
81
81
| assignedRoles | user.assignedroles |
82
82
| Group | user.groups |
83
83
84
-
1.In the **SAMLSigning Certificate** section, click **Edit** button to open**SAML Signing Certificate**dialog.
84
+
1.On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, click copy button to copy**App Federation Metadata Url**and save it on your computer.
85
85
86
-

86
+

87
87
88
-
1. In the **SAML Signing Certificate** section, copy the **Thumbprint Value** and save it on your computer.
88
+
1. Compose a list of the AAD Groups you want the Descartes Application use for the Role-based configuration. A list of User Roles Descartes application modules can be found at https://www.gln.com/docs/Descartes_Application_User_Roles.pdf. You can find the Azure Active Direction Group GUIDs please download the Groups from your AAD Portal Groups.
89
+
90
+

91
+
92
+
You can load this CSV file in Excel. Please select the groups that you want map to the Descartes application roles by list the id in the first column and associating it with the Descartes Application User Role.
89
93
90
-

91
-
92
94
## Configure Descartes SSO
93
95
94
-
To configure single sign-on on **Descartes** side, you need to send the **Thumbprint Value** and appropriate copied URLs from Azure portal to [Descartes support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
96
+
To configure single sign-on on **Descartes** side, you need to email the following values to the [Descartes support team](mailto:[email protected]). Please use the subject AAD SSO Setup request as the subject.
97
+
98
+
1. The preferred identity domain suffix (often the same as the E-mail domain suffix).
99
+
1. The App Federation Metadata URL.
100
+
1. A list with the AAD Group GUIDs for users entitled to use the Descartes application.
101
+
102
+
Descartes will use the information in the E-mail to have the SAML SSO connection set properly on the application side.
103
+
104
+
An example of such a request below:
105
+
106
+

95
107
96
108
### Create Descartes test user
97
109
98
-
In this section, a user called B.Simon is created in Descartes. Descartes supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in Descartes, a new one is created after authentication.
110
+
In this section, a user called B.Simon is created in Descartes. Descartes supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in Descartes, a new one is commonly created after authentication.
111
+
112
+
Descartes application use domain qualified usernames for your AAD integrated users. The domain qualified usernames consist of the SAML claim subject and will always end with the domain suffix. Descartes recommends to select your companies E-mail domain suffix all users in the domain have in common as the identity domain suffix (example [email protected]).
99
113
100
114
## Test SSO
101
115
102
116
In this section, you test your Azure AD single sign-on configuration with following options.
103
117
104
118
#### SP initiated:
105
119
106
-
* Click on **Test this application** in Azure portal. This will redirect to Descartes Sign-on URL where you can initiate the login flow.
120
+
* Click on **Test this application** in Azure portal. This will redirect to Descartes Sign-on URL where you can initiate the login flow. Alternatively you can use a 'deep link' URL into a specific module of the Descartes application, and you will be redirected to a page to provide your domain qualified username which will lead you to your Azure AD login dialog.
107
121
108
-
* Go to Descartes Sign-on URL directly and initiate the login flow from there.
122
+
* Go to Descartes application direct access URL provided and initiate the login flow by specifying your domain qualified username ([email protected]) in the application login window. This will redirect the user automatically to Azure AD.
109
123
110
124
#### IDP initiated:
111
125
112
-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Descartes for which you set up the SSO.
126
+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Descartes application menu for which you set up the SSO.
113
127
114
-
You can also use Microsoft My Apps to test the application in any mode. When you click the Descartes tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Descartes for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
128
+
*You can also use Microsoft My Apps to test the application in any mode. When you click the Descartes tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Descartes for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
0 commit comments