|
| 1 | +--- |
| 2 | +title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with E-days | Microsoft Docs' |
| 3 | +description: Learn how to configure single sign-on between Azure Active Directory and E-days. |
| 4 | +services: active-directory |
| 5 | +documentationCenter: na |
| 6 | +author: jeevansd |
| 7 | +manager: mtillman |
| 8 | +ms.reviewer: barbkess |
| 9 | + |
| 10 | +ms.assetid: 187d8cce-79d0-44a5-a6a5-465cfd774e76 |
| 11 | +ms.service: active-directory |
| 12 | +ms.subservice: saas-app-tutorial |
| 13 | +ms.workload: identity |
| 14 | +ms.tgt_pltfrm: na |
| 15 | +ms.topic: tutorial |
| 16 | +ms.date: 02/19/2020 |
| 17 | +ms.author: jeedes |
| 18 | + |
| 19 | +ms.collection: M365-identity-device-management |
| 20 | +--- |
| 21 | + |
| 22 | +# Tutorial: Azure Active Directory single sign-on (SSO) integration with E-days |
| 23 | + |
| 24 | +In this tutorial, you'll learn how to integrate E-days with Azure Active Directory (Azure AD). When you integrate E-days with Azure AD, you can: |
| 25 | + |
| 26 | +* Control in Azure AD who has access to E-days. |
| 27 | +* Enable your users to be automatically signed-in to E-days with their Azure AD accounts. |
| 28 | +* Manage your accounts in one central location - the Azure portal. |
| 29 | + |
| 30 | +To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on). |
| 31 | + |
| 32 | +## Prerequisites |
| 33 | + |
| 34 | +To get started, you need the following items: |
| 35 | + |
| 36 | +* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/). |
| 37 | +* E-days single sign-on (SSO) enabled subscription. |
| 38 | + |
| 39 | +## Scenario description |
| 40 | + |
| 41 | +In this tutorial, you configure and test Azure AD SSO in a test environment. |
| 42 | + |
| 43 | +* E-days supports **SP and IDP** initiated SSO |
| 44 | +* Once you configure E-days you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app). |
| 45 | + |
| 46 | + |
| 47 | +## Adding E-days from the gallery |
| 48 | + |
| 49 | +To configure the integration of E-days into Azure AD, you need to add E-days from the gallery to your list of managed SaaS apps. |
| 50 | + |
| 51 | +1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account. |
| 52 | +1. On the left navigation pane, select the **Azure Active Directory** service. |
| 53 | +1. Navigate to **Enterprise Applications** and then select **All Applications**. |
| 54 | +1. To add new application, select **New application**. |
| 55 | +1. In the **Add from the gallery** section, type **E-days** in the search box. |
| 56 | +1. Select **E-days** from results panel and then add the app. Wait a few seconds while the app is added to your tenant. |
| 57 | + |
| 58 | + |
| 59 | +## Configure and test Azure AD single sign-on for E-days |
| 60 | + |
| 61 | +Configure and test Azure AD SSO with E-days using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in E-days. |
| 62 | + |
| 63 | +To configure and test Azure AD SSO with E-days, complete the following building blocks: |
| 64 | + |
| 65 | +1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature. |
| 66 | + * **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon. |
| 67 | + * **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on. |
| 68 | +1. **[Configure E-days SSO](#configure-e-days-sso)** - to configure the single sign-on settings on application side. |
| 69 | + * **[Create E-days test user](#create-e-days-test-user)** - to have a counterpart of B.Simon in E-days that is linked to the Azure AD representation of user. |
| 70 | +1. **[Test SSO](#test-sso)** - to verify whether the configuration works. |
| 71 | + |
| 72 | +## Configure Azure AD SSO |
| 73 | + |
| 74 | +Follow these steps to enable Azure AD SSO in the Azure portal. |
| 75 | + |
| 76 | +1. In the [Azure portal](https://portal.azure.com/), on the **E-days** application integration page, find the **Manage** section and select **single sign-on**. |
| 77 | +1. On the **Select a single sign-on method** page, select **SAML**. |
| 78 | +1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings. |
| 79 | + |
| 80 | +  |
| 81 | + |
| 82 | +1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields: |
| 83 | + |
| 84 | + a. In the **Identifier** text box, type a URL using the following pattern: |
| 85 | + |
| 86 | + `https://<SUBDOMAIN>.e-days.com` |
| 87 | + |
| 88 | + b. In the **Reply URL** text box, type a URL using the following pattern: |
| 89 | + |
| 90 | + `https://<SUBDOMAIN>.e-days.com/SSO/SAML2/SP/AssertionConsumer.aspx` |
| 91 | + |
| 92 | +1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode: |
| 93 | + |
| 94 | + In the **Sign-on URL** text box, type a URL using the following pattern: |
| 95 | + |
| 96 | + `https://<SUBDOMAIN>.e-days.com` |
| 97 | + |
| 98 | + > [!NOTE] |
| 99 | + > These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [E-days Client support team](https://support.e-days.com) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal. |
| 100 | + |
| 101 | +1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer. |
| 102 | + |
| 103 | +  |
| 104 | + |
| 105 | +1. On the **Set up E-days** section, copy the appropriate URL(s) based on your requirement. |
| 106 | + |
| 107 | +  |
| 108 | + |
| 109 | +### Create an Azure AD test user |
| 110 | + |
| 111 | +In this section, you'll create a test user in the Azure portal called B.Simon. |
| 112 | + |
| 113 | +1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**. |
| 114 | +1. Select **New user** at the top of the screen. |
| 115 | +1. In the **User** properties, follow these steps: |
| 116 | + 1. In the **Name** field, enter `B.Simon`. |
| 117 | + 1. In the **User name ** field, enter the [email protected]. For example, `[email protected]`. |
| 118 | + 1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box. |
| 119 | + 1. Click **Create**. |
| 120 | + |
| 121 | +### Assign the Azure AD test user |
| 122 | + |
| 123 | +In this section, you'll enable B.Simon to use Azure single sign-on by granting access to E-days. |
| 124 | + |
| 125 | +1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**. |
| 126 | +1. In the applications list, select **E-days**. |
| 127 | +1. In the app's overview page, find the **Manage** section and select **Users and groups**. |
| 128 | + |
| 129 | +  |
| 130 | + |
| 131 | +1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog. |
| 132 | + |
| 133 | +  |
| 134 | + |
| 135 | +1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen. |
| 136 | +1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen. |
| 137 | +1. In the **Add Assignment** dialog, click the **Assign** button. |
| 138 | + |
| 139 | +## Configure E-days SSO |
| 140 | + |
| 141 | +To configure single sign-on on **E-days** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [E-days support team](https://support.e-days.com). They set this setting to have the SAML SSO connection set properly on both sides. |
| 142 | + |
| 143 | +### Create E-days test user |
| 144 | + |
| 145 | +In this section, you create a user called B.Simon in E-days. Work with [E-days support team](https://support.e-days.com) to add the users in the E-days platform. Users must be created and activated before you use single sign-on. |
| 146 | + |
| 147 | +## Test SSO |
| 148 | + |
| 149 | +In this section, you test your Azure AD single sign-on configuration using the Access Panel. |
| 150 | + |
| 151 | +When you click the E-days tile in the Access Panel, you should be automatically signed in to the E-days for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction). |
| 152 | + |
| 153 | +## Additional resources |
| 154 | + |
| 155 | +- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list) |
| 156 | + |
| 157 | +- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis) |
| 158 | + |
| 159 | +- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview) |
| 160 | + |
| 161 | +- [Try E-days with Azure AD](https://aad.portal.azure.com/) |
| 162 | + |
| 163 | +- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad) |
0 commit comments