Skip to content

Commit 7191656

Browse files
authored
Merge pull request #104974 from v-hagamp/sabatalentspace
Product Backlog Item 930655: SaaS App Tutorial: Saba TalentSpace update
2 parents 718564a + ba44f52 commit 7191656

File tree

3 files changed

+9
-5
lines changed

3 files changed

+9
-5
lines changed

articles/active-directory/saas-apps/halogen-software-tutorial.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 02/15/2020
16+
ms.date: 02/20/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -41,7 +41,7 @@ To get started, you need the following items:
4141
In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

4343
* Saba TalentSpace supports **SP** initiated SSO
44-
* Once you configure Saba TalentSpace you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
44+
* Once you configure Saba TalentSpace you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4545

4646
## Adding Saba TalentSpace from the gallery
4747

@@ -79,13 +79,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7979

8080
1. On the **Basic SAML Configuration** section, perform the following steps:
8181

82-
a. In the **Sign on URL** text box, type a URL using the following pattern:
82+
a. In the **Sign on URL** text box, type a URL using the following pattern:
8383
`https://global.hgncloud.com/[companyname]/saml/login`
8484

85-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern: `https://global.hgncloud.com/[companyname]/saml/metadata`
85+
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
86+
`https://global.hgncloud.com/[companyname]/saml/metadata`
87+
88+
c. In the **Reply URL (Assertion Consumer Service URL)** text box, type a URL using the following pattern:
89+
`https://global.hgncloud.com/[companyname]/saml/SSO`
8690

8791
> [!NOTE]
88-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Saba TalentSpace Client support team](https://support.halogensoftware.com/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
92+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Saba TalentSpace Client support team](https://support.saba.com/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8993

9094
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
9195

15 Bytes
Loading
377 Bytes
Loading

0 commit comments

Comments
 (0)