Skip to content

Commit 74ffd02

Browse files
committed
part one
1 parent 297d6f0 commit 74ffd02

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

articles/active-directory/saas-apps/catchpoint-tutorial.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Catchpoint | Microsoft Docs'
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Catchpoint'
33
description: Learn how to configure single sign-on between Azure Active Directory and Catchpoint.
44
services: active-directory
55
documentationCenter: na
@@ -19,12 +19,12 @@ ms.author: jeedes
1919
ms.collection: M365-identity-device-management
2020
---
2121

22-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Catchpoint
22+
# Tutorial: Azure Active Directory single sign-on integration with Catchpoint
2323

24-
In this tutorial, you'll learn how to integrate Catchpoint with Azure Active Directory (Azure AD). When you integrate Catchpoint with Azure AD, you can:
24+
In this tutorial, you learn how to integrate Catchpoint with Azure Active Directory (Azure AD). When you integrate Catchpoint with Azure AD, you can:
2525

26-
* Control in Azure AD who has access to Catchpoint.
27-
* Enable your users to be automatically signed-in to Catchpoint with their Azure AD accounts.
26+
* Control user access to Catchpoint from Azure AD.
27+
* Enable automatic Catchpoint sign-in for users with Azure AD accounts.
2828
* Manage your accounts in one central location - the Azure portal.
2929

3030
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
@@ -34,15 +34,15 @@ To learn more about SaaS app integration with Azure AD, see [What is application
3434
To get started, you need the following items:
3535

3636
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37-
* Catchpoint single sign-on (SSO) enabled subscription.
37+
* A Catchpoint single sign-on (SSO) enabled subscription.
3838

3939
## Scenario description
4040

4141
In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

43-
* Catchpoint supports **SP and IDP** initiated SSO
44-
* Catchpoint supports **Just In Time** user provisioning
45-
* Once you configure Catchpoint you can enforce session control, which protects exfiltration and infiltration of your organizations sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
43+
* Catchpoint supports SP- and IDP- initiated SSO.
44+
* Catchpoint supports just-in-time (JIT) user provisioning.
45+
* After you configure Catchpoint, you can enforce session control. This procedure protects against exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4646

4747
## Adding Catchpoint from the gallery
4848

@@ -93,24 +93,24 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9393

9494
1. Catchpoint application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9595

96-
![image](common/default-attributes.png)
96+
![image](common/default-attributes.png)
9797

9898
1. In addition to above, Catchpoint application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
9999

100-
| Name | Source Attribute|
101-
| ------------ | --------- |
102-
| namespace | user.assignedrole |
100+
| Name | Source Attribute|
101+
| ------------ | --------- |
102+
| namespace | user.assignedrole |
103103

104104
> [!NOTE]
105105
> namespace claim needs to be mapped with the account name. This account name should be setup as the roles in Azure AD which will be passed back in SAML response. Please refer this [article](https://docs.microsoft.com/azure/active-directory/develop/active-directory-enterprise-app-role-management) to learn how to setup the roles
106106
107107
1. On the **Setup single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
108108

109-
![The Certificate download link](common/certificatebase64.png)
109+
![The Certificate download link](common/certificatebase64.png)
110110

111111
1. On the **Set up Catchpoint** section, copy the appropriate URL(s) based on your requirement.
112112

113-
![Copy configuration URLs](common/copy-configuration-urls.png)
113+
![Copy configuration URLs](common/copy-configuration-urls.png)
114114

115115
### Create an Azure AD test user
116116

@@ -136,7 +136,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
136136

137137
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
138138

139-
![The Add User link](common/add-assign-user.png)
139+
![The Add User link](common/add-assign-user.png)
140140

141141
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
142142
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
@@ -154,17 +154,17 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
154154

155155
![Catchpoint configuration](./media/catchpoint-tutorial/configuration2.png)
156156

157-
1. In the **Namespace** textbox, enter a valid namespace value.
157+
1. In the **Namespace** textbox, enter a valid namespace value.
158158

159-
1. In the **Identity Provider Issuer** textbox, enter the **Azure AD Identifier** value, which you have copied from the Azure portal.
159+
1. In the **Identity Provider Issuer** textbox, enter the **Azure AD Identifier** value, which you have copied from the Azure portal.
160160

161-
1. In the **Single Sign On Url** textbox, enter the **Login URL** value, which you have copied from the Azure portal.
161+
1. In the **Single Sign On Url** textbox, enter the **Login URL** value, which you have copied from the Azure portal.
162162

163-
1. Open the downloaded **Certificate (Base64)** file into Notepad, copy the content of certificate file and paste it into **Certificate** textbox.
163+
1. Open the downloaded **Certificate (Base64)** file into Notepad, copy the content of certificate file and paste it into **Certificate** textbox.
164164

165165
1. You can also upload the **Federation Metadata XML** by clicking on the **Upload Metadata** option.
166166

167-
1. Click **Save**.
167+
1. Click **Save**.
168168

169169
### Create Catchpoint test user
170170

0 commit comments

Comments
 (0)