Skip to content

Commit 7ccf1e7

Browse files
authored
Merge pull request #206771 from amansaxena70/Adp_OneclickSSO_Adedd
Adding Configure ADP One Click SSO in the documents
2 parents a429f1b + c209279 commit 7ccf1e7

File tree

4 files changed

+24
-5
lines changed

4 files changed

+24
-5
lines changed

articles/active-directory/saas-apps/adpfederatedsso-tutorial.md

Lines changed: 24 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/30/2021
12+
ms.date: 08/03/2022
1313
ms.author: jeedes
1414
---
1515

@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with ADP, perform the following steps:
6060
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
6161
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
6262
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
63-
2. **[Configure ADP SSO](#configure-adp-sso)** - to configure the Single Sign-On settings on application side.
63+
2. **[Configure ADP SSO](#configure-adp-sso)** - to configure the single sign-on settings on application side.
6464
1. **[Create ADP test user](#create-adp-test-user)** - to have a counterpart of B.Simon in ADP that is linked to the Azure AD representation of user.
6565
3. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6666

@@ -125,10 +125,29 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
125125

126126
## Configure ADP SSO
127127

128-
To configure single sign-on on **ADP** side, you need to upload the downloaded **Metadata XML** on the [ADP website](https://adpfedsso.adp.com/public/login/index.fcc).
128+
1. To automate the configuration within ADP, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
129129

130-
> [!NOTE]
131-
> This process may take a few days.
130+
![My apps extension](common/install-myappssecure-extension.png)
131+
132+
1. After adding extension to the browser, click on **Set up ADP** will direct you to the ADP application. From there, provide the admin credentials to sign in to ADP. The browser extension will automatically configure the application for you and automate steps 3-7.
133+
134+
![Setup configuration](common/setup-sso.png)
135+
136+
1. If you want to set up ADP manually, open a new web browser window and sign in to your ADP company site as an administrator and perform the following steps:
137+
138+
1. Click **Federation Setup** and go to **Identity Provider** then, select the **Microsoft Azure**.
139+
140+
![Screenshot for identity provider.](./media/adpfederatedsso-tutorial/microsoft-azure.png)
141+
142+
1. In the **Services Selection**, select all applicable service(s) for connection, and then click **Next**.
143+
144+
![Screenshot for services selection.](./media/adpfederatedsso-tutorial/services.png)
145+
146+
1. In the **Configure** section, click on the **Next**.
147+
148+
1. In the **Upload Metadata**, click **Browse** to upload the metadata XML file which you have downloaded from the Azure portal and click **UPLOAD**.
149+
150+
![Screenshot for uploading metadata.](./media/adpfederatedsso-tutorial/metadata.png)
132151

133152
### Configure your ADP service(s) for federated access
134153

18.7 KB
Loading
45 KB
Loading
18 KB
Loading

0 commit comments

Comments
 (0)