Skip to content

Commit 8230678

Browse files
authored
Merge pull request #82431 from sarina-dd/patch-1
Updated datadog-tutorial.md
2 parents d4e9bbb + 3f6c985 commit 8230678

File tree

1 file changed

+16
-19
lines changed

1 file changed

+16
-19
lines changed

articles/active-directory/saas-apps/datadog-tutorial.md

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -63,30 +63,31 @@ To configure and test Azure AD SSO with Datadog, perform the following steps:
6363
Follow these steps to enable Azure AD SSO in the Azure portal.
6464

6565
1. In the Azure portal, on the **Datadog** application integration page, find the **Manage** section and select **single sign-on**.
66-
1. On the **Select a single sign-on method** page, select **SAML**.
67-
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
6866

69-
![Edit Basic SAML Configuration](common/edit-urls.png)
67+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7068

71-
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
69+
1. In the **Basic SAML Configuration** section, the user doesn't take any action because the application is pre-integrated with Azure.
7270

73-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
71+
1. Click **Set additional URLs** and perform the following step if you want to configure the application in **SP** initiated mode:
7472

7573
In the **Sign-on URL** text box, type a URL using the following pattern:
7674
`https://app.datadoghq.com/account/login/id/<CUSTOM_IDENTIFIER>`
7775

7876
> [!NOTE]
79-
> The value is not real. Update the value with the actual Sign-on URL. Contact [Datadog Client support team](mailto:support@datadoghq.com) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
77+
> The value is not real. Update the value with the actual Sign-on URL in your [Datadog SAML settings](https://app.datadoghq.com/organization-settings/login-methods/saml). You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal. Using IdP initiated login and SP initiated login together requires both version of the ACS URL configured in Azure.
8078
8179
1. Click **Save**.
8280

83-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
81+
1. On the **Set up Single Sign-On with SAML** page under **User Attributes & Claims**, click the pencil icon to edit the settings.
82+
83+
1. Click the **Add a group claim** button. By default in Azure AD, the group claim name is a URL. For example, `http://schemas.microsoft.com/ws/2008/06/identity/claims/groups`). If you want to change this to a display name value like **groups**, select **Advanced options**, and then change the name of the group claim to **groups**.
8484

85-
![The Certificate download link](common/metadataxml.png)
85+
> [!NOTE]
86+
> The source attribute is set to `Group ID`. This is the UUID of the group in Azure AD. This means that the group ID is sent by Azure AD as a group claim attribute value, not as the group name. You need to change mappings in Datadog to map to the group ID instead of to the group name. For more information, see [Datadog SAML mappings](https://docs.datadoghq.com/account_management/saml/#mapping-saml-attributes-to-datadog-roles).
8687
87-
1. On the **Set up Datadog** section, copy the appropriate URL(s) based on your requirement.
88+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
8889

89-
![Copy configuration URLs](common/copy-configuration-urls.png)
90+
1. In the **Set up Datadog** section, copy the appropriate URL(s) based on your requirement.
9091

9192
### Create an Azure AD test user
9293

@@ -114,27 +115,23 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
114115

115116
## Configure Datadog SSO
116117

117-
To configure single sign-on on **Datadog** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Datadog support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
118-
119-
### Create Datadog test user
120-
121-
In this section, you create a user called B.Simon in Datadog. Work with [Datadog support team](mailto:[email protected]) to add the users in the Datadog platform.
118+
To configure single sign-on on the **Datadog** side, you need to upload the downloaded **Federation Metadata XML** in the [Datadog SAML settings](https://app.datadoghq.com/organization-settings/login-methods/saml).
122119

123120
## Test SSO
124121

125-
In this section, you test your Azure AD single sign-on configuration with following options.
122+
Test your Azure AD single sign-on configuration with following options.
126123

127124
#### SP initiated:
128125

129126
* Click on **Test this application** in Azure portal. This will redirect to Datadog Sign on URL where you can initiate the login flow.
130127

131-
* Go to Datadog Sign-on URL directly and initiate the login flow from there.
128+
* Go to the Datadog Sign-on URL directly and initiate the login flow from there.
132129

133130
#### IDP initiated:
134131

135132
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Datadog for which you set up the SSO.
136133

137-
You can also use Microsoft My Apps to test the application in any mode. When you click the Datadog tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Datadog for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
134+
You can also use Microsoft My Apps to test the application in any mode. When you click the Datadog tile in the My Apps portal, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Datadog for which you set up the SSO. For more information about My Apps, see [Introduction to the My Apps portal](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
138135

139136
### Enable all users from your tenant to authenticate with the app
140137

@@ -154,4 +151,4 @@ In this section, you enable everyone within your tenant to access Datadog if one
154151

155152
## Next steps
156153

157-
Once you configure Datadog you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).
154+
Once you configure Datadog you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)