Skip to content

Commit 82f2a85

Browse files
committed
Product Backlog Item 1794394: SaaS App Tutorial: Buttonwood Central SSO
1 parent 606ff90 commit 82f2a85

File tree

2 files changed

+136
-0
lines changed

2 files changed

+136
-0
lines changed
Lines changed: 134 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,134 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with Buttonwood Central SSO'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Buttonwood Central SSO.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 03/03/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with Buttonwood Central SSO
18+
19+
In this tutorial, you'll learn how to integrate Buttonwood Central SSO with Azure Active Directory (Azure AD). When you integrate Buttonwood Central SSO with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to Buttonwood Central SSO.
22+
* Enable your users to be automatically signed-in to Buttonwood Central SSO with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* Buttonwood Central SSO single sign-on (SSO) enabled subscription.
31+
32+
## Scenario description
33+
34+
In this tutorial, you configure and test Azure AD SSO in a test environment.
35+
36+
* Buttonwood Central SSO supports **SP** initiated SSO.
37+
38+
> [!NOTE]
39+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
40+
41+
## Add Buttonwood Central SSO from the gallery
42+
43+
To configure the integration of Buttonwood Central SSO into Azure AD, you need to add Buttonwood Central SSO from the gallery to your list of managed SaaS apps.
44+
45+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
46+
1. On the left navigation pane, select the **Azure Active Directory** service.
47+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
48+
1. To add new application, select **New application**.
49+
1. In the **Add from the gallery** section, type **Buttonwood Central SSO** in the search box.
50+
1. Select **Buttonwood Central SSO** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
51+
52+
## Configure and test Azure AD SSO for Buttonwood Central SSO
53+
54+
Configure and test Azure AD SSO with Buttonwood Central SSO using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Buttonwood Central SSO.
55+
56+
To configure and test Azure AD SSO with Buttonwood Central SSO, perform the following steps:
57+
58+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
59+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
60+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
61+
1. **[Configure Buttonwood Central SSO](#configure-buttonwood-central-sso)** - to configure the single sign-on settings on application side.
62+
1. **[Create Buttonwood Central SSO test user](#create-buttonwood-central-sso-test-user)** - to have a counterpart of B.Simon in Buttonwood Central SSO that is linked to the Azure AD representation of user.
63+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
64+
65+
## Configure Azure AD SSO
66+
67+
Follow these steps to enable Azure AD SSO in the Azure portal.
68+
69+
1. In the Azure portal, on the **Buttonwood Central SSO** application integration page, find the **Manage** section and select **single sign-on**.
70+
1. On the **Select a single sign-on method** page, select **SAML**.
71+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
72+
73+
![Edit Basic SAML Configuration](common/edit-urls.png)
74+
75+
1. On the **Basic SAML Configuration** section, perform the following steps:
76+
77+
a. In the **Identifier (Entity ID)** text box, type the URL:
78+
`http://adfs.bcx.buttonwood.net/adfs/services/trust`
79+
80+
b. In the **Reply URL** text box, type the URL:
81+
`https://adfs.bcx.buttonwood.net/adfs/ls/`
82+
83+
c. In the **Sign on URL** text box, type the URL:
84+
`https://exchange.bcx.buttonwood.net/User/FederatedLogin`
85+
86+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
87+
88+
![The Certificate download link](common/copy-metadataurl.png)
89+
90+
### Create an Azure AD test user
91+
92+
In this section, you'll create a test user in the Azure portal called B.Simon.
93+
94+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
95+
1. Select **New user** at the top of the screen.
96+
1. In the **User** properties, follow these steps:
97+
1. In the **Name** field, enter `B.Simon`.
98+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
99+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
100+
1. Click **Create**.
101+
102+
### Assign the Azure AD test user
103+
104+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Buttonwood Central SSO.
105+
106+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
107+
1. In the applications list, select **Buttonwood Central SSO**.
108+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
109+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
110+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
111+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
112+
1. In the **Add Assignment** dialog, click the **Assign** button.
113+
114+
## Configure Buttonwood Central SSO
115+
116+
To configure single sign-on on **Buttonwood Central SSO** side, you need to send the **App Federation Metadata Url** to [Buttonwood Central SSO support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
117+
118+
### Create Buttonwood Central SSO test user
119+
120+
In this section, you create a user called Britta Simon in Buttonwood Central SSO. Work with [Buttonwood Central SSO support team](mailto:[email protected]) to add the users in the Buttonwood Central SSO platform. Users must be created and activated before you use single sign-on.
121+
122+
## Test SSO
123+
124+
In this section, you test your Azure AD single sign-on configuration with following options.
125+
126+
* Click on **Test this application** in Azure portal. This will redirect to Buttonwood Central SSO Sign-on URL where you can initiate the login flow.
127+
128+
* Go to Buttonwood Central SSO Sign-on URL directly and initiate the login flow from there.
129+
130+
* You can use Microsoft My Apps. When you click the Buttonwood Central SSO tile in the My Apps, this will redirect to Buttonwood Central SSO Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
131+
132+
## Next steps
133+
134+
Once you configure Buttonwood Central SSO you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -335,6 +335,8 @@
335335
href: bullseyetdp-tutorial.md
336336
- name: Burp Suite Enterprise Edition
337337
href: burp-suite-enterprise-edition-tutorial.md
338+
- name: Buttonwood Central SSO
339+
href: buttonwood-central-sso-tutorial.md
338340
- name: Bynder
339341
href: bynder-tutorial.md
340342
- name: C

0 commit comments

Comments
 (0)