You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/aws-clientvpn-tutorial.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
96
96
97
97
1. Click on **Manifest** and you need to keep the Reply URL as **http** instead of **https** to get the integration working, click on **Save**.
98
98
99
-

99
+

100
100
101
101
1. AWS ClientVPN application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
102
102
@@ -116,7 +116,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
116
116
117
117
1. In the **SAML Signing Certificate** section, click the edit icon and change the **Signing Option** to **Sign SAML response and assertion**. Click **Save**.
118
118
119
-

119
+

120
120
121
121
1. On the **Set up AWS ClientVPN** section, copy the appropriate URL(s) based on your requirement.
0 commit comments