You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/pluralsight-tutorial.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to configure single sign-on between Azure Active Director
4
4
services: active-directory
5
5
documentationCenter: na
6
6
author: jeevansd
7
-
manager: daveba
7
+
manager: mtillman
8
8
ms.reviewer: barbkess
9
9
10
10
ms.assetid: 4c3f07d2-4e1f-4ea3-9025-c663f1f2b7b4
@@ -13,10 +13,9 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: tutorial
16
-
ms.date: 12/26/2018
16
+
ms.date: 03/05/2019
17
17
ms.author: jeedes
18
18
19
-
ms.collection: M365-identity-device-management
20
19
---
21
20
# Tutorial: Azure Active Directory integration with Pluralsight
22
21
@@ -43,6 +42,8 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
43
42
44
43
* Pluralsight supports **SP** initiated SSO
45
44
45
+
* Pluralsight supports **just-in-time** user provisioning
46
+
46
47
## Adding Pluralsight from the gallery
47
48
48
49
To configure the integration of Pluralsight into Azure AD, you need to add Pluralsight from the gallery to your list of managed SaaS apps.
@@ -113,14 +114,13 @@ To configure Azure AD single sign-on with Pluralsight, perform the following ste
113
114
> [!NOTE]
114
115
> These values are not real. Update these values with the actual Sign-On URL and Reply URL. Contact [Pluralsight Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
115
116
116
-
5. Pluralsight application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the **User Attributes** section on application integration page. On the **Set up Single Sign-On with SAML** page, click **Edit** button to open **User Attributes** dialog.
117
-
117
+
5. Pluralsight application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
118
118

119
119
120
120
>[!NOTE]
121
121
>You can also add the **"Unique ID"** attribute with the appropriate value like EmployeeID or something else which suits for your organization. Also note that this is not the required attribute; however, you can add it to identify the unique user.
122
122
123
-
6. In the **User Claims** section on the **User Attributes** dialog, configure SAML token attribute as shown in the image above and perform the following steps:
123
+
6. In addition to above, Pluralsight application expects few more attributes to be passed back in SAML response. In the **User Claims** section on the **User Attributes** dialog, perform the following steps to add SAML token attribute as shown in the below table:
124
124
125
125
| Name | Source Attribute|
126
126
| --------------- | --------- |
@@ -207,7 +207,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
207
207
208
208
### Create Pluralsight test user
209
209
210
-
The objective of this section is to create a user called Britta Simon in Pluralsight. Please work with [Pluralsight Client support team](mailto:[email protected]) to add the users in the Pluralsight account. Users must be created and activated before you use single sign-on.
210
+
In this section, a user called Britta Simon is created in Pluralsight. Pluralsight supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Pluralsight, a new one is created after authentication.
211
211
212
212
### Test single sign-on
213
213
@@ -217,7 +217,7 @@ When you click the Pluralsight tile in the Access Panel, you should be automatic
217
217
218
218
## Additional Resources
219
219
220
-
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
220
+
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
221
221
222
222
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
0 commit comments