Skip to content

Commit 88e1fb2

Browse files
committed
Product Backlog Item 1833023: SaaS App Tutorial: SECURE DELIVER Update
1 parent 2bb07b1 commit 88e1fb2

File tree

1 file changed

+14
-16
lines changed

1 file changed

+14
-16
lines changed

articles/active-directory/saas-apps/securedeliver-tutorial.md

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with SECURE DELIVER | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with SECURE DELIVER'
33
description: Learn how to configure single sign-on between Azure Active Directory and SECURE DELIVER.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/01/2021
12+
ms.date: 03/24/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory integration with SECURE DELIVER
16+
# Tutorial: Azure AD SSO integration with SECURE DELIVER
1717

1818
In this tutorial, you'll learn how to integrate SECURE DELIVER with Azure Active Directory (Azure AD). When you integrate SECURE DELIVER with Azure AD, you can:
1919

@@ -27,6 +27,8 @@ To configure Azure AD integration with SECURE DELIVER, you need the following it
2727

2828
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/).
2929
* SECURE DELIVER single sign-on enabled subscription.
30+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
31+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3032

3133
## Scenario description
3234

@@ -72,22 +74,18 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7274

7375
4. On the **Basic SAML Configuration** section, perform the following steps:
7476

75-
a. In the **Sign on URL** text box, type a URL using the following pattern:
76-
`https://<companyname>.i-securedeliver.jp/sd/<tenantname>/jsf/login/sso`
77-
78-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
77+
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
7978
`https://<companyname>.i-securedeliver.jp/sd/<tenantname>/postResponse`
8079

81-
> [!NOTE]
82-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [SECURE DELIVER Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
83-
84-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
80+
b. In the **Sign on URL** text box, type a URL using the following pattern:
81+
`https://<companyname>.i-securedeliver.jp/sd/<tenantname>/jsf/login/sso`
8582

86-
![The Certificate download link](common/certificatebase64.png)
83+
> [!NOTE]
84+
> These values are not real. Update these values with the actual Identifier and Sign on URL. Contact [SECURE DELIVER Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8785

88-
6. On the **Set up SECURE DELIVER** section, copy the appropriate URL(s) as per your requirement.
86+
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
8987

90-
![Copy configuration URLs](common/copy-configuration-urls.png)
88+
![The Certificate download link](common/metadataxml.png)
9189

9290
### Create an Azure AD test user
9391

@@ -115,7 +113,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
115113

116114
## Configure SECURE DELIVER SSO
117115

118-
To configure single sign-on on **SECURE DELIVER** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [SECURE DELIVER support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
116+
To configure single sign-on on **SECURE DELIVER** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [SECURE DELIVER support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
119117

120118
### Create SECURE DELIVER test user
121119

@@ -135,4 +133,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
135133

136134
## Next steps
137135

138-
Once you configure SECURE DELIVER you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
136+
Once you configure SECURE DELIVER you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)