Skip to content

Commit 8f47532

Browse files
authored
Merge pull request #73029 from v-dansch/saas-tutorials-jeevansd
edit pass: Saas tutorials jeevansd
2 parents 7931dce + 2b8cd0f commit 8f47532

File tree

3 files changed

+257
-265
lines changed

3 files changed

+257
-265
lines changed

articles/active-directory/saas-apps/pagedna-tutorial.md

Lines changed: 94 additions & 96 deletions
Original file line numberDiff line numberDiff line change
@@ -19,195 +19,193 @@ ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
2121
---
22+
2223
# Tutorial: Azure Active Directory integration with PageDNA
2324

2425
In this tutorial, you learn how to integrate PageDNA with Azure Active Directory (Azure AD).
26+
2527
Integrating PageDNA with Azure AD provides you with the following benefits:
2628

27-
* You can control in Azure AD who has access to PageDNA.
28-
* You can enable your users to be automatically signed-in to PageDNA (Single Sign-On) with their Azure AD accounts.
29-
* You can manage your accounts in one central location - the Azure portal.
29+
* In Azure AD, you can control who has access to PageDNA.
30+
* You can enable your users to be automatically signed in to PageDNA (single sign-on) with their Azure AD accounts.
31+
* You can manage your accounts in one central location: the Azure portal.
3032

31-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
33+
For details about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
3334

3435
## Prerequisites
3536

3637
To configure Azure AD integration with PageDNA, you need the following items:
3738

38-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/)
39-
* PageDNA single sign-on enabled subscription
39+
* An Azure AD subscription. If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
40+
* A PageDNA subscription with single sign-on enabled.
4041

4142
## Scenario description
4243

43-
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
44+
In this tutorial, you configure and test Azure AD single sign-on in a test environment and integrate PageDNA with Azure AD.
4445

45-
* PageDNA supports **SP** initiated SSO
46+
PageDNA supports the following features:
4647

47-
* PageDNA supports **Just In Time** user provisioning
48+
* SP-initiated single sign-on (SSO).
4849

49-
## Adding PageDNA from the gallery
50+
* Just-in-time user provisioning.
5051

51-
To configure the integration of PageDNA into Azure AD, you need to add PageDNA from the gallery to your list of managed SaaS apps.
52+
## Add PageDNA from the Azure Marketplace
5253

53-
**To add PageDNA from the gallery, perform the following steps:**
54+
To configure the integration of PageDNA into Azure AD, you need to add PageDNA from the Azure Marketplace to your list of managed SaaS apps:
5455

55-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
56+
1. Sign in to the [Azure portal](https://portal.azure.com?azure-portal=true).
57+
1. In the left pane, select **Azure Active Directory**.
5658

57-
![The Azure Active Directory button](common/select-azuread.png)
59+
![The Azure Active Directory option](common/select-azuread.png)
5860

59-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
61+
1. Go to **Enterprise Applications**, and then select **All Applications**.
6062

61-
![The Enterprise applications blade](common/enterprise-applications.png)
63+
![The Enterprise applications pane](common/enterprise-applications.png)
6264

63-
3. To add new application, click **New application** button on the top of dialog.
65+
1. To add a new application, select **+ New application** at the top of the pane.
6466

65-
![The New application button](common/add-new-app.png)
67+
![The New application option](common/add-new-app.png)
6668

67-
4. In the search box, type **PageDNA**, select **PageDNA** from result panel then click **Add** button to add the application.
69+
1. In the search box, enter **PageDNA**. In the search results, select **PageDNA**, and then select **Add** to add the application.
6870

69-
![PageDNA in the results list](common/search-new-app.png)
71+
![PageDNA in the results list](common/search-new-app.png)
7072

7173
## Configure and test Azure AD single sign-on
7274

73-
In this section, you configure and test Azure AD single sign-on with PageDNA based on a test user called **Britta Simon**.
74-
For single sign-on to work, a link relationship between an Azure AD user and the related user in PageDNA needs to be established.
75+
In this section, you configure and test Azure AD single sign-on with PageDNA based on a test user named **Britta Simon**. For single sign-on to work, you must establish a link between an Azure AD user and the related user in PageDNA.
7576

7677
To configure and test Azure AD single sign-on with PageDNA, you need to complete the following building blocks:
7778

78-
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
79-
2. **[Configure PageDNA Single Sign-On](#configure-pagedna-single-sign-on)** - to configure the Single Sign-On settings on application side.
80-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
81-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
82-
5. **[Create PageDNA test user](#create-pagedna-test-user)** - to have a counterpart of Britta Simon in PageDNA that is linked to the Azure AD representation of user.
83-
6. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
79+
1. **[Configure Azure AD single sign-on](#configure-azure-ad-single-sign-on)** to enable your users to use this feature.
80+
1. **[Configure PageDNA single sign-on](#configure-pagedna-single-sign-on)** to configure the single sign-on settings on the application side.
81+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with Britta Simon.
82+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable Britta Simon to use Azure AD single sign-on.
83+
1. **[Create a PageDNA test user](#create-a-pagedna-test-user)** so that there's a user named Britta Simon in PageDNA who's linked to the Azure AD user named Britta Simon.
84+
1. **[Test single sign-on](#test-single-sign-on)** to verify whether the configuration works.
8485

8586
### Configure Azure AD single sign-on
8687

8788
In this section, you enable Azure AD single sign-on in the Azure portal.
8889

89-
To configure Azure AD single sign-on with PageDNA, perform the following steps:
90+
To configure Azure AD single sign-on with PageDNA, take the following steps:
9091

9192
1. In the [Azure portal](https://portal.azure.com/), on the **PageDNA** application integration page, select **Single sign-on**.
9293

93-
![Configure single sign-on link](common/select-sso.png)
94+
![Configure single sign-on option](common/select-sso.png)
9495

95-
2. On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
96+
1. In the **Select a single sign-on method** pane, select **SAML/WS-Fed** mode to enable single sign-on.
9697

9798
![Single sign-on select mode](common/select-saml-option.png)
9899

99-
3. On the **Set up Single Sign-On with SAML** page, click **Edit** icon to open **Basic SAML Configuration** dialog.
100+
1. On the **Set up Single Sign-On with SAML** pane, select **Edit** (the pencil icon) to open the **Basic SAML Configuration** pane.
100101

101-
![Edit Basic SAML Configuration](common/edit-urls.png)
102+
![Edit Basic SAML Configuration](common/edit-urls.png)
102103

103-
4. On the **Basic SAML Configuration** section, perform the following steps:
104+
1. In the **Basic SAML Configuration** pane, take the following steps:
104105

105-
![PageDNA Domain and URLs single sign-on information](common/sp-identifier.png)
106+
![PageDNA domain and URLs single sign-on information](common/sp-identifier.png)
106107

107-
a. In the **Sign on URL** text box, type a URL using the following pattern:
108+
1. In the **Sign on URL** box, enter a URL by using one of the following patterns:
108109

109-
||
110-
|--|
111-
| `https://stores.pagedna.com/<your site>` |
112-
| `https://<your domain>` |
113-
| `https://<your domain>/<your site>` |
114-
| `https://www.nationsprint.com/<your site>` |
115-
| |
116-
117-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
110+
||
111+
|--|
112+
| `https://stores.pagedna.com/<your site>` |
113+
| `https://<your domain>` |
114+
| `https://<your domain>/<your site>` |
115+
| `https://www.nationsprint.com/<your site>` |
116+
| |
118117

119-
||
120-
|--|
121-
| `https://stores.pagedna.com/<your site>/saml2ep.cgi` |
122-
| `https://www.nationsprint.com/<your site>/saml2ep.cgi` |
123-
| |
118+
1. In the **Identifier (Entity ID)** box, enter a URL by using one of the following patterns:
124119

125-
> [!NOTE]
126-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [PageDNA Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
120+
||
121+
|--|
122+
| `https://stores.pagedna.com/<your site>/saml2ep.cgi` |
123+
| `https://www.nationsprint.com/<your site>/saml2ep.cgi` |
124+
| |
127125

128-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Raw)** from the given options as per your requirement and save it on your computer.
126+
> [!NOTE]
127+
> These values aren't real. Update these values with the actual sign-on URL and identifier. To get these values, contact the [PageDNA support team](mailto:[email protected]). You can also refer to the patterns shown in the **Basic SAML Configuration** pane in the Azure portal.
129128
130-
![The Certificate download link](common/certificateraw.png)
129+
1. In the **Set up Single Sign-On with SAML** pane, in the **SAML Signing Certificate** section, select **Download** to download **Certificate (Raw)** from the given options and save it on your computer.
131130

132-
6. On the **Set up PageDNA** section, copy the appropriate URL(s) as per your requirement.
131+
![The Certificate (Raw) download option](common/certificateraw.png)
133132

134-
![Copy configuration URLs](common/copy-configuration-urls.png)
133+
1. In the **Set up PageDNA** section, copy the URL or URLs that you need:
135134

136-
a. Login URL
135+
* **Login URL**
136+
* **Azure AD Identifier**
137+
* **Logout URL**
137138

138-
b. Azure AD Identifier
139+
![Copy the configuration URLs](common/copy-configuration-urls.png)
139140

140-
c. Logout URL
141+
### Configure PageDNA single sign-on
141142

142-
### Configure PageDNA Single Sign-On
143+
To configure single sign-on on the PageDNA side, send the downloaded Certificate (Raw) and the appropriate copied URLs from the Azure portal to the [PageDNA support team](mailto:[email protected]). The PageDNA team will make sure the SAML SSO connection is set properly on both sides.
143144

144-
To configure single sign-on on **PageDNA** side, you need to send the downloaded **Certificate (Raw)** and appropriate copied URLs from Azure portal to [PageDNA support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
145+
### Create an Azure AD test user
145146

146-
### Create an Azure AD test user
147+
In this section, you create a test user in the Azure portal named Britta Simon.
147148

148-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
149+
1. In the Azure portal, in the left pane, select **Azure Active Directory** > **Users** > **All users**.
149150

150-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
151+
![The Users and "All users" options](common/users.png)
151152

152-
![The "Users and groups" and "All users" links](common/users.png)
153+
1. At the top of the screen, select **+ New user**.
153154

154-
2. Select **New user** at the top of the screen.
155+
![New user option](common/new-user.png)
155156

156-
![New user Button](common/new-user.png)
157+
1. In the **User** pane, do the following steps:
157158

158-
3. In the User properties, perform the following steps.
159+
![The User pane](common/user-properties.png)
159160

160-
![The User dialog box](common/user-properties.png)
161-
162-
a. In the **Name** field enter **BrittaSimon**.
161+
1. In the **Name** box, enter **BrittaSimon**.
163162

164-
b. In the **User name** field type `brittasimon@yourcompanydomain.extension`. For example, [email protected]
163+
1. In the **User name** box, enter **BrittaSimon\@\<yourcompanydomain>.\<extension>**. For example, **BrittaSimon\@contoso.com**.
165164

166-
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
165+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
167166

168-
d. Click **Create**.
167+
1. Select **Create**.
169168

170169
### Assign the Azure AD test user
171170

172-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to PageDNA.
171+
In this section, you enable Britta Simon to use Azure single sign-on by granting her access to PageDNA.
173172

174-
1. In the Azure portal, select **Enterprise Applications**, select **All applications**, then select **PageDNA**.
173+
1. In the Azure portal, select **Enterprise applications** > **All applications** > **PageDNA**.
175174

176-
![Enterprise applications blade](common/enterprise-applications.png)
175+
![Enterprise applications pane](common/enterprise-applications.png)
177176

178-
2. In the applications list, select **PageDNA**.
177+
1. In the applications list, select **PageDNA**.
179178

180-
![The PageDNA link in the Applications list](common/all-applications.png)
179+
![PageDNA in the applications list](common/all-applications.png)
181180

182-
3. In the menu on the left, select **Users and groups**.
181+
1. In the left pane, under **MANAGE**, select **Users and groups**.
183182

184-
![The "Users and groups" link](common/users-groups-blade.png)
183+
![The "Users and groups" option](common/users-groups-blade.png)
185184

186-
4. Click the **Add user** button, then select **Users and groups** in the **Add Assignment** dialog.
185+
1. Select **+ Add user**, and then select **Users and groups** in the **Add Assignment** pane.
187186

188187
![The Add Assignment pane](common/add-assign-user.png)
189188

190-
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
191-
192-
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
189+
1. In the **Users and groups** pane, select **Britta Simon** in the **Users** list, and then choose **Select** at the bottom of the pane.
193190

194-
7. In the **Add Assignment** dialog click the **Assign** button.
191+
1. If you're expecting a role value in the SAML assertion, then in the **Select Role** pane, select the appropriate role for the user from the list. At the bottom of the pane, choose **Select**.
195192

196-
### Create PageDNA test user
193+
1. In the **Add Assignment** pane, select **Assign**.
197194

198-
In this section, a user called Britta Simon is created in PageDNA. PageDNA supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in PageDNA, a new one is created after authentication.
195+
### Create a PageDNA test user
199196

200-
### Test single sign-on
197+
A user named Britta Simon is now created in PageDNA. You don't have to do anything to create this user. PageDNA supports just-in-time user provisioning, which is enabled by default. If a user named Britta Simon doesn't already exist in PageDNA, a new one is created after authentication.
201198

202-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
199+
### Test single sign-on
203200

204-
When you click the PageDNA tile in the Access Panel, you should be automatically signed in to the PageDNA for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
201+
In this section, you test your Azure AD single sign-on configuration by using the My Apps portal.
205202

206-
## Additional Resources
203+
When you select **PageDNA** in the My Apps portal, you should be automatically signed in to the PageDNA subscription for which you set up single sign-on. For more information about the My Apps portal, see [Access and use apps on the My Apps portal](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
207204

208-
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
205+
## Additional resources
209206

210-
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
207+
* [List of tutorials for integrating SaaS applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
211208

212-
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
209+
* [Single sign-on to applications in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
213210

211+
* [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)

0 commit comments

Comments
 (0)