You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/pagedna-tutorial.md
+94-96Lines changed: 94 additions & 96 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,195 +19,193 @@ ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
21
21
---
22
+
22
23
# Tutorial: Azure Active Directory integration with PageDNA
23
24
24
25
In this tutorial, you learn how to integrate PageDNA with Azure Active Directory (Azure AD).
26
+
25
27
Integrating PageDNA with Azure AD provides you with the following benefits:
26
28
27
-
*You can control in Azure AD who has access to PageDNA.
28
-
* You can enable your users to be automatically signed-in to PageDNA (Single Sign-On) with their Azure AD accounts.
29
-
* You can manage your accounts in one central location - the Azure portal.
29
+
*In Azure AD, you can control who has access to PageDNA.
30
+
* You can enable your users to be automatically signedin to PageDNA (single sign-on) with their Azure AD accounts.
31
+
* You can manage your accounts in one central location: the Azure portal.
30
32
31
-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32
-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
33
+
For details about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
33
34
34
35
## Prerequisites
35
36
36
37
To configure Azure AD integration with PageDNA, you need the following items:
37
38
38
-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/)
39
-
* PageDNA single sign-on enabled subscription
39
+
* An Azure AD subscription. If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
40
+
*A PageDNA subscription with single sign-on enabled.
40
41
41
42
## Scenario description
42
43
43
-
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
44
+
In this tutorial, you configure and test Azure AD single sign-on in a test environment and integrate PageDNA with Azure AD.
44
45
45
-
*PageDNA supports **SP** initiated SSO
46
+
PageDNA supports the following features:
46
47
47
-
*PageDNA supports **Just In Time** user provisioning
48
+
*SP-initiated single sign-on (SSO).
48
49
49
-
## Adding PageDNA from the gallery
50
+
* Just-in-time user provisioning.
50
51
51
-
To configure the integration of PageDNA into Azure AD, you need to add PageDNA from the gallery to your list of managed SaaS apps.
52
+
## Add PageDNA from the Azure Marketplace
52
53
53
-
**To add PageDNA from the gallery, perform the following steps:**
54
+
To configure the integration of PageDNA into Azure AD, you need to add PageDNA from the Azure Marketplace to your list of managed SaaS apps:
54
55
55
-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
56
+
1. Sign in to the [Azure portal](https://portal.azure.com?azure-portal=true).
57
+
1. In the left pane, select **Azure Active Directory**.
56
58
57
-

59
+

58
60
59
-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
61
+
1. Go to **Enterprise Applications**, and then select **All Applications**.
3. To add new application, click**New application**button on the top of dialog.
65
+
1. To add a new application, select**+ New application**at the top of the pane.
64
66
65
-

67
+

66
68
67
-
4. In the search box, type**PageDNA**, select **PageDNA** from result panel then click**Add** button to add the application.
69
+
1. In the search box, enter**PageDNA**. In the search results, select **PageDNA**, and then select**Add** to add the application.
68
70
69
-

71
+

70
72
71
73
## Configure and test Azure AD single sign-on
72
74
73
-
In this section, you configure and test Azure AD single sign-on with PageDNA based on a test user called **Britta Simon**.
74
-
For single sign-on to work, a link relationship between an Azure AD user and the related user in PageDNA needs to be established.
75
+
In this section, you configure and test Azure AD single sign-on with PageDNA based on a test user named **Britta Simon**. For single sign-on to work, you must establish a link between an Azure AD user and the related user in PageDNA.
75
76
76
77
To configure and test Azure AD single sign-on with PageDNA, you need to complete the following building blocks:
77
78
78
-
1.**[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
79
-
2.**[Configure PageDNA Single Sign-On](#configure-pagedna-single-sign-on)**- to configure the Single Sign-On settings on application side.
80
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
81
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
82
-
5.**[Create PageDNA test user](#create-pagedna-test-user)**- to have a counterpart of Britta Simon in PageDNA that is linked to the Azure AD representation of user.
83
-
6.**[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
79
+
1.**[Configure Azure AD single sign-on](#configure-azure-ad-single-sign-on)** to enable your users to use this feature.
80
+
1.**[Configure PageDNA single sign-on](#configure-pagedna-single-sign-on)** to configure the single sign-on settings on the application side.
81
+
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with Britta Simon.
82
+
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable Britta Simon to use Azure AD single sign-on.
83
+
1.**[Create a PageDNA test user](#create-a-pagedna-test-user)**so that there's a user named Britta Simon in PageDNA who's linked to the Azure AD user named Britta Simon.
84
+
1.**[Test single sign-on](#test-single-sign-on)** to verify whether the configuration works.
84
85
85
86
### Configure Azure AD single sign-on
86
87
87
88
In this section, you enable Azure AD single sign-on in the Azure portal.
88
89
89
-
To configure Azure AD single sign-on with PageDNA, perform the following steps:
90
+
To configure Azure AD single sign-on with PageDNA, take the following steps:
90
91
91
92
1. In the [Azure portal](https://portal.azure.com/), on the **PageDNA** application integration page, select **Single sign-on**.
92
93
93
-

94
+

94
95
95
-
2. On the **Select a Single sign-on method**dialog, select **SAML/WS-Fed** mode to enable single sign-on.
96
+
1. In the **Select a single sign-on method**pane, select **SAML/WS-Fed** mode to enable single sign-on.
1. In the **Identifier (Entity ID)** box, enter a URL by using one of the following patterns:
124
119
125
-
> [!NOTE]
126
-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [PageDNA Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Raw)** from the given options as per your requirement and save it on your computer.
126
+
> [!NOTE]
127
+
> These values aren't real. Update these values with the actual sign-on URL and identifier. To get these values, contact the [PageDNA support team](mailto:[email protected]). You can also refer to the patterns shown in the **Basic SAML Configuration** pane in the Azure portal.
1. In the **Set up Single Sign-On with SAML** pane, in the **SAML Signing Certificate** section, select **Download** to download **Certificate (Raw)** from the given options and save it on your computer.
131
130
132
-
6. On the **Set up PageDNA** section, copy the appropriate URL(s) as per your requirement.
1. In the **Set up PageDNA** section, copy the URL or URLs that you need:
135
134
136
-
a. Login URL
135
+
***Login URL**
136
+
***Azure AD Identifier**
137
+
***Logout URL**
137
138
138
-
b. Azure AD Identifier
139
+

139
140
140
-
c. Logout URL
141
+
### Configure PageDNA single sign-on
141
142
142
-
### Configure PageDNA Single Sign-On
143
+
To configure single sign-on on the PageDNA side, send the downloaded Certificate (Raw) and the appropriate copied URLs from the Azure portal to the [PageDNA support team](mailto:[email protected]). The PageDNA team will make sure the SAML SSO connection is set properly on both sides.
143
144
144
-
To configure single sign-on on **PageDNA** side, you need to send the downloaded **Certificate (Raw)** and appropriate copied URLs from Azure portal to [PageDNA support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
145
+
### Create an Azure AD test user
145
146
146
-
### Create an Azure AD test user
147
+
In this section, you create a test user in the Azure portal named Britta Simon.
147
148
148
-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
149
+
1. In the Azure portal, in the left pane, select **Azure Active Directory** > **Users** > **All users**.
149
150
150
-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
151
+

151
152
152
-

153
+
1. At the top of the screen, select **+ New user**.
153
154
154
-
2. Select **New user** at the top of the screen.
155
+

155
156
156
-

157
+
1. In the **User** pane, do the following steps:
157
158
158
-
3. In the User properties, perform the following steps.
159
+

159
160
160
-

161
-
162
-
a. In the **Name** field enter **BrittaSimon**.
161
+
1. In the **Name** box, enter **BrittaSimon**.
163
162
164
-
b. In the **User name**field type `brittasimon@yourcompanydomain.extension`. For example, [email protected]
163
+
1. In the **User name**box, enter **BrittaSimon\@\<yourcompanydomain>.\<extension>**. For example, **BrittaSimon\@contoso.com**.
165
164
166
-
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
165
+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
167
166
168
-
d. Click**Create**.
167
+
1. Select**Create**.
169
168
170
169
### Assign the Azure AD test user
171
170
172
-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to PageDNA.
171
+
In this section, you enable Britta Simon to use Azure single sign-on by granting her access to PageDNA.
173
172
174
-
1. In the Azure portal, select **Enterprise Applications**, select**All applications**, then select**PageDNA**.
173
+
1. In the Azure portal, select **Enterprise applications** >**All applications** >**PageDNA**.
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
191
-
192
-
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
189
+
1. In the **Users and groups** pane, select **Britta Simon** in the **Users** list, and then choose **Select** at the bottom of the pane.
193
190
194
-
7. In the **Add Assignment**dialog click the **Assign** button.
191
+
1. If you're expecting a role value in the SAML assertion, then in the **Select Role**pane, select the appropriate role for the user from the list. At the bottom of the pane, choose **Select**.
195
192
196
-
### Create PageDNA test user
193
+
1. In the **Add Assignment** pane, select **Assign**.
197
194
198
-
In this section, a user called Britta Simon is created in PageDNA. PageDNA supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in PageDNA, a new one is created after authentication.
195
+
### Create a PageDNA test user
199
196
200
-
### Test single sign-on
197
+
A user named Britta Simon is now created in PageDNA. You don't have to do anything to create this user. PageDNA supports just-in-time user provisioning, which is enabled by default. If a user named Britta Simon doesn't already exist in PageDNA, a new one is created after authentication.
201
198
202
-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
199
+
### Test single sign-on
203
200
204
-
When you click the PageDNA tile in the Access Panel, you should be automatically signed in to the PageDNA for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
201
+
In this section, you test your Azure AD single sign-on configuration by using the My Apps portal.
205
202
206
-
## Additional Resources
203
+
When you select **PageDNA** in the My Apps portal, you should be automatically signed in to the PageDNA subscription for which you set up single sign-on. For more information about the My Apps portal, see [Access and use apps on the My Apps portal](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
207
204
208
-
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
205
+
## Additional resources
209
206
210
-
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
207
+
*[List of tutorials for integrating SaaS applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
211
208
212
-
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
209
+
*[Single sign-on to applications in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
213
210
211
+
*[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
0 commit comments