Skip to content

Commit 8f7b2c0

Browse files
committed
update
1 parent fed074b commit 8f7b2c0

File tree

1 file changed

+1
-5
lines changed

1 file changed

+1
-5
lines changed

articles/active-directory/saas-apps/e-days-tutorial.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8686
`https://<SUBDOMAIN>.e-days.com`
8787

8888
b. In the **Reply URL** text box, type a URL using the following pattern:
89-
89+
9090
`https://<SUBDOMAIN>.e-days.com/SSO/SAML2/SP/AssertionConsumer.aspx`
9191

9292
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
@@ -98,10 +98,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9898
> [!NOTE]
9999
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [E-days Client support team](https://support.e-days.com) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
100100

101-
1. E-days application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
102-
103-
![image](common/default-attributes.png)
104-
105101
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
106102

107103
![The Certificate download link](common/metadataxml.png)

0 commit comments

Comments
 (0)