Skip to content

Commit 95912ad

Browse files
committed
Update securetransport-tutorial.md
1 parent 3767ad9 commit 95912ad

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/active-directory/saas-apps/securetransport-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,29 +64,29 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6464

6565
a. In the **Identifier** textbox, type one of the following URLs:
6666

67-
| Usertype | URL |
67+
| User type | URL |
6868
|----------|----------|
6969
| Admin | `st.sso.admin`|
7070
| Enduser | `st.sso.enduser` |
7171

7272
b. In the **Reply URL** textbox, type a URL using one of the following patterns:
7373

74-
| Usertype | URL |
74+
| User type | URL |
7575
|----------|----------|
7676
| Admin | `https://<SecureTransport_Address>:<PORT>/saml2/sso/post/j_security_check`|
7777
| Enduser | `https://<SecureTransport_Address>:<PORT>/saml2/sso/post` |
7878

7979
c. In the **Sign on URL** textbox, type a URL using one of the following patterns:
8080

81-
| Usertype | URL |
81+
| User type | URL |
8282
|----------|----------|
8383
| Admin | `https://<SecureTransport_Address>:<PORT>` |
8484
| Enduser | `https://<SecureTransport_Address>:<PORT>` |
8585

8686
> [!NOTE]
8787
> These values are not real. Update these values with the actual Reply URL and Sign on URL. Contact [SecureTransport Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8888
89-
1. Your SecureTransport application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but SecureTransport expects this to be mapped with the user's displayname. For that you can use **user.displayname** attribute from the list or use the appropriate attribute value based on your organization configuration.
89+
1. Your SecureTransport application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but SecureTransport expects this to be mapped with the user's display name. For that you can use **user.displayname** attribute from the list or use the appropriate attribute value based on your organization configuration.
9090

9191
![Screenshot shows the image of token attributes configuration.](common/default-attributes.png "Image")
9292

0 commit comments

Comments
 (0)