You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/sketch-tutorial.md
+31-15Lines changed: 31 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 08/22/2022
12
+
ms.date: 09/13/2022
13
13
ms.author: jeedes
14
14
15
15
---
@@ -61,9 +61,27 @@ To configure and test Azure AD SSO with Sketch, perform the following steps:
61
61
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
62
62
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
63
63
1.**[Configure Sketch SSO](#configure-sketch-sso)** - to configure the single sign-on settings on application side.
64
-
1.**[Create Sketch test user](#create-sketch-test-user)** - to have a counterpart of B.Simon in Sketch that is linked to the Azure AD representation of user.
65
64
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
66
65
66
+
## Choose a shortname for your Workspace in Sketch
67
+
68
+
Follow these steps to choose a shortname and gather information to continue the setup process in Azure AD.
69
+
70
+
>[!Note]
71
+
> Before starting this process, make sure SSO is available in your Workspace, check there is an SSO tab in your Workspace Admin panel.
72
+
> If you don't see the SSO tab, please reach out to customer support.
73
+
1.[Sign in to your Workspace](https://www.sketch.com/signin/) as an Admin.
74
+
1. Head to the **People & Settings** section in the sidebar.
75
+
1. Click on the **Single Sign-On** tab.
76
+
1. Click **Choose** a short name.
77
+
1. Enter a unique name, it should have less than 16 characters and can only include letters, numbers or hyphens. You can edit this name later on.
78
+
1. Click **Submit**.
79
+
1. Click on the first tab **Set Up Identity Provider**. In this tab, you’ll find the unique Workspace values you’ll need to set up the integration with Azure AD.
80
+
1.**EntityID:** In Azure AD, this is the `Identifier` field.
81
+
1.**ACS URL:** In Azure AD, this is the `Reply URL` field.
82
+
83
+
Make sure to keep these values at hand! You’ll need them in the next step. Click Copy next to each value to copy it to your clipboard.
84
+
67
85
## Configure Azure AD SSO
68
86
69
87
Follow these steps to enable Azure AD SSO in the Azure portal.
@@ -76,13 +94,13 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
76
94
77
95
1. On the **Basic SAML Configuration** section, perform the following steps:
78
96
79
-
a. In the **Identifier** textbox, type a value using the following pattern:
97
+
a. In the **Identifier** textbox, use the `EntityID` field from the previous step. It looks like:
80
98
`sketch-<uuid_v4>`
81
99
82
-
b. In the **Reply URL** textbox, type a URL using the following pattern:
100
+
b. In the **Reply URL** textbox, use the `ACS URL` field from the previous step. It looks like:
83
101
`https://sso.sketch.com/saml/acs?id=<uuid_v4>`
84
102
85
-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
103
+
1. Click **Set additional URLs** and perform the following step:
86
104
87
105
In the **Sign-on URL** text box, type the URL:
88
106
`https://www.sketch.com`
@@ -104,11 +122,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
104
122
105
123
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
106
124
107
-

108
-
109
-
1. On the **Set up Sketch** section, copy the appropriate URL(s) based on your requirement.
110
-
111
-

125
+

112
126
113
127
### Create an Azure AD test user
114
128
@@ -136,11 +150,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
136
150
137
151
## Configure Sketch SSO
138
152
139
-
To configure single sign-on on **Sketch** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Sketch support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
140
-
141
-
### Create Sketch test user
153
+
Follow these steps to finish the configuration in Sketch.
142
154
143
-
In this section, a user called B.Simon is created in Sketch. Sketch supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Sketch, a new one is created after authentication.
155
+
1. In your Workspace, head to the **Set up Sketch** tab in the **Single Sign-On** window.
156
+
1. Upload the XML file you downloaded previously in the **Import XML Metadata file** section.
157
+
1. Log out.
158
+
1. Click **Sign in with SSO**.
159
+
1. Use the shortname you configured previously to proceed.
144
160
145
161
## Test SSO
146
162
@@ -154,4 +170,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
154
170
155
171
## Next steps
156
172
157
-
Once you configure Sketch you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
173
+
Once you configure Sketch you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
0 commit comments