Skip to content

Commit 99ac45e

Browse files
authored
Merge pull request #210984 from v-hgampala/sketch-update
Product Backlog Item 2071107: SaaS App Tutorial: Sketch Update
2 parents bc8dfd5 + b99830d commit 99ac45e

File tree

1 file changed

+31
-15
lines changed

1 file changed

+31
-15
lines changed

articles/active-directory/saas-apps/sketch-tutorial.md

Lines changed: 31 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 08/22/2022
12+
ms.date: 09/13/2022
1313
ms.author: jeedes
1414

1515
---
@@ -61,9 +61,27 @@ To configure and test Azure AD SSO with Sketch, perform the following steps:
6161
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
6262
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
6363
1. **[Configure Sketch SSO](#configure-sketch-sso)** - to configure the single sign-on settings on application side.
64-
1. **[Create Sketch test user](#create-sketch-test-user)** - to have a counterpart of B.Simon in Sketch that is linked to the Azure AD representation of user.
6564
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6665

66+
## Choose a shortname for your Workspace in Sketch
67+
68+
Follow these steps to choose a shortname and gather information to continue the setup process in Azure AD.
69+
70+
>[!Note]
71+
> Before starting this process, make sure SSO is available in your Workspace, check there is an SSO tab in your Workspace Admin panel.
72+
> If you don't see the SSO tab, please reach out to customer support.
73+
1. [Sign in to your Workspace](https://www.sketch.com/signin/) as an Admin.
74+
1. Head to the **People & Settings** section in the sidebar.
75+
1. Click on the **Single Sign-On** tab.
76+
1. Click **Choose** a short name.
77+
1. Enter a unique name, it should have less than 16 characters and can only include letters, numbers or hyphens. You can edit this name later on.
78+
1. Click **Submit**.
79+
1. Click on the first tab **Set Up Identity Provider**. In this tab, you’ll find the unique Workspace values you’ll need to set up the integration with Azure AD.
80+
1. **EntityID:** In Azure AD, this is the `Identifier` field.
81+
1. **ACS URL:** In Azure AD, this is the `Reply URL` field.
82+
83+
Make sure to keep these values at hand! You’ll need them in the next step. Click Copy next to each value to copy it to your clipboard.
84+
6785
## Configure Azure AD SSO
6886

6987
Follow these steps to enable Azure AD SSO in the Azure portal.
@@ -76,13 +94,13 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7694

7795
1. On the **Basic SAML Configuration** section, perform the following steps:
7896

79-
a. In the **Identifier** textbox, type a value using the following pattern:
97+
a. In the **Identifier** textbox, use the `EntityID` field from the previous step. It looks like:
8098
`sketch-<uuid_v4>`
8199

82-
b. In the **Reply URL** textbox, type a URL using the following pattern:
100+
b. In the **Reply URL** textbox, use the `ACS URL` field from the previous step. It looks like:
83101
`https://sso.sketch.com/saml/acs?id=<uuid_v4>`
84102

85-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
103+
1. Click **Set additional URLs** and perform the following step:
86104

87105
In the **Sign-on URL** text box, type the URL:
88106
`https://www.sketch.com`
@@ -104,11 +122,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
104122

105123
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
106124

107-
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
108-
109-
1. On the **Set up Sketch** section, copy the appropriate URL(s) based on your requirement.
110-
111-
![Screenshot shows how to copy configuration appropriate URL.](common/copy-configuration-urls.png "Metadata")
125+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
112126

113127
### Create an Azure AD test user
114128

@@ -136,11 +150,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
136150

137151
## Configure Sketch SSO
138152

139-
To configure single sign-on on **Sketch** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Sketch support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
140-
141-
### Create Sketch test user
153+
Follow these steps to finish the configuration in Sketch.
142154

143-
In this section, a user called B.Simon is created in Sketch. Sketch supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Sketch, a new one is created after authentication.
155+
1. In your Workspace, head to the **Set up Sketch** tab in the **Single Sign-On** window.
156+
1. Upload the XML file you downloaded previously in the **Import XML Metadata file** section.
157+
1. Log out.
158+
1. Click **Sign in with SSO**.
159+
1. Use the shortname you configured previously to proceed.
144160

145161
## Test SSO
146162

@@ -154,4 +170,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
154170

155171
## Next steps
156172

157-
Once you configure Sketch you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
173+
Once you configure Sketch you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)