Skip to content

Commit 9a9b406

Browse files
committed
Product Backlog Item 739684: SaaS App Tutorial: ExpenseIn One Click SSO Update
1 parent 9f068e9 commit 9a9b406

File tree

2 files changed

+18
-8
lines changed

2 files changed

+18
-8
lines changed

articles/active-directory/saas-apps/expensein-tutorial.md

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 05/31/2019
17+
ms.date: 06/10/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
@@ -99,25 +99,35 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9999

100100
### Configure ExpenseIn
101101

102-
1. In a different web browser window, sign in to ExpenseIn as an Administrator.
102+
1. To automate the configuration within ExpenseIn, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
103103

104-
2. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
104+
![My apps extension](common/install-myappssecure-extension.png)
105+
106+
2. After adding extension to the browser, click on **Setup ExpenseIn** will direct you to the ExpenseIn application. From there, provide the admin credentials to sign into ExpenseIn. The browser extension will automatically configure the application for you and automate steps 3-5.
107+
108+
![Setup configuration](common/setup-sso.png)
109+
110+
3. If you want to setup ExpenseIn manually, open a new web browser window and sign into your ExpenseIn company site as an administrator and perform the following steps:
111+
112+
4. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
105113

106114
![ExpenseIn configuration](./media/expenseIn-tutorial/config01.png)
107115

108-
3. On the **New Identity Provider** pop-up, Perform the following steps:
116+
5. On the **New Identity Provider** pop-up, Perform the following steps:
109117

110118
![ExpenseIn configuration](./media/expenseIn-tutorial/config02.png)
111119

112120
a. In the **Provider Name** text box, type the name like ex:Azure.
113121

114-
b. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
122+
b. Select **Yes** as **Allow Provider Intitated Sign-On**.
123+
124+
c. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
115125

116-
c. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
126+
d. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
117127

118-
d. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
128+
e. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
119129

120-
e. Click **Create**.
130+
f. Click **Create**.
121131

122132
### Create an Azure AD test user
123133

6.77 KB
Loading

0 commit comments

Comments
 (0)