Skip to content

Commit 9b7278d

Browse files
committed
Product Backlog Item 1765896: SaaS App Tutorial: AppRemo
1 parent c6b63e2 commit 9b7278d

File tree

2 files changed

+150
-0
lines changed

2 files changed

+150
-0
lines changed
Lines changed: 148 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,148 @@
1+
---
2+
title: 'Tutorial: Azure AD SSO integration with AppRemo'
3+
description: Learn how to configure single sign-on between Azure Active Directory and AppRemo.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: tutorial
12+
ms.date: 02/11/2022
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Tutorial: Azure AD SSO integration with AppRemo
18+
19+
In this tutorial, you'll learn how to integrate AppRemo with Azure Active Directory (Azure AD). When you integrate AppRemo with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to AppRemo.
22+
* Enable your users to be automatically signed-in to AppRemo with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
## Prerequisites
26+
27+
To get started, you need the following items:
28+
29+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* AppRemo single sign-on (SSO) enabled subscription.
31+
32+
## Scenario description
33+
34+
In this tutorial, you configure and test Azure AD SSO in a test environment.
35+
36+
* AppRemo supports **SP** initiated SSO.
37+
38+
> [!NOTE]
39+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
40+
41+
## Adding AppRemo from the gallery
42+
43+
To configure the integration of AppRemo into Azure AD, you need to add AppRemo from the gallery to your list of managed SaaS apps.
44+
45+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
46+
1. On the left navigation pane, select the **Azure Active Directory** service.
47+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
48+
1. To add new application, select **New application**.
49+
1. In the **Add from the gallery** section, type **AppRemo** in the search box.
50+
1. Select **AppRemo** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
51+
52+
53+
## Configure and test Azure AD SSO for AppRemo
54+
55+
Configure and test Azure AD SSO with AppRemo using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in AppRemo.
56+
57+
To configure and test Azure AD SSO with AppRemo, perform the following steps:
58+
59+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
60+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
61+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
62+
1. **[Configure AppRemo SSO](#configure-appremo-sso)** - to configure the single sign-on settings on application side.
63+
1. **[Create AppRemo test user](#create-appremo-test-user)** - to have a counterpart of B.Simon in AppRemo that is linked to the Azure AD representation of user.
64+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
65+
66+
## Configure Azure AD SSO
67+
68+
Follow these steps to enable Azure AD SSO in the Azure portal.
69+
70+
1. In the Azure portal, on the **AppRemo** application integration page, find the **Manage** section and select **single sign-on**.
71+
1. On the **Select a single sign-on method** page, select **SAML**.
72+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
73+
74+
![Edit Basic SAML Configuration](common/edit-urls.png)
75+
76+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
77+
78+
a. In the **Sign on URL** text box, type the URL:
79+
`https://ardm-systemexe.exexwf.com/wf`
80+
81+
b. In the **Reply URL** text box, type a URL using the following pattern:
82+
83+
| Reply URL |
84+
|------------|
85+
| `https://<ENVIRONMENT>.exexwf.com/auth/saml`|
86+
| `https://<ENVIRONMENT>.appremo.jp/auth/saml`|
87+
| `https://<ENVIRONMENT>.fr.appremo.jp/auth/saml`|
88+
| `https://<ENVIRONMENT>.mlt.appremo.jp/auth/saml`|
89+
|
90+
91+
> [!NOTE]
92+
> These values are not real. Update these values with the actual Sign on URL and Reply URL. Contact [AppRemo Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
93+
94+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
95+
96+
![The Certificate download link](common/certificatebase64.png)
97+
98+
1. On the **Set up AppRemo** section, copy the appropriate URL(s) based on your requirement.
99+
100+
![Copy configuration URLs](common/copy-configuration-urls.png)
101+
### Create an Azure AD test user
102+
103+
In this section, you'll create a test user in the Azure portal called B.Simon.
104+
105+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
106+
1. Select **New user** at the top of the screen.
107+
1. In the **User** properties, follow these steps:
108+
1. In the **Name** field, enter `B.Simon`.
109+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
110+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
111+
1. Click **Create**.
112+
113+
### Assign the Azure AD test user
114+
115+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to AppRemo.
116+
117+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
118+
1. In the applications list, select **AppRemo**.
119+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
120+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
121+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
122+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
123+
1. In the **Add Assignment** dialog, click the **Assign** button.
124+
125+
## Configure AppRemo SSO
126+
127+
To configure single sign-on on **AppRemo** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [AppRemo support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
128+
129+
### Create AppRemo test user
130+
131+
In this section, you create a user called Britta Simon in AppRemo. Work with [AppRemo support team](mailto:[email protected]) to add the users in the AppRemo platform. Users must be created and activated before you use single sign-on.
132+
133+
## Test SSO
134+
135+
In this section, you test your Azure AD single sign-on configuration with following options.
136+
137+
* Click on **Test this application** in Azure portal. This will redirect to AppRemo Sign-on URL where you can initiate the login flow.
138+
139+
* Go to AppRemo Sign-on URL directly and initiate the login flow from there.
140+
141+
* You can use Microsoft My Apps. When you click the AppRemo tile in the My Apps, this will redirect to AppRemo Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
142+
143+
144+
## Next steps
145+
146+
Once you configure AppRemo you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
147+
148+

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,8 @@
151151
href: appneta-tutorial.md
152152
- name: Appraisd
153153
href: appraisd-tutorial.md
154+
- name: AppRemo
155+
href: appremo-tutorial.md
154156
- name: AppSec Flow SSO
155157
href: appsec-flow-sso-tutorial.md
156158
- name: Apptio

0 commit comments

Comments
 (0)