You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/boomi-tutorial.md
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 02/25/2021
12
+
ms.date: 11/14/2022
13
13
ms.author: jeedes
14
14
---
15
15
@@ -134,23 +134,25 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
134
134
135
135
1. In a different web browser window, sign in to your Boomi company site as an administrator.
136
136
137
-
1. Navigate to **Company Name** and go to **Set up**.
138
-
139
-
1. Click the **SSO Options** tab and perform below steps.
137
+
1. Go to the **Settings**, click the **SSO Options** in the security options and perform the below steps.
140
138
141
139

142
140
143
-
a. Check **Enable SAML Single Sign-On** checkbox.
141
+
a. Select **Enabled** in **Enable SAML Single Sign-On**.
144
142
145
143
b. Click **Import** to upload the downloaded certificate from Azure AD to **Identity Provider Certificate**.
146
144
147
-
c. In the **Identity Provider Login URL** textbox, put the value of **Login URL** from Azure AD application configuration window.
145
+
c. In the **Identity Provider Sign In URL** textbox, paste the value of **Login URL** from Azure AD application configuration window.
148
146
149
147
d. For **Federation Id Location**, select the **Federation Id is in FEDERATION_ID Attribute element** radio button.
150
148
151
-
e. Copy the **AtomSphere MetaData URL**, go to the **MetaData URL** via the browser of your choice, and save the output to a file. Upload the **MetaData URL** in the **Basic SAML Configuration** section in the Azure portal.
149
+
e. For **SAML Authentication Context**, select the **Password Protected Transport** radio button.
150
+
151
+
f. Copy the **AtomSphere Sign In URL**, paste this value into the **Sign on URL** text box in the **Basic SAML Configuration** section in the Azure portal.
152
+
153
+
g. Copy the **AtomSphere MetaData URL**, go to the **MetaData URL** via the browser of your choice, and save the output to a file. Upload the **MetaData URL** in the **Basic SAML Configuration** section in the Azure portal.
152
154
153
-
f. Click **Save** button.
155
+
h. Click **Save** button.
154
156
155
157
### Create Boomi test user
156
158
@@ -160,16 +162,12 @@ In order to enable Azure AD users to sign in to Boomi, they must be provisioned
160
162
161
163
1. Sign in to your Boomi company site as an administrator.
162
164
163
-
1. After logging in, navigate to **User Management** and go to **Users**.
164
-
165
-

165
+
1. After logging in, navigate to **User Management** ->**Users**.
166
166
167
167
1. Click **+** icon and the **Add/Maintain User Roles** dialog opens.
168
168
169
169

170
170
171
-

172
-
173
171
a. In the **User e-mail address** textbox, type the email of user like [email protected].
174
172
175
173
b. In the **First name** textbox, type the First name of user like B.
0 commit comments