Skip to content

Commit a460f80

Browse files
committed
update
1 parent f3a4ddb commit a460f80

File tree

1 file changed

+18
-17
lines changed

1 file changed

+18
-17
lines changed

articles/active-directory/saas-apps/float-tutorial.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: jeevansd
77
manager: mtillman
88
ms.reviewer: barbkess
99

10-
ms.assetid: 79066aa5-2978-4aa1-be6f-d10d369f5ca3
10+
ms.assetid: e00cbbcd-2f2a-43f0-bac5-75f5fc34b6fc
1111
ms.service: active-directory
1212
ms.subservice: saas-app-tutorial
1313
ms.workload: identity
@@ -78,32 +78,33 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878

7979
![Edit Basic SAML Configuration](common/edit-urls.png)
8080

81-
1. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file** and wish to configure in **IDP** initiated mode, perform the following steps:
81+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8282

83-
a. Click **Upload metadata file**.
83+
a. In the **Identifier** text box, type any of the following URLs:
8484

85-
![Upload metadata file](common/upload-metadata.png)
85+
| |
86+
|--|
87+
| `https://app.float.com/sso/metadata`|
88+
| `https://app.develop.float.com/sso/metadata`|
8689

87-
b. Click on **folder logo** to select the metadata file and click **Upload**.
90+
b. In the **Reply URL** text box, type a URL using any one of the following patterns:
8891

89-
![choose metadata file](common/browse-upload-metadata.png)
90-
91-
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
92-
93-
![image](common/idp-intiated.png)
94-
95-
> [!Note]
96-
> If the **Identifier** and **Reply URL** values do not get auto polulated, then fill in the values manually according to your requirement.
92+
| |
93+
|--|
94+
| `https://<hostname>.float.com/sso/azuread`|
95+
| `https://<hostname>.develop.float.com/sso/azuread`|
9796

9897
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9998

100-
![image](common/metadata-upload-additional-signon.png)
99+
In the **Sign-on URL** text box, type a URL using any one of the following patterns:
101100

102-
In the **Sign-on URL** text box, type a URL using the following pattern:
103-
`https://<hostname>.float.com/login,https://<hostname>.develop.float.com/login`
101+
| |
102+
|--|
103+
| `https://<hostname>.float.com/login`|
104+
| `https://<hostname>.develop.float.com/login`|
104105

105106
> [!NOTE]
106-
> The Sign-on URL value is not real. Update this value with the actual Sign-on URL. Contact [Float Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
107+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Float Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
107108

108109
1. Float application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
109110

0 commit comments

Comments
 (0)