Skip to content

Commit a469949

Browse files
Merge pull request #224989 from v-hgampala/appdynamics
Product Backlog Item 2328700: SaaS App Tutorial: AppDynamics Update
2 parents d51123e + 7e1ae8e commit a469949

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

articles/active-directory/saas-apps/appdynamics-tutorial.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/25/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure Active Directory integration with AppDynamics
@@ -73,14 +73,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7373

7474
4. On the **Basic SAML Configuration** section, perform the following steps:
7575

76-
a. In the **Sign on URL** text box, type a URL using the following pattern:
77-
`https://<companyname>.saas.appdynamics.com?accountName=<companyname>`
78-
79-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
76+
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
8077
`https://<companyname>.saas.appdynamics.com/controller`
8178

79+
b. In the **Reply URL (Assertion Consumer Service URL)** text box, type a URL using the following pattern:
80+
`https://<companyname>.saas.appdynamics.com/controller/saml-auth?accountName=<companyname>`
81+
82+
c. In the **Sign on URL** text box, type a URL using the following pattern:
83+
`https://<companyname>.saas.appdynamics.com/?accountName=<companyname>`
84+
8285
> [!NOTE]
83-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [AppDynamics Client support team](https://www.appdynamics.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
86+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [AppDynamics Client support team](https://www.appdynamics.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8487
8588
4. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
8689

@@ -156,4 +159,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
156159

157160
## Next steps
158161

159-
Once you configure AppDynamics you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
162+
Once you configure AppDynamics you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)