Skip to content

Commit a4c276b

Browse files
committed
update
1 parent 0ac11f9 commit a4c276b

File tree

1 file changed

+2
-8
lines changed

1 file changed

+2
-8
lines changed

articles/active-directory/saas-apps/fortes-change-cloud-tutorial.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -94,15 +94,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9494
> [!NOTE]
9595
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Fortes Change Cloud Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9696

97-
1. Fortes Change Cloud application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
97+
1. Fortes Change Cloud application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes, where as **nameidentifier** is mapped with **user.userprincipalname**. Fortes Change Cloud application expects **nameidentifier** to be mapped with **user.samaccountname**, so you need to edit the attribute mapping by clicking on **Edit** icon and change the attribute mapping.
9898

99-
![image](common/default-attributes.png)
100-
101-
1. In addition to above, Fortes Change Cloud application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
102-
103-
| Name | | Source Attribute|
104-
| ---------------| --------------- | --------- |
105-
| NameID | | user.samaccountname |
99+
![image](common/edit-attribute.png)
106100

107101
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
108102

0 commit comments

Comments
 (0)