Skip to content

Commit a7e4fce

Browse files
committed
Product Backlog Item 2039038: SaaS App Tutorial: Embark Update
1 parent f88331e commit a7e4fce

File tree

1 file changed

+27
-9
lines changed

1 file changed

+27
-9
lines changed

articles/active-directory/saas-apps/embark-tutorial.md

Lines changed: 27 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 02/11/2022
12+
ms.date: 08/23/2022
1313
ms.author: jeedes
1414

1515
---
@@ -33,7 +33,7 @@ To get started, you need the following items:
3333

3434
In this tutorial, you configure and test Azure AD SSO in a test environment.
3535

36-
* Embark supports **SP** initiated SSO.
36+
* Embark supports **SP and IDP** initiated SSO.
3737

3838
> [!NOTE]
3939
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
@@ -75,16 +75,27 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7575

7676
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
7777

78-
In the **Sign on URL** text box, type a URL using the following pattern:
79-
`https://<ENVIRONMENT>.ehr.com/microsoftbenefits`
78+
a. In the **Identifier** text box, type a URL using the following pattern:
79+
`https://<ENVIRONMENT>.ehr.com`
80+
81+
b. In the **Reply URL** text box, type a URL using the following pattern:
82+
`https://<ENVIRONMENT>.ehr.com`
83+
84+
c. In the **Sign on URL** text box, type a URL using the following pattern:
85+
`https://<ENVIRONMENT>.ehr.com`
8086

8187
> [!NOTE]
82-
> The Sign on URL value is not real. Update the value with the actual Sign on URL. Contact [Embark support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
88+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Embark support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8389

84-
1. Your Embark application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Embark expects this to be mapped with the user's employee id. For that you can use **user.employeeid** attribute from the list or use the appropriate attribute value based on your organization configuration..
90+
1. Your Embark application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Embark expects this to be mapped with the user's employee id. For that you can use **user.employeeid** attribute from the list or use the appropriate attribute value based on your organization configuration.
8591

8692
![image](common/default-attributes.png)
8793

94+
1. In addition to above, Embark platform application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
95+
96+
| Name | Source Attribute|
97+
| --------| --------- |
98+
| EmployeeID | user.employeeid |
8899

89100
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
90101

@@ -126,11 +137,18 @@ In this section, you create a user called Britta Simon in Embark. Work with [Em
126137

127138
In this section, you test your Azure AD single sign-on configuration with following options.
128139

129-
* Click on **Test this application** in Azure portal. This will redirect to Embark Sign-on URL where you can initiate the login flow.
140+
#### SP initiated:
141+
142+
* Click on **Test this application** in Azure portal. This will redirect to Embark platform Sign on URL where you can initiate the login flow.
143+
144+
* Go to Embark platform Sign-on URL directly and initiate the login flow from there.
145+
146+
#### IDP initiated:
147+
148+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Embark platform for which you set up the SSO.
130149

131-
* Go to Embark Sign-on URL directly and initiate the login flow from there.
150+
You can also use Microsoft My Apps to test the application in any mode. When you click the Embark platform tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Embark platform for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
132151

133-
* You can use Microsoft My Apps. When you click the Embark tile in the My Apps, this will redirect to Embark Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
134152

135153
## Next steps
136154

0 commit comments

Comments
 (0)