You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/catchpoint-tutorial.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,13 +42,13 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
42
42
43
43
* Catchpoint supports SP-initiated and IDP-initiated SSO.
44
44
* Catchpoint supports just-in-time (JIT) user provisioning.
45
-
* After you configure Catchpoint, you can enforce session control. This procedure protects against exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45
+
* After you configure Catchpoint, you can enforce session control. This precaution protects against exfiltration and infiltration of your organization's sensitive data in real time. Session control is an extension of Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
46
46
47
47
## Add Catchpoint from the gallery
48
48
49
-
To configure the integration of Catchpoint into Azure AD, you need to add Catchpoint to your list of managed SaaS apps.
49
+
To configure the integration of Catchpoint into Azure AD, add Catchpoint to your list of managed SaaS apps.
50
50
51
-
1. Sign in to the [Azure portal](https://portal.azure.com) with a work or school account, or a personal Microsoft account.
51
+
1. Sign in to the [Azure portal](https://portal.azure.com) with a work, school, or personal Microsoft account.
52
52
1. On the left navigation pane, select the **Azure Active Directory** service.
53
53
1. Go to **Enterprise Applications** and then select **All Applications**.
54
54
1. To add a new application, select **New application**.
@@ -57,7 +57,7 @@ To configure the integration of Catchpoint into Azure AD, you need to add Catchp
57
57
58
58
## Configure and test Azure AD single sign-on for Catchpoint
59
59
60
-
For SSO to work, you need to link an Azure AD user with the same user in Catchpoint. For this tutorial, we'll configure a test user called **B.Simon**.
60
+
For SSO to work, you need to link an Azure AD user with a user in Catchpoint. For this tutorial, we'll configure a test user called **B.Simon**.
61
61
62
62
Complete the following sections:
63
63
@@ -72,10 +72,10 @@ Complete the following sections:
72
72
73
73
Follow these steps in the Azure portal to enable Azure AD SSO.
74
74
75
-
1. Sign in to the [Azure portal](https://portal.azure.com/)
75
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
76
76
1. On the **Catchpoint** application integration page, find the **Manage** section and select **single sign-on**.
77
77
1. On the **Select a single sign-on method** page, select **SAML**.
78
-
1. On the **Set Up Single Sign-On with SAML** page, select the edit/pen icon for **Basic SAML Configuration** to edit the settings.
78
+
1. On the **Set Up Single Sign-On with SAML** page, select the pen icon to edit the **Basic SAML Configuration** settings.
@@ -98,7 +98,7 @@ Follow these steps in the Azure portal to enable Azure AD SSO.
98
98
99
99

100
100
101
-
1. Also, the Catchpoint application expects another attribute to be passed in a SAML response. See the following table. This attribute is also pre-populated, but you can review it as per your requirements.
101
+
1. Also, the Catchpoint application expects another attribute to be passed in a SAML response. See the following table. This attribute is also pre-populated, but you can review and update it to fit your requirements.
102
102
103
103
| Name | Source Attribute|
104
104
| ------------ | --------- |
@@ -111,27 +111,27 @@ Follow these steps in the Azure portal to enable Azure AD SSO.
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
127
+
1. Select the **Show password** check box. Note the displayed password value.
128
128
1. Select **Create**.
129
129
130
130
### Assign the Azure AD test user
131
131
132
132
In this section, you enable B.Simon to use Azure single sign-on by granting access to Catchpoint.
133
133
134
-
1. In the Azure portal, select **Enterprise Applications**, and then select**All applications**.
134
+
1. In the Azure portal, select **Enterprise Applications** >**All applications**.
135
135
1. In the applications list, select **Catchpoint**.
136
136
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
137
137
@@ -141,7 +141,7 @@ In this section, you enable B.Simon to use Azure single sign-on by granting acce
141
141
142
142

143
143
144
-
1. In the **Users and groups** dialog box, select **B.Simon** from the Users list, then click**Select** at the bottom of the screen.
144
+
1. In the **Users and groups** dialog box, select **B.Simon** from the users list. Click**Select** at the bottom of the screen.
145
145
1. If you expect a role value in the SAML assertion, look in the **Select Role** dialog box and choose the user's role from the list. Click the **Select** button at the bottom of the screen.
146
146
1. In the **Add Assignment** dialog box, select **Assign**.
147
147
@@ -160,9 +160,9 @@ In this section, you enable B.Simon to use Azure single sign-on by granting acce
160
160
Field | Value
161
161
----- | -----
162
162
**Namespace** | valid namespace value
163
-
**Identity Provider Issuer** | `Azure AD Identifier` from the Azure portal
164
-
**Single Sign On Url** | `Login URL` from the Azure portal
165
-
**Certificate** | Downloaded`Certificate (Base64)` file from the Azure portal. Use Notepad to view and copy.
163
+
**Identity Provider Issuer** | The `Azure AD Identifier` value from the Azure portal
164
+
**Single Sign On Url** | The `Login URL` value from the Azure portal
165
+
**Certificate** | The contents of the downloaded`Certificate (Base64)` file from the Azure portal. Use Notepad to view and copy.
166
166
167
167
You might also upload the **Federation Metadata XML** by selecting the **Upload Metadata** option.
168
168
@@ -176,12 +176,12 @@ Catchpoint supports just-in-time user provisioning, which is enabled by default.
176
176
177
177
In this section, you test your Azure AD single sign-on configuration using the My Apps portal.
178
178
179
-
When you select the Catchpoint tile in the My Apps portal, you should be automatically signed in to the Catchpoint app with SSO set up. For more information about the My Apps portal, see [Sign in and start apps from the My Apps portal](https://docs.microsoft.com/azure/active-directory/user-help/my-apps-portal-end-user-access).
179
+
When you select the Catchpoint tile in the My Apps portal, you should be automatically signed in to the Catchpoint app with SSO configured. For more information about the My Apps portal, see [Sign in and start apps from the My Apps portal](https://docs.microsoft.com/azure/active-directory/user-help/my-apps-portal-end-user-access).
180
180
181
181
> [!NOTE]
182
182
> When you are signed into the Catchpoint application through the login page, after providing **Catchpoint Credentials**, enter the valid **Namespace** value in the **Company Credentials(SSO)** field and select **Login**.
0 commit comments