You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/anaplan-tutorial.md
+57-55Lines changed: 57 additions & 55 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 11/21/2022
12
+
ms.date: 02/16/2023
13
13
ms.author: jeedes
14
14
---
15
15
# Tutorial: Azure AD SSO integration with Anaplan
@@ -65,28 +65,70 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
65
65
66
66
1. In the Azure portal, on the **Anaplan** application integration page, find the **Manage** section and select **single sign-on**.
67
67
1. On the **Select a single sign-on method** page, select **SAML**.
68
+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click the copy icon to copy the **App Federation Metadata URL** and save this to use in the Anaplan SSO configuration.
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Anaplan Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
115
+
### Complete the Anaplan SSO Configuration
116
+
117
+
1. Perform the following steps in the **Advanced** tab:
118
+
119
+

120
+
121
+
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
82
122
83
-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
131
+
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
90
132
91
133
### Create an Azure AD test user
92
134
@@ -112,49 +154,9 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
112
154
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
113
155
1. In the **Add Assignment** dialog, click the **Assign** button.
114
156
115
-
## Configure Anaplan SSO
116
-
117
-
1. Login to Anaplan website as an administrator.
118
-
119
-
1. In Administration page, navigate to **Security > Single Sign-On**.
120
-
121
-
1. Click **New**.
122
-
123
-
1. Perform the following steps in the **Metadata** tab:
124
-
125
-

126
-
127
-
a. Enter a **Connection Name**, should match the name of your connection in the identity provider interface.
128
-
129
-
b. Select **Load from XML file** and enter the URL of the metadata XML file with your configuration information in the **Metadata URL** textbox.
130
-
131
-
C. Enabled the **Signed** toggle.
132
-
133
-
d. Click **Save** to create the connection.
134
-
135
-
1. When you upload a **metadata XML** file in the **Metadata** tab, the values in **Config** tab pre-populate with the information from that upload. You can skip this tab in your connection setup and click **Save**.
136
-
137
-

138
-
139
-
1. Perform the following steps in the **Advanced** tab:
140
-
141
-

142
-
143
-
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
144
-
145
-
b. Click **Save**.
146
-
147
-
1. In the **Workspaces** tab, specify the workspaces that will use the identity provider from the dropdown and Click **Save**.
148
-
149
-

150
-
151
-
> [!NOTE]
152
-
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
153
-
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
154
-
155
157
### Create Anaplan test user
156
158
157
-
In this section, you create a user called Britta Simon in Anaplan. Work with[Anaplan support team](mailto:[email protected]) to add the users in the Anaplan platform. Users must be created and activated before you use single sign-on.
159
+
In this section, you create a user called Britta Simon in Anaplan. Work with[Anaplan support team](mailto:[email protected]) to add the users in the Anaplan platform. Users must be created and activated before you use single sign-on.
158
160
159
161
## Test SSO
160
162
@@ -168,4 +170,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
168
170
169
171
## Next steps
170
172
171
-
Once you configure Anaplan you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
173
+
Once you configure Anaplan you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments