Skip to content

Commit ba330c1

Browse files
Merge pull request #227568 from v-hgampala/anaplan
Product Backlog Item 2416538: SaaS App Tutorial: Anaplan Update
2 parents 49f0bb6 + d12d0b3 commit ba330c1

File tree

1 file changed

+57
-55
lines changed

1 file changed

+57
-55
lines changed

articles/active-directory/saas-apps/anaplan-tutorial.md

Lines changed: 57 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 02/16/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Anaplan
@@ -65,28 +65,70 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6565

6666
1. In the Azure portal, on the **Anaplan** application integration page, find the **Manage** section and select **single sign-on**.
6767
1. On the **Select a single sign-on method** page, select **SAML**.
68+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click the copy icon to copy the **App Federation Metadata URL** and save this to use in the Anaplan SSO configuration.
69+
70+
![The Certificate download link.](common/copy-metadataurl.png)
71+
72+
## Configure Anaplan SSO
73+
74+
1. Log in to Anaplan website as an administrator.
75+
76+
1. In the Administration page, navigate to **Security > Single Sign-On**.
77+
78+
1. Click **New**.
79+
80+
1. Perform the following steps in the **Metadata** tab:
81+
82+
![Screenshot for the security page.](./media/anaplan-tutorial/security.png)
83+
84+
a. Enter a **Connection Name**, should match the name of your connection in the identity provider interface.
85+
86+
b. Select **Load from XML file** and paste the App Federation Metadata URL you copied from Azure portal into the **Metadata URL** textbox.
87+
88+
c. Click **Save** to create the connection.
89+
90+
d. Enable the connection by setting the **Enabled** toggle.
91+
92+
1. From the **Config** tab, copy the following values to save them back to the Azure portal:
93+
94+
a. **Service Provider URL**.
95+
b. **Assertion Consumer Service URL**.
96+
c. **Entity ID**.
97+
98+
### Complete the Azure AD SSO Configuration
99+
68100
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
69101

70-
![Edit Basic SAML Configuration](common/edit-urls.png)
102+
![Edit Basic SAML Configuration.](common/edit-urls.png)
71103

72-
4. On the **Basic SAML Configuration** section, perform the following steps:
104+
1. On the **Basic SAML Configuration** section, perform the following steps:
73105

74-
a. In the **Sign on URL** text box, type a URL using the following pattern:
75-
`https://sdp.anaplan.com/frontdoor/saml/<tenant name>`
106+
a. In the **Identifier (Entity ID)** text box, paste the Entity ID that you copied from above, in the format:
107+
`https://sdp.anaplan.com/<optional extension>`
76108

77-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
78-
`https://<subdomain>.anaplan.com`
109+
b. In the **Sign on URL** text box, paste the Service Provider URL that you copied from above, in the format:
110+
`https://us1a.app.anaplan.com/samlsp/<connection name>`
111+
112+
c. In the **Reply URL (Assertion Consumer Service URL)** text box, paste the Assertion Consumer Service URL that you copied from above, in the format:
113+
`https://us1a.app.anaplan.com/samlsp/login/callback?connection=<connection name>`
79114

80-
> [!NOTE]
81-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Anaplan Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
115+
### Complete the Anaplan SSO Configuration
116+
117+
1. Perform the following steps in the **Advanced** tab:
118+
119+
![Screenshot for the Advanced page.](./media/anaplan-tutorial/advanced.png)
120+
121+
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
82122

83-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
123+
b. Click **Save**.
84124

85-
![The Certificate download link](common/metadataxml.png)
125+
1. In the **Workspaces** tab, specify the workspaces that will use the identity provider from the dropdown and Click **Save**.
86126

87-
6. On the **Set up Anaplan** section, copy the appropriate URL(s) as per your requirement.
127+
![Screenshot for the Workspaces page.](./media/anaplan-tutorial/workspaces.png)
88128

89-
![Copy configuration URLs](common/copy-configuration-urls.png)
129+
> [!NOTE]
130+
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
131+
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
90132

91133
### Create an Azure AD test user
92134

@@ -112,49 +154,9 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
112154
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
113155
1. In the **Add Assignment** dialog, click the **Assign** button.
114156

115-
## Configure Anaplan SSO
116-
117-
1. Login to Anaplan website as an administrator.
118-
119-
1. In Administration page, navigate to **Security > Single Sign-On**.
120-
121-
1. Click **New**.
122-
123-
1. Perform the following steps in the **Metadata** tab:
124-
125-
![Screenshot for the security page](./media/anaplan-tutorial/security.png)
126-
127-
a. Enter a **Connection Name**, should match the name of your connection in the identity provider interface.
128-
129-
b. Select **Load from XML file** and enter the URL of the metadata XML file with your configuration information in the **Metadata URL** textbox.
130-
131-
C. Enabled the **Signed** toggle.
132-
133-
d. Click **Save** to create the connection.
134-
135-
1. When you upload a **metadata XML** file in the **Metadata** tab, the values in **Config** tab pre-populate with the information from that upload. You can skip this tab in your connection setup and click **Save**.
136-
137-
![Screenshot for the configuration page](./media/anaplan-tutorial/configuration.png)
138-
139-
1. Perform the following steps in the **Advanced** tab:
140-
141-
![Screenshot for the Advanced page](./media/anaplan-tutorial/advanced.png)
142-
143-
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
144-
145-
b. Click **Save**.
146-
147-
1. In the **Workspaces** tab, specify the workspaces that will use the identity provider from the dropdown and Click **Save**.
148-
149-
![Screenshot for the Workspaces page](./media/anaplan-tutorial/Workspaces.png)
150-
151-
> [!NOTE]
152-
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
153-
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
154-
155157
### Create Anaplan test user
156158

157-
In this section, you create a user called Britta Simon in Anaplan. Work with [Anaplan support team](mailto:[email protected]) to add the users in the Anaplan platform. Users must be created and activated before you use single sign-on.
159+
In this section, you create a user called Britta Simon in Anaplan. Work with [Anaplan support team](mailto:[email protected]) to add the users in the Anaplan platform. Users must be created and activated before you use single sign-on.
158160

159161
## Test SSO
160162

@@ -168,4 +170,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
168170

169171
## Next steps
170172

171-
Once you configure Anaplan you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
173+
Once you configure Anaplan you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)