Skip to content

Commit bfb3431

Browse files
authored
Merge pull request #102490 from v-hagamp/tanner
update for oc-tanner
2 parents 45cc5ad + 5e812db commit bfb3431

File tree

1 file changed

+69
-122
lines changed

1 file changed

+69
-122
lines changed

articles/active-directory/saas-apps/oc-tanner-tutorial.md

Lines changed: 69 additions & 122 deletions
Original file line numberDiff line numberDiff line change
@@ -12,116 +12,77 @@ ms.service: active-directory
1212
ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
15-
ms.devlang: na
1615
ms.topic: tutorial
17-
ms.date: 03/27/2019
16+
ms.date: 01/28/2020
1817
ms.author: jeedes
1918

2019
---
21-
# Tutorial: Azure Active Directory integration with O.C. Tanner - AppreciateHub
20+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with O.C. Tanner - AppreciateHub
2221

23-
In this tutorial, you learn how to integrate O.C. Tanner - AppreciateHub with Azure Active Directory (Azure AD).
24-
Integrating O.C. Tanner - AppreciateHub with Azure AD provides you with the following benefits:
22+
In this tutorial, you'll learn how to integrate O.C. Tanner - AppreciateHub with Azure Active Directory (Azure AD). When you integrate O.C. Tanner - AppreciateHub with Azure AD, you can:
2523

26-
* You can control in Azure AD who has access to O.C. Tanner - AppreciateHub.
27-
* You can enable your users to be automatically signed-in to O.C. Tanner - AppreciateHub (Single Sign-On) with their Azure AD accounts.
28-
* You can manage your accounts in one central location - the Azure portal.
24+
* Control in Azure AD who has access to O.C. Tanner - AppreciateHub.
25+
* Enable your users to be automatically signed-in to O.C. Tanner - AppreciateHub with their Azure AD accounts.
26+
* Manage your accounts in one central location - the Azure portal.
2927

30-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
31-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
28+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
3229

3330
## Prerequisites
3431

35-
To configure Azure AD integration with O.C. Tanner - AppreciateHub, you need the following items:
32+
To get started, you need the following items:
3633

37-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get one-month trial [here](https://azure.microsoft.com/pricing/free-trial/)
38-
* O.C. Tanner - AppreciateHub single sign-on enabled subscription
34+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
35+
* O.C. Tanner - AppreciateHub single sign-on (SSO) enabled subscription.
3936

4037
## Scenario description
4138

42-
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
39+
In this tutorial, you configure and test Azure AD SSO in a test environment.
4340

4441
* O.C. Tanner - AppreciateHub supports **IDP** initiated SSO
4542

43+
* Once you configure the O.C. Tanner - AppreciateHub you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
44+
4645
## Adding O.C. Tanner - AppreciateHub from the gallery
4746

4847
To configure the integration of O.C. Tanner - AppreciateHub into Azure AD, you need to add O.C. Tanner - AppreciateHub from the gallery to your list of managed SaaS apps.
4948

50-
**To add O.C. Tanner - AppreciateHub from the gallery, perform the following steps:**
51-
52-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
53-
54-
![The Azure Active Directory button](common/select-azuread.png)
55-
56-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
57-
58-
![The Enterprise applications blade](common/enterprise-applications.png)
59-
60-
3. To add new application, click **New application** button on the top of dialog.
61-
62-
![The New application button](common/add-new-app.png)
63-
64-
4. In the search box, type **O.C. Tanner - AppreciateHub**, select **O.C. Tanner - AppreciateHub** from result panel then click **Add** button to add the application.
65-
66-
![O.C. Tanner - AppreciateHub in the results list](common/search-new-app.png)
67-
68-
## Configure and test Azure AD single sign-on
69-
70-
In this section, you configure and test Azure AD single sign-on with O.C. Tanner - AppreciateHub based on a test user called **Britta Simon**.
71-
For single sign-on to work, a link relationship between an Azure AD user and the related user in O.C. Tanner - AppreciateHub needs to be established.
72-
73-
To configure and test Azure AD single sign-on with O.C. Tanner - AppreciateHub, you need to complete the following building blocks:
74-
75-
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
76-
2. **[Configure O.C. Tanner - AppreciateHub Single Sign-On](#configure-oc-tanner---appreciatehub-single-sign-on)** - to configure the Single Sign-On settings on application side.
77-
3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
78-
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
79-
5. **[Create O.C. Tanner - AppreciateHub test user](#create-oc-tanner---appreciatehub-test-user)** - to have a counterpart of Britta Simon in O.C. Tanner - AppreciateHub that is linked to the Azure AD representation of user.
80-
6. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
81-
82-
### Configure Azure AD single sign-on
83-
84-
In this section, you enable Azure AD single sign-on in the Azure portal.
85-
86-
To configure Azure AD single sign-on with O.C. Tanner - AppreciateHub, perform the following steps:
87-
88-
1. In the [Azure portal](https://portal.azure.com/), on the **O.C. Tanner - AppreciateHub** application integration page, select **Single sign-on**.
89-
90-
![Configure single sign-on link](common/select-sso.png)
91-
92-
2. On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
93-
94-
![Single sign-on select mode](common/select-saml-option.png)
95-
96-
3. On the **Set up Single Sign-On with SAML** page, click **Edit** icon to open **Basic SAML Configuration** dialog.
49+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
50+
1. On the left navigation pane, select the **Azure Active Directory** service.
51+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
52+
1. To add new application, select **New application**.
53+
1. In the **Add from the gallery** section, type **O.C. Tanner - AppreciateHub** in the search box.
54+
1. Select **O.C. Tanner - AppreciateHub** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
9755

98-
![Edit Basic SAML Configuration](common/edit-urls.png)
56+
## Configure and test Azure AD single sign-on for O.C. Tanner - AppreciateHub
9957

100-
4. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file**, perform the following steps:
58+
Configure and test Azure AD SSO with O.C. Tanner - AppreciateHub using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in O.C. Tanner - AppreciateHub.
10159

102-
>[!NOTE]
103-
>You can download the **Service Provider metadata file** from [here](https://fed.appreciatehub.com/fed/sp/metadata)
60+
To configure and test Azure AD SSO with O.C. Tanner - AppreciateHub, complete the following building blocks:
10461

105-
a. Click **Upload metadata file**.
62+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
63+
* **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
64+
* **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
65+
1. **[Configure O.C. Tanner - AppreciateHub SSO](#configure-oc-tanner---appreciatehub-sso)** - to configure the single sign-on settings on application side.
66+
* **[Create O.C. Tanner - AppreciateHub test user](#create-oc-tanner---appreciatehub-test-user)** - to have a counterpart of B.Simon in O.C. Tanner - AppreciateHub that is linked to the Azure AD representation of user.
67+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
10668

107-
![Upload metadata file](common/upload-metadata.png)
69+
## Configure Azure AD SSO
10870

109-
b. Click on **folder logo** to select the metadata file and click **Upload**.
71+
Follow these steps to enable Azure AD SSO in the Azure portal.
11072

111-
![choose metadata file](common/browse-upload-metadata.png)
73+
1. In the [Azure portal](https://portal.azure.com/), on the **O.C. Tanner - AppreciateHub** application integration page, find the **Manage** section and select **single sign-on**.
74+
1. On the **Select a single sign-on method** page, select **SAML**.
75+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
11276

113-
c. After the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
77+
![Edit Basic SAML Configuration](common/edit-urls.png)
11478

115-
![O.C. Tanner - AppreciateHub Domain and URLs single sign-on information](common/idp-intiated.png)
79+
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
11680

117-
> [!Note]
118-
> If the **Identifier** and **Reply URL** values do not get auto polulated, then please fill in the values manually according to your requirement. Contact [O.C. Tanner - AppreciateHub Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
119-
120-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
81+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
12182

12283
![The Certificate download link](common/metadataxml.png)
12384

124-
6. On the **Set up O.C. Tanner - AppreciateHub** section, copy the appropriate URL(s) as per your requirement.
85+
1. On the **Set up O.C. Tanner - AppreciateHub** section, copy the appropriate URL(s) as per your requirement.
12586

12687
![Copy configuration URLs](common/copy-configuration-urls.png)
12788

@@ -131,59 +92,39 @@ To configure Azure AD single sign-on with O.C. Tanner - AppreciateHub, perform t
13192

13293
c. Logout URL
13394

134-
### Configure O.C. Tanner - AppreciateHub Single Sign-On
135-
136-
To configure single sign-on on **O.C. Tanner - AppreciateHub** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [O.C. Tanner - AppreciateHub support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
137-
138-
### Create an Azure AD test user
139-
140-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
141-
142-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
143-
144-
![The "Users and groups" and "All users" links](common/users.png)
145-
146-
2. Select **New user** at the top of the screen.
147-
148-
![New user Button](common/new-user.png)
149-
150-
3. In the User properties, perform the following steps.
95+
### Create an Azure AD test user
15196

152-
![The User dialog box](common/user-properties.png)
97+
In this section, you'll create a test user in the Azure portal called B.Simon.
15398

154-
a. In the **Name** field enter **BrittaSimon**.
155-
156-
b. In the **User name** field type user like [email protected].
157-
158-
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
159-
160-
d. Click **Create**.
99+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
100+
1. Select **New user** at the top of the screen.
101+
1. In the **User** properties, follow these steps:
102+
1. In the **Name** field, enter `B.Simon`.
103+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
104+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
105+
1. Click **Create**.
161106

162107
### Assign the Azure AD test user
163108

164-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to O.C. Tanner - AppreciateHub.
165-
166-
1. In the Azure portal, select **Enterprise Applications**, select **All applications**, then select **O.C. Tanner - AppreciateHub**.
167-
168-
![Enterprise applications blade](common/enterprise-applications.png)
169-
170-
2. In the applications list, select **O.C. Tanner - AppreciateHub**.
109+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to O.C. Tanner - AppreciateHub.
171110

172-
![The O.C. Tanner - AppreciateHub link in the Applications list](common/all-applications.png)
111+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
112+
1. In the applications list, select **O.C. Tanner - AppreciateHub**.
113+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
173114

174-
3. In the menu on the left, select **Users and groups**.
115+
![The "Users and groups" link](common/users-groups-blade.png)
175116

176-
![The "Users and groups" link](common/users-groups-blade.png)
117+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
177118

178-
4. Click the **Add user** button, then select **Users and groups** in the **Add Assignment** dialog.
119+
![The Add User link](common/add-assign-user.png)
179120

180-
![The Add Assignment pane](common/add-assign-user.png)
121+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
122+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
123+
1. In the **Add Assignment** dialog, click the **Assign** button.
181124

182-
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
125+
## Configure O.C. Tanner - AppreciateHub SSO
183126

184-
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
185-
186-
7. In the **Add Assignment** dialog click the **Assign** button.
127+
To configure single sign-on on **O.C. Tanner - AppreciateHub** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [O.C. Tanner - AppreciateHub support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
187128

188129
### Create O.C. Tanner - AppreciateHub test user
189130

@@ -193,16 +134,22 @@ The objective of this section is to create a user called Britta Simon in O.C. Ta
193134

194135
Ask your [O.C. Tanner - AppreciateHub support team](mailto:[email protected]) to create a user that has as nameID attribute the same value as the user name of Britta Simon in Azure AD.
195136

196-
### Test single sign-on
137+
## Test SSO
197138

198139
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
199140

200141
When you click the O.C. Tanner - AppreciateHub tile in the Access Panel, you should be automatically signed in to the O.C. Tanner - AppreciateHub for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
201142

202-
## Additional Resources
143+
## Additional resources
144+
145+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
146+
147+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
148+
149+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
203150

204-
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
151+
- [Try O.C. Tanner - AppreciateHub with Azure AD](https://aad.portal.azure.com/)
205152

206-
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
153+
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
207154

208-
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
155+
- [How to protect O.C. Tanner - AppreciateHub with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)