Skip to content

Commit c0bcb6f

Browse files
committed
Revert "Product Backlog Item 2039038: SaaS App Tutorial: Embark Update"
This reverts commit a7e4fce.
1 parent a7e4fce commit c0bcb6f

File tree

1 file changed

+9
-27
lines changed

1 file changed

+9
-27
lines changed

articles/active-directory/saas-apps/embark-tutorial.md

Lines changed: 9 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 08/23/2022
12+
ms.date: 02/11/2022
1313
ms.author: jeedes
1414

1515
---
@@ -33,7 +33,7 @@ To get started, you need the following items:
3333

3434
In this tutorial, you configure and test Azure AD SSO in a test environment.
3535

36-
* Embark supports **SP and IDP** initiated SSO.
36+
* Embark supports **SP** initiated SSO.
3737

3838
> [!NOTE]
3939
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
@@ -75,27 +75,16 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7575

7676
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
7777

78-
a. In the **Identifier** text box, type a URL using the following pattern:
79-
`https://<ENVIRONMENT>.ehr.com`
80-
81-
b. In the **Reply URL** text box, type a URL using the following pattern:
82-
`https://<ENVIRONMENT>.ehr.com`
83-
84-
c. In the **Sign on URL** text box, type a URL using the following pattern:
85-
`https://<ENVIRONMENT>.ehr.com`
78+
In the **Sign on URL** text box, type a URL using the following pattern:
79+
`https://<ENVIRONMENT>.ehr.com/microsoftbenefits`
8680

8781
> [!NOTE]
88-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Embark support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
82+
> The Sign on URL value is not real. Update the value with the actual Sign on URL. Contact [Embark support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8983

90-
1. Your Embark application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Embark expects this to be mapped with the user's employee id. For that you can use **user.employeeid** attribute from the list or use the appropriate attribute value based on your organization configuration.
84+
1. Your Embark application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Embark expects this to be mapped with the user's employee id. For that you can use **user.employeeid** attribute from the list or use the appropriate attribute value based on your organization configuration..
9185

9286
![image](common/default-attributes.png)
9387

94-
1. In addition to above, Embark platform application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
95-
96-
| Name | Source Attribute|
97-
| --------| --------- |
98-
| EmployeeID | user.employeeid |
9988

10089
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
10190

@@ -137,18 +126,11 @@ In this section, you create a user called Britta Simon in Embark. Work with [Em
137126

138127
In this section, you test your Azure AD single sign-on configuration with following options.
139128

140-
#### SP initiated:
141-
142-
* Click on **Test this application** in Azure portal. This will redirect to Embark platform Sign on URL where you can initiate the login flow.
143-
144-
* Go to Embark platform Sign-on URL directly and initiate the login flow from there.
145-
146-
#### IDP initiated:
147-
148-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Embark platform for which you set up the SSO.
129+
* Click on **Test this application** in Azure portal. This will redirect to Embark Sign-on URL where you can initiate the login flow.
149130

150-
You can also use Microsoft My Apps to test the application in any mode. When you click the Embark platform tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Embark platform for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
131+
* Go to Embark Sign-on URL directly and initiate the login flow from there.
151132

133+
* You can use Microsoft My Apps. When you click the Embark tile in the My Apps, this will redirect to Embark Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
152134

153135
## Next steps
154136

0 commit comments

Comments
 (0)