You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/snackmagic-tutorial.md
+30-22Lines changed: 30 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: 'Tutorial: Azure AD SSO integration with Snackmagic'
3
-
description: Learn how to configure single sign-on between Azure Active Directory and Snackmagic.
2
+
title: 'Tutorial: Microsoft Entra SSO integration with Snackmagic'
3
+
description: Learn how to configure single sign-on between Microsoft Entra ID and Snackmagic.
4
4
services: active-directory
5
5
author: jeevansd
6
6
manager: CelesteDG
@@ -14,24 +14,24 @@ ms.author: jeedes
14
14
15
15
---
16
16
17
-
# Tutorial: Azure AD SSO integration with Snackmagic
17
+
# Tutorial: Microsoft Entra SSO integration with Snackmagic
18
18
19
-
In this tutorial, you'll learn how to integrate Snackmagic with Azure Active Directory (Azure AD). When you integrate Snackmagic with Azure AD, you can:
19
+
In this tutorial, you'll learn how to integrate Snackmagic with Microsoft Entra ID. When you integrate Snackmagic with Microsoft Entra ID, you can:
20
20
21
-
* Control in Azure AD who has access to Snackmagic.
22
-
* Enable your users to be automatically signed-in to Snackmagic with their Azure AD accounts.
21
+
* Control in Microsoft Entra ID who has access to Snackmagic.
22
+
* Enable your users to be automatically signed-in to Snackmagic with their Microsoft Entra accounts.
23
23
* Manage your accounts in one central location.
24
24
25
25
## Prerequisites
26
26
27
27
To get started, you need the following items:
28
28
29
-
*An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
29
+
*A Microsoft Entra subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30
30
* Snackmagic single sign-on (SSO) enabled subscription.
31
31
32
32
## Scenario description
33
33
34
-
In this tutorial, you configure and test Azure AD SSO in a test environment.
34
+
In this tutorial, you configure and test Microsoft Entra SSO in a test environment.
35
35
36
36
* Snackmagic supports **SP and IDP** initiated SSO.
37
37
* Snackmagic supports **Just In Time** user provisioning.
@@ -41,7 +41,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
41
41
42
42
## Add Snackmagic from the gallery
43
43
44
-
To configure the integration of Snackmagic into Azure AD, you need to add Snackmagic from the gallery to your list of managed SaaS apps.
44
+
To configure the integration of Snackmagic into Microsoft Entra ID, you need to add Snackmagic from the gallery to your list of managed SaaS apps.
45
45
46
46
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
@@ -50,22 +50,26 @@ To configure the integration of Snackmagic into Azure AD, you need to add Snackm
50
50
51
51
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
Configure and test Azure AD SSO with Snackmagic using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Snackmagic.
55
+
## Configure and test Microsoft Entra SSO for Snackmagic
56
56
57
-
To configure and test Azure AD SSO with Snackmagic, perform the following steps:
57
+
Configure and test Microsoft Entra SSO with Snackmagic using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Snackmagic.
58
58
59
-
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
60
-
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
61
-
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
59
+
To configure and test Microsoft Entra SSO with Snackmagic, perform the following steps:
60
+
61
+
1.**[Configure Microsoft Entra SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
62
+
1.**[Create a Microsoft Entra test user](#create-an-azure-ad-test-user)** - to test Microsoft Entra single sign-on with B.Simon.
63
+
1.**[Assign the Microsoft Entra test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Microsoft Entra single sign-on.
62
64
1.**[Configure Snackmagic SSO](#configure-snackmagic-sso)** - to configure the single sign-on settings on application side.
63
-
1.**[Create Snackmagic test user](#create-snackmagic-test-user)** - to have a counterpart of B.Simon in Snackmagic that is linked to the Azure AD representation of user.
65
+
1.**[Create Snackmagic test user](#create-snackmagic-test-user)** - to have a counterpart of B.Simon in Snackmagic that is linked to the Microsoft Entra representation of user.
64
66
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
65
67
66
-
## Configure Azure AD SSO
68
+
<aname='configure-azure-ad-sso'></a>
69
+
70
+
## Configure Microsoft Entra SSO
67
71
68
-
Follow these steps to enable Azure AD SSO.
72
+
Follow these steps to enable Microsoft Entra SSO.
69
73
70
74
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
In this section, you'll create a test user called B.Simon.
117
123
@@ -125,7 +131,9 @@ In this section, you'll create a test user called B.Simon.
125
131
1. Select **Review + create**.
126
132
1. Select **Create**.
127
133
128
-
### Assign the Azure AD test user
134
+
<aname='assign-the-azure-ad-test-user'></a>
135
+
136
+
### Assign the Microsoft Entra test user
129
137
130
138
In this section, you'll enable B.Simon to use single sign-on by granting access to Snackmagic.
131
139
@@ -165,7 +173,7 @@ In this section, a user called Britta Simon is created in Snackmagic. Snackmagic
165
173
166
174
## Test SSO
167
175
168
-
In this section, you test your Azure AD single sign-on configuration with following options.
176
+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
169
177
170
178
#### SP initiated:
171
179
@@ -177,7 +185,7 @@ In this section, you test your Azure AD single sign-on configuration with follow
177
185
178
186
* Click on **Test this application**, and you should be automatically signed in to the Snackmagic for which you set up the SSO.
179
187
180
-
You can also use Microsoft My Apps to test the application in any mode. When you click the Snackmagic tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Snackmagic for which you set up the SSO. For more information, see [Azure AD My Apps](/azure/active-directory/manage-apps/end-user-experiences#azure-ad-my-apps).
188
+
You can also use Microsoft My Apps to test the application in any mode. When you click the Snackmagic tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Snackmagic for which you set up the SSO. For more information, see [Microsoft Entra My Apps](/azure/active-directory/manage-apps/end-user-experiences#azure-ad-my-apps).
0 commit comments