Skip to content

Commit c475872

Browse files
committed
update
1 parent 8f45b2a commit c475872

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/active-directory/saas-apps/netskope-cloud-security-tutorial.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,13 +85,16 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8585
b. In the **Reply URL** text box, type a URL using the following pattern:
8686
`https://<tenant_host_name>/saml/acs`
8787

88+
> [!NOTE]
89+
> These values are not real. Update these values with the actual Identifier and Reply URL. You will get these values explained later in the tutorial.
90+
8891
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8992

9093
In the **Sign-on URL** text box, type a URL using the following pattern:
9194
`https://<tenantname>.goskope.com`
9295

9396
> [!NOTE]
94-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Netskope Administrator Console Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
97+
> The Sign-on URL values is not real. Update Sign-on URL value with the actual Sign-on URL. Contact [Netskope Administrator Console Client support team](mailto:[email protected]) to get Sign-on URL value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9598

9699
1. Netskope Administrator Console application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
97100

0 commit comments

Comments
 (0)