Skip to content

Commit c5b4753

Browse files
authored
Merge pull request #232930 from bhavana-129/mymobility
Product Backlog Item 2494652: SaaS App Tutorial: myMobilityHQ
2 parents 7466ebf + df23222 commit c5b4753

File tree

2 files changed

+119
-0
lines changed

2 files changed

+119
-0
lines changed
Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,117 @@
1+
---
2+
title: Azure Active Directory SSO integration with myMobilityHQ
3+
description: Learn how to configure single sign-on between Azure Active Directory and myMobilityHQ.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 03/31/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Azure Active Directory SSO integration with myMobilityHQ
18+
19+
In this article, you learn how to integrate myMobilityHQ with Azure Active Directory (Azure AD). myMobilityHQ is the secure portal that allows your company mobility managers to see a real-time dashboard of the status of their expatriate tax program. When you integrate myMobilityHQ with Azure AD, you can:
20+
21+
* Control in Azure AD who has access to myMobilityHQ.
22+
* Enable your users to be automatically signed-in to myMobilityHQ with their Azure AD accounts.
23+
* Manage your accounts in one central location - the Azure portal.
24+
25+
You configure and test Azure AD single sign-on for myMobilityHQ in a test environment. myMobilityHQ supports only **SP** initiated single sign-on.
26+
27+
## Prerequisites
28+
29+
To integrate Azure Active Directory with myMobilityHQ, you need:
30+
31+
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
33+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34+
* myMobilityHQ single sign-on (SSO) enabled subscription.
35+
36+
## Add application and assign a test user
37+
38+
Before you begin the process of configuring single sign-on, you need to add the myMobilityHQ application from the Azure AD gallery. You need a test user account to assign to the application and test the single sign-on configuration.
39+
40+
### Add myMobilityHQ from the Azure AD gallery
41+
42+
Add myMobilityHQ from the Azure AD application gallery to configure single sign-on with myMobilityHQ. For more information on how to add application from the gallery, see the [Quickstart: Add application from the gallery](../manage-apps/add-application-portal.md).
43+
44+
### Create and assign Azure AD test user
45+
46+
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
47+
48+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
49+
50+
## Configure Azure AD SSO
51+
52+
Complete the following steps to enable Azure AD single sign-on in the Azure portal.
53+
54+
1. In the Azure portal, on the **myMobilityHQ** application integration page, find the **Manage** section and select **single sign-on**.
55+
1. On the **Select a single sign-on method** page, select **SAML**.
56+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
57+
58+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
59+
60+
1. On the **Basic SAML Configuration** section, perform the following steps:
61+
62+
a. In the **Identifier** textbox, type a value using one of the following patterns:
63+
64+
| **Identifier** |
65+
|------------|
66+
| `urn:auth0:prod:s<COMPANYNAME>` |
67+
| `urn:auth0:stage:s<COMPANYNAME>` |
68+
69+
b. In the **Reply URL** textbox, type a URL using one of the following patterns:
70+
71+
| **Reply URL** |
72+
|---------|
73+
| `https://stage.vialto.auth0app.com/login/callback?connection=s<COMPANYNAME>` |
74+
| `https://prod.vialto.auth0app.com/login/callback?connection=s<COMPANYNAME>` |
75+
| `https://auth-stage.vialto.com/login/callback?connection=s<COMPANYNAME>` |
76+
| `https://auth.vialto.com/login/callback?connection=s<COMPANYNAME>` |
77+
78+
c. In the **Sign on URL** textbox, type one of the following URLs:
79+
80+
| **Sign on URL** |
81+
|-------------|
82+
| `https://mymobilityhq-stage.vialto.com`|
83+
| `https://mymobilityhq.vialto.com` |
84+
85+
> [!Note]
86+
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [myMobilityHQ support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the Basic SAML Configuration section in the Azure portal.
87+
88+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
89+
90+
![Screenshot shows the Certificate download link.](common/copy-metadataurl.png "Certificate")
91+
92+
## Configure myMobilityHQ SSO
93+
94+
To configure single sign-on on **myMobilityHQ** side, you need to send the **App Federation Metadata Url** to [myMobilityHQ support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
95+
96+
### Create myMobilityHQ test user
97+
98+
In this section, you create a user called Britta Simon in myMobilityHQ. Work with [myMobilityHQ support team](mailto:[email protected]) to add the users in the myMobilityHQ platform. Users must be created and activated before you use single sign-on.
99+
100+
## Test SSO
101+
102+
In this section, you test your Azure AD single sign-on configuration with following options.
103+
104+
* Click on **Test this application** in Azure portal. This will redirect to myMobilityHQ Sign-on URL where you can initiate the login flow.
105+
106+
* Go to myMobilityHQ Sign-on URL directly and initiate the login flow from there.
107+
108+
* You can use Microsoft My Apps. When you click the myMobilityHQ tile in the My Apps, this will redirect to myMobilityHQ Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
109+
110+
## Additional resources
111+
112+
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
113+
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
114+
115+
## Next steps
116+
117+
Once you configure myMobilityHQ you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1627,6 +1627,8 @@
16271627
href: myawardpoints-tutorial.md
16281628
- name: My IBISWorld
16291629
href: my-ibisworld-tutorial.md
1630+
- name: myMobilityHQ
1631+
href: mymobilityhq-tutorial.md
16301632
- name: myPolicies
16311633
href: mypolicies-tutorial.md
16321634
- name: my.sdworx.com

0 commit comments

Comments
 (0)