Skip to content

Commit ccc6819

Browse files
Merge pull request #223477 from v-hgampala/digital-pigeon
Product Backlog Item 2285809: SaaS App Tutorial: Digital Pigeon Update
2 parents b2e2663 + 28d257c commit ccc6819

File tree

5 files changed

+27
-14
lines changed

5 files changed

+27
-14
lines changed

articles/active-directory/saas-apps/digital-pigeon-tutorial.md

Lines changed: 27 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 11/21/2022
12+
ms.date: 01/10/2023
1313
ms.author: jeedes
1414

1515
---
@@ -31,7 +31,8 @@ To integrate Azure Active Directory with Digital Pigeon, you need:
3131
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3232
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3333
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34-
* Digital Pigeon single sign-on (SSO) enabled subscription.
34+
* Digital Pigeon single sign-on (SSO) enabled subscription (i.e.: Business or Enterprise plans)
35+
* Digital Pigeon account owner access to the above subscription
3536

3637
## Add application and assign a test user
3738

@@ -46,7 +47,8 @@ Add Digital Pigeon from the Azure AD application gallery to configure single sig
4647
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
4748

4849
> [!NOTE]
49-
> Please click [here](../develop/howto-add-app-roles-in-azure-ad-apps.md#app-roles-ui) to know how to configure Role in Azure AD. Role value is one of 'Digital Pigeon User', 'Digital Pigeon Power User', or 'Digital Pigeon Admin'. If role claim not supplied, default role is configurable in Digital Pigeon app by a Digital Pigeon Owner.
50+
> Please click [here](../develop/howto-add-app-roles-in-azure-ad-apps.md#app-roles-ui) to learn how to configure App Roles in Azure AD. The Role value must be one of 'Digital Pigeon User', 'Digital Pigeon Power User', or 'Digital Pigeon Admin'. If a role claim is not supplied, the default role is configurable in the Digital Pigeon app (`Account Settings > SSO > SAML Provisioning Settings`) by a Digital Pigeon Owner, as seen below:
51+
![Screenshot shows how to configure SAML Provisioning Default Role.](media/digital-pigeon-tutorial/saml-default-role.png "SAML Default Role")
5052

5153
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
5254

@@ -60,22 +62,25 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6062

6163
![Screenshot shows to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
6264

63-
1. On the **Basic SAML Configuration** section, perform the following steps:
65+
1. In another browser tab, log in to Digital Pigeon as an account administrator.
6466

65-
a. In the **Identifier** textbox, type a URL using the following pattern:
66-
`https://digitalpigeon.com/saml2/service-provider-metadata/<CustomerID>`
67+
1. Navigate to **Account Settings > SSO** and copy the **SP Entity ID** and **SP ACS URL** values.
6768

68-
b. In the **Reply URL** textbox, type a URL using the following pattern:
69-
`https://digitalpigeon.com/login/saml2/sso/<CustomerID>`
69+
![Screenshot shows Digital Pigeon SAML Service Provider Settings.](media/digital-pigeon-tutorial/saml-service-provider-settings.png "SAML Service Provider Settings")
70+
71+
1. Now in Azure AD, in the **Basic SAML Configuration** section, perform the following steps:
72+
73+
a. In the **Identifier** textbox, paste the value from _Digital Pigeon > Account Settings > SSO > **SP Entity ID**_.
74+
It should match the following pattern: `https://digitalpigeon.com/saml2/service-provider-metadata/<CustomerID>`
75+
76+
b. In the **Reply URL** textbox, paste the value from _Digital Pigeon > Account Settings > SSO > **SP ACS URL**_.
77+
It should match the following pattern: `https://digitalpigeon.com/login/saml2/sso/<CustomerID>`
7078

7179
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
7280

7381
In the **Sign on URL** textbox, type the URL:
7482
`https://digitalpigeon.com/login`
7583

76-
> [!NOTE]
77-
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Digital Pigeon Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
78-
7984
1. Digital Pigeon application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
8085

8186
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Attributes")
@@ -91,13 +96,19 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
9196

9297
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
9398

94-
1. On the **Set up Digital Pigeon** section, copy the appropriate URL(s) based on your requirement.
99+
1. In Digital Pigeon, paste the content of downloaded **Federation Metadata XML** file into the **IDP Metadata XML** text field.
100+
101+
![Screenshot shows IDP Metadata XML.](media/digital-pigeon-tutorial/idp-metadata-xml.png "IDP Metadata XML")
102+
103+
1. In Azure AD, on the **Set up Digital Pigeon** section, copy the Azure AD Identifier URL.
95104

96105
![Screenshot shows to copy configuration appropriate U R L.](common/copy-configuration-urls.png "Metadata")
97106

98-
## Configure Digital Pigeon SSO
107+
1. In Digital Pigeon, paste this URL into the **IDP Entity ID** text field.
108+
109+
![Screenshot shows IDP Entity ID.](media/digital-pigeon-tutorial/idp-entity-id.png "IDP Entity ID")
99110

100-
To configure single sign-on on **Digital Pigeon** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Digital Pigeon support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
111+
1. Click **Save** button to activate Digital Pigeon SSO.
101112

102113
### Create Digital Pigeon test user
103114

@@ -121,6 +132,8 @@ You can also use Microsoft My Apps to test the application in any mode. When you
121132

122133
## Additional resources
123134

135+
* Should you run into any issues or require additional support, please contact the [Digital Pigeon support team](mailto:[email protected])
136+
* For an alternative step-by-step guide, please refer to the Digital Pigeon KB article: [Azure AD SSO Configuration](https://digitalpigeon.zendesk.com/hc/en-us/articles/5403612403855-Azure-AD-SSO-Configuration)
124137
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
125138
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
126139

14.6 KB
Loading
19.6 KB
Loading
16.8 KB
Loading
16.1 KB
Loading

0 commit comments

Comments
 (0)