Skip to content

Commit ce751ba

Browse files
authored
Merge pull request #184177 from v-hagamp/sage-intacct-git-issue
Product Backlog Item 1720546: SaaS App Tutorial: Sage Intacct Update
2 parents 504ed86 + 57ce03d commit ce751ba

File tree

7 files changed

+32
-38
lines changed

7 files changed

+32
-38
lines changed

articles/active-directory/saas-apps/intacct-tutorial.md

Lines changed: 32 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Sage Intacct | Microsoft Docs'
2+
title: 'Tutorial: Azure Active Directory integration with Sage Intacct'
33
description: Learn how to configure single sign-on between Azure Active Directory and Sage Intacct.
44
services: active-directory
55
author: jeevansd
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 01/15/2021
12+
ms.date: 01/05/2022
1313
ms.author: jeedes
1414
---
1515

@@ -32,7 +32,7 @@ To get started, you need the following items:
3232

3333
In this tutorial, you configure and test Azure AD SSO in a test environment.
3434

35-
* Sage Intacct supports **IDP** initiated SSO
35+
* Sage Intacct supports **IDP** initiated SSO.
3636

3737
## Adding Sage Intacct from the gallery
3838

@@ -55,7 +55,7 @@ To configure and test Azure AD SSO with Sage Intacct, complete the following ste
5555
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
5656
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
5757
2. **[Configure Sage Intacct SSO](#configure-sage-intacct-sso)** - to configure the Single Sign-On settings on application side.
58-
1. **[Create Sage Intacct test user](#create-sage-intacct-test-user)** - to have a counterpart of B.Simon in Sage Intacct that is linked to the Azure AD representation of user.
58+
1. **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)** - to have a counterpart of B.Simon in Sage Intacct that is linked to the Azure AD representation of user.
5959
6. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6060

6161
### Configure Azure AD SSO
@@ -71,11 +71,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7171
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
7272

7373
In the **Reply URL** text box, add the following URLs:
74-
`https://www.intacct.com/ia/acct/sso_response.phtml` (Select as the default.)
75-
`https://www.p-02.intacct.com/ia/acct/sso_response.phtml`
76-
`https://www.p-03.intacct.com/ia/acct/sso_response.phtml`
77-
`https://www.p-04.intacct.com/ia/acct/sso_response.phtml`
78-
`https://www.p-05.intacct.com/ia/acct/sso_response.phtml`
74+
75+
| Reply URL |
76+
| ------------- |
77+
| `https://www.intacct.com/ia/acct/sso_response.phtml` (Select as the default.) |
78+
| `https://www.p-02.intacct.com/ia/acct/sso_response.phtml` |
79+
| `https://www.p-03.intacct.com/ia/acct/sso_response.phtml` |
80+
| `https://www.p-04.intacct.com/ia/acct/sso_response.phtml` |
81+
| `https://www.p-05.intacct.com/ia/acct/sso_response.phtml` |
82+
|
7983

8084
1. The Sage Intacct application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog..
8185

@@ -86,7 +90,10 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8690
| Attribute Name | Source Attribute|
8791
| ---------------| --------------- |
8892
| Company Name | **Sage Intacct Company ID** |
89-
| name | Value should be same as the Sage Intacct **User ID**, which you enter in the **Create Sage Intacct test user section**, which is explained later in the tutorial |
93+
| name | `<User ID>`|
94+
95+
> [!NOTE]
96+
> Enter the `<User ID>` value should be same as the Sage Intacct **User ID**, which you enter in the **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)**, which is explained later in the tutorial
9097

9198
a. Click **Add new claim** to open the **Manage user claims** dialog.
9299

@@ -138,17 +145,17 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
138145

139146
1. In a different web browser window, sign in to your Sage Intacct company site as an administrator.
140147

141-
1. Click the **Company** tab, and then click **Company Info**.
148+
1. Go to **Company**, click the **Setup** tab, and click **Company** under the Configuration section.
142149

143-
![Company](./media/intacct-tutorial/ic790037.png "Company")
150+
![Company](./media/intacct-tutorial/setup.png)
144151

145152
1. Click the **Security** tab, and then click **Edit**.
146153

147-
![Security](./media/intacct-tutorial/ic790038.png "Security")
154+
![screenshot for Security](./media/intacct-tutorial/security.png "Security")
148155

149156
1. In the **Single sign on (SSO)** section, perform the following steps:
150157

151-
![Single sign on](./media/intacct-tutorial/ic790039.png "single sign on")
158+
![Single sign on](./media/intacct-tutorial/intacct-configuration.png)
152159

153160
a. Select **Enable single sign on**.
154161

@@ -159,43 +166,30 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
159166
d. In **Login URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
160167

161168
e. Open your **base-64** encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **Certificate** box.
169+
170+
f. Set **Requested authentication content type** to **Exact**.
162171

163-
f. Click **Save**.
172+
g. Click **Save**.
164173

165-
### Create Sage Intacct test user
174+
### Set up individual users in Intacct
166175

167-
To set up Azure AD users so they can sign in to Sage Intacct, they must be provisioned into Sage Intacct. For Sage Intacct, provisioning is a manual task.
176+
When SSO is enabled for your company, you can individually require users to use SSO when logging in to your company. After you set up a user for SSO, the user will no longer be able to use a password to log in to your company directly. Instead, that user will need to use single sign-on and will be authenticated by your SSO identity provider as being an authorized user. Any users who aren't set up for SSO can continue to log in to your company using the basic signin page.
168177

169-
**To provision user accounts, perform the following steps:**
178+
**To enable SSO for a user, perform the following steps:**
170179

171180
1. Sign in to your **Sage Intacct** tenant.
172181

173-
1. Click the **Company** tab, and then click **Users**.
174-
175-
![Users](./media/intacct-tutorial/ic790041.png "Users")
176-
177-
1. Click the **Add** tab.
182+
1. Go to **Company**, click the **Admin** tab, then click **Users**.
178183

179-
![Add](./media/intacct-tutorial/ic790042.png "Add")
184+
![Screenshot for Users](./media/intacct-tutorial/users.png "Users")
180185

181-
1. In the **User Information** section, perform the following steps:
186+
1. Locate the desired user and click **Edit** next to it.
182187

183-
![Screenshot shows the User Information section where you can enter the information in this step.](./media/intacct-tutorial/ic790043.png "User Information")
184-
185-
a. Enter the **User ID**, the **Last name**, **First name**, the **Email address**, the **Title**, and the **Phone** of an Azure AD account that you want to provision into the **User Information** section.
186-
187-
> [!NOTE]
188-
> Make sure that the **User ID** in above screenshot and the **Source Attribute** value which is mapped with the **name** attribute in the **User Attributes** section in the Azure portal should be same.
189-
190-
b. Select the **Admin privileges** of an Azure AD account that you want to provision.
191-
192-
c. Click **Save**.
193-
194-
d. The Azure AD account holder receives an email and follows a link to confirm their account before it becomes active.
188+
![Edit the user](./media/intacct-tutorial/user-edit.png "edit")
195189

196190
1. Click **Single sign-on** tab and make sure that the **Federated SSO user ID** in below screenshot and the **Source Attribute** value which is mapped with the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier` in the **User Attributes** section in the Azure portal should be same.
197191

198-
![Screenshot shows the User Information section where you can enter the Federated S S O user i d.](./media/intacct-tutorial/ic790044.png "User Information")
192+
![Screenshot shows the User Information section where you can enter the Federated S S O user i d.](./media/intacct-tutorial/user-information.png "User Information")
199193

200194
> [!NOTE]
201195
> To provision Azure AD user accounts, you can use other Sage Intacct user account creation tools or APIs that are provided by Sage Intacct.
60.3 KB
Loading
32.8 KB
Loading
27.5 KB
Loading
15.5 KB
Loading
63.9 KB
Loading
68.5 KB
Loading

0 commit comments

Comments
 (0)