You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/intacct-tutorial.md
+32-38Lines changed: 32 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory integration with Sage Intacct | Microsoft Docs'
2
+
title: 'Tutorial: Azure Active Directory integration with Sage Intacct'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and Sage Intacct.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 01/15/2021
12
+
ms.date: 01/05/2022
13
13
ms.author: jeedes
14
14
---
15
15
@@ -32,7 +32,7 @@ To get started, you need the following items:
32
32
33
33
In this tutorial, you configure and test Azure AD SSO in a test environment.
34
34
35
-
* Sage Intacct supports **IDP** initiated SSO
35
+
* Sage Intacct supports **IDP** initiated SSO.
36
36
37
37
## Adding Sage Intacct from the gallery
38
38
@@ -55,7 +55,7 @@ To configure and test Azure AD SSO with Sage Intacct, complete the following ste
55
55
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
56
56
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
57
57
2.**[Configure Sage Intacct SSO](#configure-sage-intacct-sso)** - to configure the Single Sign-On settings on application side.
58
-
1.**[Create Sage Intacct test user](#create-sage-intacct-test-user)** - to have a counterpart of B.Simon in Sage Intacct that is linked to the Azure AD representation of user.
58
+
1.**[Set up individual users in Intacct](#set-up-individual-users-in-intacct)** - to have a counterpart of B.Simon in Sage Intacct that is linked to the Azure AD representation of user.
59
59
6.**[Test SSO](#test-sso)** - to verify whether the configuration works.
60
60
61
61
### Configure Azure AD SSO
@@ -71,11 +71,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
71
71
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
72
72
73
73
In the **Reply URL** text box, add the following URLs:
74
-
`https://www.intacct.com/ia/acct/sso_response.phtml` (Select as the default.)
1. The Sage Intacct application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open User Attributes dialog..
81
85
@@ -86,7 +90,10 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
86
90
| Attribute Name | Source Attribute|
87
91
| ---------------| --------------- |
88
92
| Company Name | **Sage Intacct Company ID** |
89
-
| name | Value should be same as the Sage Intacct **User ID**, which you enter in the **Create Sage Intacct test user section**, which is explained later in the tutorial |
93
+
| name | `<User ID>`|
94
+
95
+
> [!NOTE]
96
+
> Enter the `<User ID>` value should be same as the Sage Intacct **User ID**, which you enter in the **[Set up individual users in Intacct](#set-up-individual-users-in-intacct)**, which is explained later in the tutorial
90
97
91
98
a. Click **Add new claim** to open the **Manage user claims** dialog.
92
99
@@ -138,17 +145,17 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
138
145
139
146
1. In a different web browser window, sign in to your Sage Intacct company site as an administrator.
140
147
141
-
1.Click the**Company**tab, and then click **Company Info**.
148
+
1.Go to**Company**, click the **Setup**tab, and click **Company** under the Configuration section.
@@ -159,43 +166,30 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
159
166
d. In **Login URL** textbox, paste the value of **Login URL**, which you have copied from Azure portal.
160
167
161
168
e. Open your **base-64** encoded certificate in notepad, copy the content of it into your clipboard, and then paste it to the **Certificate** box.
169
+
170
+
f. Set **Requested authentication content type** to **Exact**.
162
171
163
-
f. Click **Save**.
172
+
g. Click **Save**.
164
173
165
-
### Create Sage Intacct test user
174
+
### Set up individual users in Intacct
166
175
167
-
To set up Azure AD users so they can sign in to Sage Intacct, they must be provisioned into Sage Intacct. For Sage Intacct, provisioning is a manual task.
176
+
When SSO is enabled for your company, you can individually require users to use SSO when logging in to your company. After you set up a user for SSO, the user will no longer be able to use a password to log in to your company directly. Instead, that user will need to use single sign-on and will be authenticated by your SSO identity provider as being an authorized user. Any users who aren't set up for SSO can continue to log in to your company using the basic signin page.
168
177
169
-
**To provision user accounts, perform the following steps:**
178
+
**To enable SSO for a user, perform the following steps:**
170
179
171
180
1. Sign in to your **Sage Intacct** tenant.
172
181
173
-
1. Click the **Company** tab, and then click **Users**.

180
185
181
-
1.In the **User Information**section, perform the following steps:
186
+
1.Locate the desired user and click **Edit**next to it.
182
187
183
-

184
-
185
-
a. Enter the **User ID**, the **Last name**, **First name**, the **Email address**, the **Title**, and the **Phone** of an Azure AD account that you want to provision into the **User Information** section.
186
-
187
-
> [!NOTE]
188
-
> Make sure that the **User ID** in above screenshot and the **Source Attribute** value which is mapped with the **name** attribute in the **User Attributes** section in the Azure portal should be same.
189
-
190
-
b. Select the **Admin privileges** of an Azure AD account that you want to provision.
191
-
192
-
c. Click **Save**.
193
-
194
-
d. The Azure AD account holder receives an email and follows a link to confirm their account before it becomes active.
188
+

195
189
196
190
1. Click **Single sign-on** tab and make sure that the **Federated SSO user ID** in below screenshot and the **Source Attribute** value which is mapped with the `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier` in the **User Attributes** section in the Azure portal should be same.
197
191
198
-

192
+

199
193
200
194
> [!NOTE]
201
195
> To provision Azure AD user accounts, you can use other Sage Intacct user account creation tools or APIs that are provided by Sage Intacct.
0 commit comments