You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with IQNavigator VMS | Microsoft Docs'
2
+
title: 'Tutorial: Azure AD SSO integration with IQNavigator VMS'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and IQNavigator VMS.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,56 +9,52 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 10/23/2019
12
+
ms.date: 06/29/2022
13
13
ms.author: jeedes
14
14
---
15
15
16
-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with IQNavigator VMS
16
+
# Tutorial: Azure AD SSO integration with IQNavigator VMS
17
17
18
18
In this tutorial, you'll learn how to integrate IQNavigator VMS with Azure Active Directory (Azure AD). When you integrate IQNavigator VMS with Azure AD, you can:
19
19
20
20
* Control in Azure AD who has access to IQNavigator VMS.
21
21
* Enable your users to be automatically signed-in to IQNavigator VMS with their Azure AD accounts.
22
22
* Manage your accounts in one central location - the Azure portal.
23
23
24
-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](../manage-apps/what-is-single-sign-on.md).
25
-
26
24
## Prerequisites
27
25
28
26
To get started, you need the following items:
29
27
30
28
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
31
29
* IQNavigator VMS single sign-on (SSO) enabled subscription.
30
+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
31
+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
32
32
33
33
## Scenario description
34
34
35
35
In this tutorial, you configure and test Azure AD SSO in a test environment.
36
36
37
-
38
-
* IQNavigator VMS supports **IDP** initiated SSO
37
+
* IQNavigator VMS supports **IDP** initiated SSO.
39
38
40
39
> [!NOTE]
41
40
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
42
41
43
-
44
-
45
-
## Adding IQNavigator VMS from the gallery
42
+
## Add IQNavigator VMS from the gallery
46
43
47
44
To configure the integration of IQNavigator VMS into Azure AD, you need to add IQNavigator VMS from the gallery to your list of managed SaaS apps.
48
45
49
-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
46
+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
50
47
1. On the left navigation pane, select the **Azure Active Directory** service.
51
48
1. Navigate to **Enterprise Applications** and then select **All Applications**.
52
49
1. To add new application, select **New application**.
53
50
1. In the **Add from the gallery** section, type **IQNavigator VMS** in the search box.
54
51
1. Select **IQNavigator VMS** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
55
52
56
-
57
-
## Configure and test Azure AD single sign-on for IQNavigator VMS
53
+
## Configure and test Azure AD SSO for IQNavigator VMS
58
54
59
55
Configure and test Azure AD SSO with IQNavigator VMS using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in IQNavigator VMS.
60
56
61
-
To configure and test Azure AD SSO with IQNavigator VMS, complete the following building blocks:
57
+
To configure and test Azure AD SSO with IQNavigator VMS, perform the following steps:
62
58
63
59
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
64
60
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
@@ -71,15 +67,15 @@ To configure and test Azure AD SSO with IQNavigator VMS, complete the following
71
67
72
68
Follow these steps to enable Azure AD SSO in the Azure portal.
73
69
74
-
1. In the [Azure portal](https://portal.azure.com/), on the **IQNavigator VMS** application integration page, find the **Manage** section and select **single sign-on**.
70
+
1. In the Azure portal, on the **IQNavigator VMS** application integration page, find the **Manage** section and select **single sign-on**.
75
71
1. On the **Select a single sign-on method** page, select **SAML**.
76
-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
72
+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.

79
75
80
-
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
76
+
1. On the **Basic SAML Configuration** section, perform the following steps:
81
77
82
-
a. In the **Identifier** text box, type a URL:
78
+
a. In the **Identifier** text box, type the value:
83
79
`iqn.com`
84
80
85
81
b. In the **Reply URL** text box, type a URL using the following pattern:
@@ -95,11 +91,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
95
91
96
92
1. IQNavigator application expect the Unique User Identifier value in the Name Identifier claim. Customer can map the correct value for the Name Identifier claim. In this case we have mapped the user.UserPrincipalName for the demo purpose. But according to your organization settings you should map the correct value for it.
97
93
98
-

94
+

99
95
100
96
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.

103
99
104
100
### Create an Azure AD test user
105
101
@@ -120,13 +116,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
120
116
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
121
117
1. In the applications list, select **IQNavigator VMS**.
122
118
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
123
-
124
-

125
-
126
119
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
127
-
128
-

129
-
130
120
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
131
121
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
132
122
1. In the **Add Assignment** dialog, click the **Assign** button.
@@ -141,16 +131,12 @@ In this section, you create a user called Britta Simon in IQNavigator VMS. Work
141
131
142
132
## Test SSO
143
133
144
-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
145
-
146
-
When you click the IQNavigator VMS tile in the Access Panel, you should be automatically signed in to the IQNavigator VMS for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
147
-
148
-
## Additional resources
134
+
In this section, you test your Azure AD single sign-on configuration with following options.
149
135
150
-
-[ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](./tutorial-list.md)
136
+
* Click on Test this application in Azure portal and you should be automatically signed in to the IQNavigator VMS for which you set up the SSO.
151
137
152
-
-[What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
138
+
* You can use Microsoft My Apps. When you click the IQNavigator VMS tile in the My Apps, you should be automatically signed in to the IQNavigator VMS for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
153
139
154
-
-[What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
140
+
## Next steps
155
141
156
-
-[Try IQNavigator VMS with Azure AD](https://aad.portal.azure.com/)
142
+
Once you configure IQNavigator VMS you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/iserver-portal-tutorial.md
+29-31Lines changed: 29 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with iServer Portal | Microsoft Docs'
2
+
title: 'Tutorial: Azure AD SSO integration with iServer Portal'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and iServer Portal.
4
4
services: active-directory
5
5
author: jeevansd
@@ -9,49 +9,49 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 08/28/2019
12
+
ms.date: 06/29/2022
13
13
ms.author: jeedes
14
14
---
15
15
16
-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with iServer Portal
16
+
# Tutorial: Azure AD SSO integration with iServer Portal
17
17
18
18
In this tutorial, you'll learn how to integrate iServer Portal with Azure Active Directory (Azure AD). When you integrate iServer Portal with Azure AD, you can:
19
19
20
20
* Control in Azure AD who has access to iServer Portal.
21
21
* Enable your users to be automatically signed-in to iServer Portal with their Azure AD accounts.
22
22
* Manage your accounts in one central location - the Azure portal.
23
23
24
-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](../manage-apps/what-is-single-sign-on.md).
25
-
26
24
## Prerequisites
27
25
28
26
To get started, you need the following items:
29
27
30
28
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
31
29
* iServer Portal single sign-on (SSO) enabled subscription.
30
+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
31
+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
32
32
33
33
## Scenario description
34
34
35
35
In this tutorial, you configure and test Azure AD SSO in a test environment.
36
36
37
-
* iServer Portal supports **SP and IDP** initiated SSO
37
+
* iServer Portal supports **SP and IDP** initiated SSO.
38
38
39
-
## Adding iServer Portal from the gallery
39
+
## Add iServer Portal from the gallery
40
40
41
41
To configure the integration of iServer Portal into Azure AD, you need to add iServer Portal from the gallery to your list of managed SaaS apps.
42
42
43
-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
43
+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
44
44
1. On the left navigation pane, select the **Azure Active Directory** service.
45
45
1. Navigate to **Enterprise Applications** and then select **All Applications**.
46
46
1. To add new application, select **New application**.
47
47
1. In the **Add from the gallery** section, type **iServer Portal** in the search box.
48
48
1. Select **iServer Portal** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
49
49
50
-
## Configure and test Azure AD single sign-on for iServer Portal
50
+
## Configure and test Azure AD SSO for iServer Portal
51
51
52
52
Configure and test Azure AD SSO with iServer Portal using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in iServer Portal.
53
53
54
-
To configure and test Azure AD SSO with iServer Portal, complete the following building blocks:
54
+
To configure and test Azure AD SSO with iServer Portal, perform the following steps:
55
55
56
56
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
57
57
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
@@ -64,15 +64,15 @@ To configure and test Azure AD SSO with iServer Portal, complete the following b
64
64
65
65
Follow these steps to enable Azure AD SSO in the Azure portal.
66
66
67
-
1. In the [Azure portal](https://portal.azure.com/), on the **iServer Portal** application integration page, find the **Manage** section and select **single sign-on**.
67
+
1. In the Azure portal, on the **iServer Portal** application integration page, find the **Manage** section and select **single sign-on**.
68
68
1. On the **Select a single sign-on method** page, select **SAML**.
69
-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
69
+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.

72
72
73
-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
73
+
1. On the **Basic SAML Configuration** section, perform the following steps:
74
74
75
-
a. In the **Identifier** text box, type a URL using the following pattern:
75
+
a. In the **Identifier** text box, type a value using the following pattern:
76
76
`iserver-portal-<myiserverportal>`
77
77
78
78
b. In the **Reply URL** text box, type a URL using the following pattern:
@@ -88,15 +88,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
88
88
89
89
1. In the **SAML Signing Certificate** section, click **Edit** button to open **SAML Signing Certificate** dialog.

100
100
101
101
### Create an Azure AD test user
102
102
@@ -117,13 +117,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
117
117
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
118
118
1. In the applications list, select **iServer Portal**.
119
119
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
120
-
121
-

122
-
123
120
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
124
-
125
-

126
-
127
121
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
128
122
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
129
123
1. In the **Add Assignment** dialog, click the **Assign** button.
@@ -138,16 +132,20 @@ In this section, you create a user called B.Simon in iServer Portal. Work with
138
132
139
133
## Test SSO
140
134
141
-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
135
+
In this section, you test your Azure AD single sign-on configuration with following options.
136
+
137
+
#### SP initiated:
138
+
139
+
* Click on **Test this application** in Azure portal. This will redirect to iServer Portal Sign-On URL where you can initiate the login flow.
142
140
143
-
When you click the iServer Portal tile in the Access Panel, you should be automatically signed in to the iServer Portal for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
141
+
* Go to iServer Portal Sign-On URL directly and initiate the login flow from there.
144
142
145
-
##Additional resources
143
+
#### IDP initiated:
146
144
147
-
-[ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](./tutorial-list.md)
145
+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the iServer Portal for which you set up the SSO.
148
146
149
-
-[What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
147
+
You can also use Microsoft My Apps to test the application in any mode. When you click the iServer Portal tile in the My Apps, if configured in SP mode you would be redirected to the application Sign-On page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the iServer Portal for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
150
148
151
-
-[What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
149
+
## Next steps
152
150
153
-
-[Try iServer Portal with Azure AD](https://aad.portal.azure.com/)
151
+
Once you configure iServer Portal you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
0 commit comments