Skip to content

Commit d0da544

Browse files
Merge pull request #203253 from bhavana-129/tutorial-to-update-166
SaaS App Tutorial: TutorialtoUpdate166
2 parents e6fdcfa + c0a8b62 commit d0da544

File tree

13 files changed

+281
-463
lines changed

13 files changed

+281
-463
lines changed
Lines changed: 22 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with IQNavigator VMS | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with IQNavigator VMS'
33
description: Learn how to configure single sign-on between Azure Active Directory and IQNavigator VMS.
44
services: active-directory
55
author: jeevansd
@@ -9,56 +9,52 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 10/23/2019
12+
ms.date: 06/29/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with IQNavigator VMS
16+
# Tutorial: Azure AD SSO integration with IQNavigator VMS
1717

1818
In this tutorial, you'll learn how to integrate IQNavigator VMS with Azure Active Directory (Azure AD). When you integrate IQNavigator VMS with Azure AD, you can:
1919

2020
* Control in Azure AD who has access to IQNavigator VMS.
2121
* Enable your users to be automatically signed-in to IQNavigator VMS with their Azure AD accounts.
2222
* Manage your accounts in one central location - the Azure portal.
2323

24-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](../manage-apps/what-is-single-sign-on.md).
25-
2624
## Prerequisites
2725

2826
To get started, you need the following items:
2927

3028
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3129
* IQNavigator VMS single sign-on (SSO) enabled subscription.
30+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
31+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3232

3333
## Scenario description
3434

3535
In this tutorial, you configure and test Azure AD SSO in a test environment.
3636

37-
38-
* IQNavigator VMS supports **IDP** initiated SSO
37+
* IQNavigator VMS supports **IDP** initiated SSO.
3938

4039
> [!NOTE]
4140
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
4241
43-
44-
45-
## Adding IQNavigator VMS from the gallery
42+
## Add IQNavigator VMS from the gallery
4643

4744
To configure the integration of IQNavigator VMS into Azure AD, you need to add IQNavigator VMS from the gallery to your list of managed SaaS apps.
4845

49-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
46+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
5047
1. On the left navigation pane, select the **Azure Active Directory** service.
5148
1. Navigate to **Enterprise Applications** and then select **All Applications**.
5249
1. To add new application, select **New application**.
5350
1. In the **Add from the gallery** section, type **IQNavigator VMS** in the search box.
5451
1. Select **IQNavigator VMS** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5552

56-
57-
## Configure and test Azure AD single sign-on for IQNavigator VMS
53+
## Configure and test Azure AD SSO for IQNavigator VMS
5854

5955
Configure and test Azure AD SSO with IQNavigator VMS using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in IQNavigator VMS.
6056

61-
To configure and test Azure AD SSO with IQNavigator VMS, complete the following building blocks:
57+
To configure and test Azure AD SSO with IQNavigator VMS, perform the following steps:
6258

6359
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
6460
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
@@ -71,15 +67,15 @@ To configure and test Azure AD SSO with IQNavigator VMS, complete the following
7167

7268
Follow these steps to enable Azure AD SSO in the Azure portal.
7369

74-
1. In the [Azure portal](https://portal.azure.com/), on the **IQNavigator VMS** application integration page, find the **Manage** section and select **single sign-on**.
70+
1. In the Azure portal, on the **IQNavigator VMS** application integration page, find the **Manage** section and select **single sign-on**.
7571
1. On the **Select a single sign-on method** page, select **SAML**.
76-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
72+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7773

78-
![Edit Basic SAML Configuration](common/edit-urls.png)
74+
![Screenshot shows to edit Basic S A M L Configuration.](common/edit-urls.png "Basic Configuration")
7975

80-
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
76+
1. On the **Basic SAML Configuration** section, perform the following steps:
8177

82-
a. In the **Identifier** text box, type a URL:
78+
a. In the **Identifier** text box, type the value:
8379
`iqn.com`
8480

8581
b. In the **Reply URL** text box, type a URL using the following pattern:
@@ -95,11 +91,11 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9591

9692
1. IQNavigator application expect the Unique User Identifier value in the Name Identifier claim. Customer can map the correct value for the Name Identifier claim. In this case we have mapped the user.UserPrincipalName for the demo purpose. But according to your organization settings you should map the correct value for it.
9793

98-
![image](common/edit-attribute.png)
94+
![Screenshot shows the image of IQNavigator application.](common/edit-attribute.png "Image")
9995

10096
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
10197

102-
![The Certificate download link](common/copy-metadataurl.png)
98+
![Screenshot shows the Certificate download link.](common/copy-metadataurl.png "Certificate")
10399

104100
### Create an Azure AD test user
105101

@@ -120,13 +116,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
120116
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
121117
1. In the applications list, select **IQNavigator VMS**.
122118
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
123-
124-
![The "Users and groups" link](common/users-groups-blade.png)
125-
126119
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
127-
128-
![The Add User link](common/add-assign-user.png)
129-
130120
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
131121
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
132122
1. In the **Add Assignment** dialog, click the **Assign** button.
@@ -141,16 +131,12 @@ In this section, you create a user called Britta Simon in IQNavigator VMS. Work
141131

142132
## Test SSO
143133

144-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
145-
146-
When you click the IQNavigator VMS tile in the Access Panel, you should be automatically signed in to the IQNavigator VMS for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
147-
148-
## Additional resources
134+
In this section, you test your Azure AD single sign-on configuration with following options.
149135

150-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](./tutorial-list.md)
136+
* Click on Test this application in Azure portal and you should be automatically signed in to the IQNavigator VMS for which you set up the SSO.
151137

152-
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
138+
* You can use Microsoft My Apps. When you click the IQNavigator VMS tile in the My Apps, you should be automatically signed in to the IQNavigator VMS for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
153139

154-
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
140+
## Next steps
155141

156-
- [Try IQNavigator VMS with Azure AD](https://aad.portal.azure.com/)
142+
Once you configure IQNavigator VMS you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/iserver-portal-tutorial.md

Lines changed: 29 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with iServer Portal | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with iServer Portal'
33
description: Learn how to configure single sign-on between Azure Active Directory and iServer Portal.
44
services: active-directory
55
author: jeevansd
@@ -9,49 +9,49 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 08/28/2019
12+
ms.date: 06/29/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with iServer Portal
16+
# Tutorial: Azure AD SSO integration with iServer Portal
1717

1818
In this tutorial, you'll learn how to integrate iServer Portal with Azure Active Directory (Azure AD). When you integrate iServer Portal with Azure AD, you can:
1919

2020
* Control in Azure AD who has access to iServer Portal.
2121
* Enable your users to be automatically signed-in to iServer Portal with their Azure AD accounts.
2222
* Manage your accounts in one central location - the Azure portal.
2323

24-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](../manage-apps/what-is-single-sign-on.md).
25-
2624
## Prerequisites
2725

2826
To get started, you need the following items:
2927

3028
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
3129
* iServer Portal single sign-on (SSO) enabled subscription.
30+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
31+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3232

3333
## Scenario description
3434

3535
In this tutorial, you configure and test Azure AD SSO in a test environment.
3636

37-
* iServer Portal supports **SP and IDP** initiated SSO
37+
* iServer Portal supports **SP and IDP** initiated SSO.
3838

39-
## Adding iServer Portal from the gallery
39+
## Add iServer Portal from the gallery
4040

4141
To configure the integration of iServer Portal into Azure AD, you need to add iServer Portal from the gallery to your list of managed SaaS apps.
4242

43-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
43+
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4444
1. On the left navigation pane, select the **Azure Active Directory** service.
4545
1. Navigate to **Enterprise Applications** and then select **All Applications**.
4646
1. To add new application, select **New application**.
4747
1. In the **Add from the gallery** section, type **iServer Portal** in the search box.
4848
1. Select **iServer Portal** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
4949

50-
## Configure and test Azure AD single sign-on for iServer Portal
50+
## Configure and test Azure AD SSO for iServer Portal
5151

5252
Configure and test Azure AD SSO with iServer Portal using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in iServer Portal.
5353

54-
To configure and test Azure AD SSO with iServer Portal, complete the following building blocks:
54+
To configure and test Azure AD SSO with iServer Portal, perform the following steps:
5555

5656
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
5757
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
@@ -64,15 +64,15 @@ To configure and test Azure AD SSO with iServer Portal, complete the following b
6464

6565
Follow these steps to enable Azure AD SSO in the Azure portal.
6666

67-
1. In the [Azure portal](https://portal.azure.com/), on the **iServer Portal** application integration page, find the **Manage** section and select **single sign-on**.
67+
1. In the Azure portal, on the **iServer Portal** application integration page, find the **Manage** section and select **single sign-on**.
6868
1. On the **Select a single sign-on method** page, select **SAML**.
69-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
69+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7070

71-
![Edit Basic SAML Configuration](common/edit-urls.png)
71+
![Screenshot shows to edit Basic S A M L Configuration.](common/edit-urls.png "Basic Configuration")
7272

73-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
73+
1. On the **Basic SAML Configuration** section, perform the following steps:
7474

75-
a. In the **Identifier** text box, type a URL using the following pattern:
75+
a. In the **Identifier** text box, type a value using the following pattern:
7676
`iserver-portal-<myiserverportal>`
7777

7878
b. In the **Reply URL** text box, type a URL using the following pattern:
@@ -88,15 +88,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8888

8989
1. In the **SAML Signing Certificate** section, click **Edit** button to open **SAML Signing Certificate** dialog.
9090

91-
![Edit SAML Signing Certificate](common/edit-certificate.png)
91+
![Screenshot shows to Edit SAML Signing Certificate.](common/edit-certificate.png "Certificate")
9292

9393
1. In the **SAML Signing Certificate** section, copy the **Thumbprint Value** and save it on your computer.
9494

95-
![Copy Thumbprint value](common/copy-thumbprint.png)
95+
![Screenshot shows to Copy Thumbprint value.](common/copy-thumbprint.png "Values")
9696

9797
1. On the **Set up iServer Portal** section, copy the appropriate URL(s) based on your requirement.
9898

99-
![Copy configuration URLs](common/copy-configuration-urls.png)
99+
![Screenshot shows to copy configuration appropriate U R L.](common/copy-configuration-urls.png "Metadata")
100100

101101
### Create an Azure AD test user
102102

@@ -117,13 +117,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
117117
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
118118
1. In the applications list, select **iServer Portal**.
119119
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
120-
121-
![The "Users and groups" link](common/users-groups-blade.png)
122-
123120
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
124-
125-
![The Add User link](common/add-assign-user.png)
126-
127121
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
128122
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
129123
1. In the **Add Assignment** dialog, click the **Assign** button.
@@ -138,16 +132,20 @@ In this section, you create a user called B.Simon in iServer Portal. Work with 
138132

139133
## Test SSO
140134

141-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
135+
In this section, you test your Azure AD single sign-on configuration with following options.
136+
137+
#### SP initiated:
138+
139+
* Click on **Test this application** in Azure portal. This will redirect to iServer Portal Sign-On URL where you can initiate the login flow.
142140

143-
When you click the iServer Portal tile in the Access Panel, you should be automatically signed in to the iServer Portal for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
141+
* Go to iServer Portal Sign-On URL directly and initiate the login flow from there.
144142

145-
## Additional resources
143+
#### IDP initiated:
146144

147-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](./tutorial-list.md)
145+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the iServer Portal for which you set up the SSO.
148146

149-
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
147+
You can also use Microsoft My Apps to test the application in any mode. When you click the iServer Portal tile in the My Apps, if configured in SP mode you would be redirected to the application Sign-On page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the iServer Portal for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
150148

151-
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
149+
## Next steps
152150

153-
- [Try iServer Portal with Azure AD](https://aad.portal.azure.com/)
151+
Once you configure iServer Portal you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
27.3 KB
Loading
12.2 KB
Loading
36.5 KB
Loading
5.03 KB
Loading
6.88 KB
Loading
22.7 KB
Loading
36.5 KB
Loading
102 KB
Loading

0 commit comments

Comments
 (0)