Skip to content

Commit d340612

Browse files
authored
Merge pull request #243238 from v-hgampala/sailpoint
Product Backlog Item 2616660: SaaS App Tutorial: SailPoint IdentityNo…
2 parents b68919b + 21c7883 commit d340612

File tree

2 files changed

+28
-5
lines changed

2 files changed

+28
-5
lines changed
127 KB
Loading

articles/active-directory/saas-apps/sailpoint-identitynow-tutorial.md

Lines changed: 28 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 06/28/2023
1313
ms.author: jeedes
1414

1515
---
@@ -124,11 +124,34 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
124124

125125
## Configure SailPoint IdentityNow SSO
126126

127-
To configure single sign-on on **SailPoint IdentityNow** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [SailPoint IdentityNow support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
127+
1. In a different web browser window, sign in to your SailPoint IdentityNow company site as an administrator.
128+
129+
1. Go to **Global -> Security Settings -> Service Provider** make the following configuration changes.
130+
131+
[![Screenshot of sailpoint sso configuration.](./media/sailpoint-identitynow-tutorial/configuration.png "sailpoint")](./media/sailpoint-identitynow-tutorial/configuration.png#lightbox)
132+
133+
a. Enable Remote Identity Provider.
134+
135+
b. In the **Entity ID** field, paste **Entity ID** value, which you have copied from the Azure portal.
136+
137+
c. In the **Login URL for Post** field, paste **Login URL** value, which you have copied from the Azure portal.
138+
139+
d. In the **Login URL for Redirect** field, paste **Login URL** value, which you have copied from the Azure portal.
140+
141+
e. In the **Logout URL** field, enter the value `https://<IDN Tenant>.login.sailpoint.com/signout`.
142+
143+
f. In the **SAML Request Attribute** section, select the following values.
144+
145+
* Identity Mapping Attribute - `uid`
146+
* SAML NameID - `Unspecified`
147+
* SAML Binding - `Post`
148+
* Exclude Requested Authentication Context - `checked`
149+
150+
g. In the **Signing Certificate**, click on **Import** to upload the downloaded **Certificate (Base64)** from Azure portal.
128151

129152
### Create SailPoint IdentityNow test user
130153

131-
In this section, you create a user called Britta Simon in SailPoint IdentityNow. Work with [SailPoint IdentityNow support team](mailto:[email protected]) to add the users in the SailPoint IdentityNow platform. Users must be created and activated before you use single sign-on.
154+
In this section, you create a user called Britta Simon in SailPoint IdentityNow. Work with [SailPoint IdentityNow support team](mailto:[email protected]) to add the users in the SailPoint IdentityNow platform. Users must be created and activated before you use single sign-on.
132155

133156
## Test SSO
134157

@@ -144,8 +167,8 @@ In this section, you test your Azure AD single sign-on configuration with follow
144167

145168
* Click on **Test this application** in Azure portal and you should be automatically signed in to the SailPoint IdentityNow for which you set up the SSO.
146169

147-
You can also use Microsoft My Apps to test the application in any mode. When you click the SailPoint IdentityNow tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the SailPoint IdentityNow for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
170+
You can also use Microsoft My Apps to test the application in any mode. When you click the SailPoint IdentityNow tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the SailPoint IdentityNow for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
148171

149172
## Next steps
150173

151-
Once you configure SailPoint IdentityNow you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
174+
Once you configure SailPoint IdentityNow you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)