Skip to content

Commit dad7264

Browse files
committed
update
1 parent 8276e0e commit dad7264

File tree

1 file changed

+70
-137
lines changed

1 file changed

+70
-137
lines changed
Lines changed: 70 additions & 137 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with iProva | Microsoft Docs'
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with iProva | Microsoft Docs'
33
description: Learn how to configure single sign-on between Azure Active Directory and iProva.
44
services: active-directory
55
documentationCenter: na
@@ -14,74 +14,61 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 04/14/2019
17+
ms.date: 08/27/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
2121
---
22-
# Tutorial: Azure Active Directory integration with iProva
2322

24-
In this tutorial, you learn how to integrate iProva with Azure Active Directory (Azure AD).
25-
Integrating iProva with Azure AD provides you with the following benefits:
23+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with iProva
2624

27-
* You can control in Azure AD who has access to iProva.
28-
* You can enable your users to be automatically signed-in to iProva (Single Sign-On) with their Azure AD accounts.
29-
* You can manage your accounts in one central location - the Azure portal.
25+
In this tutorial, you'll learn how to integrate iProva with Azure Active Directory (Azure AD). When you integrate iProva with Azure AD, you can:
3026

31-
If you want to know more details about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32-
If you don't have an Azure subscription, [create a free account](https://azure.microsoft.com/free/) before you begin.
27+
* Control in Azure AD who has access to iProva.
28+
* Enable your users to be automatically signed-in to iProva with their Azure AD accounts.
29+
* Manage your accounts in one central location - the Azure portal.
30+
31+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
3332

3433
## Prerequisites
3534

36-
To configure Azure AD integration with iProva, you need the following items:
35+
To get started, you need the following items:
3736

38-
* An Azure AD subscription. If you don't have an Azure AD environment, you can get a [free account](https://azure.microsoft.com/free/)
39-
* iProva single sign-on enabled subscription
37+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
38+
* iProva single sign-on (SSO) enabled subscription.
4039

4140
## Scenario description
4241

43-
In this tutorial, you configure and test Azure AD single sign-on in a test environment.
42+
In this tutorial, you configure and test Azure AD SSO in a test environment.
4443

4544
* iProva supports **SP** initiated SSO
4645

4746
## Adding iProva from the gallery
4847

4948
To configure the integration of iProva into Azure AD, you need to add iProva from the gallery to your list of managed SaaS apps.
5049

51-
**To add iProva from the gallery, perform the following steps:**
52-
53-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
54-
55-
![The Azure Active Directory button](common/select-azuread.png)
56-
57-
2. Navigate to **Enterprise Applications** and then select the **All Applications** option.
58-
59-
![The Enterprise applications blade](common/enterprise-applications.png)
60-
61-
3. To add new application, click **New application** button on the top of dialog.
50+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
51+
1. On the left navigation pane, select the **Azure Active Directory** service.
52+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
53+
1. To add new application, select **New application**.
54+
1. In the **Add from the gallery** section, type **iProva** in the search box.
55+
1. Select **iProva** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
6256

63-
![The New application button](common/add-new-app.png)
57+
## Configure and test Azure AD single sign-on for iProva
6458

65-
4. In the search box, type **iProva**, select **iProva** from result panel then click **Add** button to add the application.
59+
Configure and test Azure AD SSO with iProva using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in iProva.
6660

67-
![iProva in the results list](common/search-new-app.png)
68-
69-
## Configure and test Azure AD single sign-on
70-
71-
In this section, you configure and test Azure AD single sign-on with iProva based on a test user called **Britta Simon**.
72-
For single sign-on to work, a link relationship between an Azure AD user and the related user in iProva needs to be established.
73-
74-
To configure and test Azure AD single sign-on with iProva, you need to complete the following building blocks:
61+
To configure and test Azure AD SSO with iProva, complete the following building blocks:
7562

7663
1. **[Retrieve configuration information from iProva](#retrieve-configuration-information-from-iprova)** as a preparation for the next steps.
77-
2. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
78-
3. **[Configure iProva Single Sign-On](#configure-iprova-single-sign-on)** - to configure the Single Sign-On settings on application side.
79-
4. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
80-
5. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
81-
6. **[Create iProva test user](#create-iprova-test-user)** - to have a counterpart of Britta Simon in iProva that is linked to the Azure AD representation of user.
82-
7. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
64+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
65+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
66+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67+
1. **[Configure iProva SSO](#configure-iprova-sso)** - to configure the single sign-on settings on application side.
68+
1. **[Create iProva test user](#create-iprova-test-user)** - to have a counterpart of B.Simon in iProva that is linked to the Azure AD representation of user.
69+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
8370

84-
### Retrieve configuration information from iProva
71+
## Retrieve configuration information from iProva
8572

8673
In this section, you retrieve information from iProva to configure Azure AD single sign-on.
8774

@@ -95,27 +82,19 @@ In this section, you retrieve information from iProva to configure Azure AD sing
9582

9683
![View the iProva SAML2 info page](media/iprova-tutorial/iprova-saml2-info.png)
9784

98-
2. Leave the browser tab open while you proceed with the next steps in another browser tab.
99-
100-
### Configure Azure AD single sign-on
101-
102-
In this section, you enable Azure AD single sign-on in the Azure portal.
103-
104-
To configure Azure AD single sign-on with iProva, perform the following steps:
85+
1. Leave the browser tab open while you proceed with the next steps in another browser tab.
10586

106-
1. In the [Azure portal](https://portal.azure.com/), on the **iProva** application integration page, select **Single sign-on**.
87+
## Configure Azure AD SSO
10788

108-
![Configure single sign-on link](common/select-sso.png)
89+
Follow these steps to enable Azure AD SSO in the Azure portal.
10990

110-
2. On the **Select a Single sign-on method** dialog, select **SAML/WS-Fed** mode to enable single sign-on.
91+
1. In the [Azure portal](https://portal.azure.com/), on the **iProva** application integration page, find the **Manage** section and select **single sign-on**.
92+
1. On the **Select a single sign-on method** page, select **SAML**.
93+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
11194

112-
![Single sign-on select mode](common/select-saml-option.png)
95+
![Edit Basic SAML Configuration](common/edit-urls.png)
11396

114-
3. On the **Set up Single Sign-On with SAML** page, click **Edit** icon to open **Basic SAML Configuration** dialog.
115-
116-
![Edit Basic SAML Configuration](common/edit-urls.png)
117-
118-
4. On the **Basic SAML Configuration** section, perform the following steps:
97+
1. On the **Basic SAML Configuration** section, perform the following steps:
11998

12099
![iProva Domain and URLs single sign-on information](common/sp-identifier-reply.png)
121100

@@ -125,39 +104,41 @@ To configure Azure AD single sign-on with iProva, perform the following steps:
125104

126105
c. Fill the **Sign-on URL** box with the value that's displayed behind the label **Sign-on URL** on the **iProva SAML2 info** page. This page is still open in your other browser tab.
127106

128-
5. iProva application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the **User Attributes** section on application integration page. On the **Set up Single Sign-On with SAML** page, click **Edit** button to open **User Attributes** dialog.
129-
130-
![image](common/edit-attribute.png)
107+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
131108

132-
6. In the **User Claims** section on the **User Attributes** dialog, edit the claims by using **Edit icon** or add the claims by using **Add new claim** to configure SAML token attribute as shown in the image above and perform the following steps:
133-
134-
| Name | Source Attribute| Namespace |
135-
| ---------------| -------- | -----|
136-
| `samaccountname` | `user.onpremisessamaccountname`| `http://schemas.xmlsoap.org/ws/2005/05/identity/claims`|
137-
138-
a. Click **Add new claim** to open the **Manage user claims** dialog.
109+
![The Certificate download link](common/copy-metadataurl.png)
139110

140-
![image](common/new-save-attribute.png)
111+
### Create an Azure AD test user
141112

142-
![image](common/new-attribute-details.png)
113+
In this section, you'll create a test user in the Azure portal called B.Simon.
143114

144-
b. In the **Name** textbox, type the attribute name shown for that row.
115+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
116+
1. Select **New user** at the top of the screen.
117+
1. In the **User** properties, follow these steps:
118+
1. In the **Name** field, enter `B.Simon`.
119+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
120+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
121+
1. Click **Create**.
145122

146-
c. In the **Namespace** textbox, type the namespace value shown for that row.
123+
### Assign the Azure AD test user
147124

148-
d. Select Source as **Attribute**.
125+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to iProva.
149126

150-
e. From the **Source attribute** list, type the attribute value shown for that row.
127+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
128+
1. In the applications list, select **iProva**.
129+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
151130

152-
f. Click **Ok**
131+
![The "Users and groups" link](common/users-groups-blade.png)
153132

154-
g. Click **Save**.
133+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
155134

156-
7. On the **Set up Single Sign-On with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
135+
![The Add User link](common/add-assign-user.png)
157136

158-
![The Certificate download link](common/copy-metadataurl.png)
137+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
138+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
139+
1. In the **Add Assignment** dialog, click the **Assign** button.
159140

160-
### Configure iProva Single Sign-On
141+
## Configure iProva SSO
161142

162143
1. Sign in to iProva by using the **Administrator** account.
163144

@@ -199,56 +180,6 @@ To configure Azure AD single sign-on with iProva, perform the following steps:
199180

200181
18. You now return to the **Edit general settings** screen. Scroll down to the bottom of the page, and select **OK** to save your configuration.
201182

202-
### Create an Azure AD test user
203-
204-
The objective of this section is to create a test user in the Azure portal called Britta Simon.
205-
206-
1. In the Azure portal, in the left pane, select **Azure Active Directory**, select **Users**, and then select **All users**.
207-
208-
![The "Users and groups" and "All users" links](common/users.png)
209-
210-
2. Select **New user** at the top of the screen.
211-
212-
![New user Button](common/new-user.png)
213-
214-
3. In the User properties, perform the following steps.
215-
216-
![The User dialog box](common/user-properties.png)
217-
218-
a. In the **Name** field enter **BrittaSimon**.
219-
220-
b. In the **User name** field type `[email protected]`. For example, [email protected]
221-
222-
c. Select **Show password** check box, and then write down the value that's displayed in the Password box.
223-
224-
d. Click **Create**.
225-
226-
### Assign the Azure AD test user
227-
228-
In this section, you enable Britta Simon to use Azure single sign-on by granting access to iProva.
229-
230-
1. In the Azure portal, select **Enterprise Applications**, select **All applications**, then select **iProva**.
231-
232-
![Enterprise applications blade](common/enterprise-applications.png)
233-
234-
2. In the applications list, select **iProva**.
235-
236-
![The iProva link in the Applications list](common/all-applications.png)
237-
238-
3. In the menu on the left, select **Users and groups**.
239-
240-
![The "Users and groups" link](common/users-groups-blade.png)
241-
242-
4. Click the **Add user** button, then select **Users and groups** in the **Add Assignment** dialog.
243-
244-
![The Add Assignment pane](common/add-assign-user.png)
245-
246-
5. In the **Users and groups** dialog select **Britta Simon** in the Users list, then click the **Select** button at the bottom of the screen.
247-
248-
6. If you are expecting any role value in the SAML assertion then in the **Select Role** dialog select the appropriate role for the user from the list, then click the **Select** button at the bottom of the screen.
249-
250-
7. In the **Add Assignment** dialog click the **Assign** button.
251-
252183
### Create iProva test user
253184

254185
1. Sign in to iProva by using the **Administrator** account.
@@ -261,26 +192,28 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
261192

262193
5. Select **Add**.
263194

264-
6. In the **Username** box, enter the username of user like `BrittaSimon@contoso.com`.
195+
6. In the **Username** box, enter the username of user like `B.Simon@contoso.com`.
265196

266-
7. In the **Full name** box, enter a full name of user like **BrittaSimon**.
197+
7. In the **Full name** box, enter a full name of user like **B.Simon**.
267198

268199
8. Select the **No password (use single sign-on)** option.
269200

270-
9. In the **E-mail address** box, enter the email address of user like `BrittaSimon@contoso.com`.
201+
9. In the **E-mail address** box, enter the email address of user like `B.Simon@contoso.com`.
271202

272203
10. Scroll down to the end of the page, and select **Finish**.
273204

274-
### Test single sign-on
205+
## Test SSO
275206

276207
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
277208

278209
When you click the iProva tile in the Access Panel, you should be automatically signed in to the iProva for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
279210

280-
## Additional Resources
211+
## Additional resources
212+
213+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
281214

282-
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
215+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
283216

284-
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
217+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
285218

286-
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
219+
- [Try iProva with Azure AD](https://aad.portal.azure.com/)

0 commit comments

Comments
 (0)