Skip to content

Commit dd9c716

Browse files
authored
Merge pull request #251067 from Harshita-130901/Planview-Admin-update
Product Backlog Item 2678911: SaaS App Tutorial: Planview Admin Update
2 parents 7cd22bc + 9061f28 commit dd9c716

File tree

3 files changed

+44
-39
lines changed

3 files changed

+44
-39
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"redirect_url": "/azure/active-directory/saas-apps/gainsight-tutorial",
106106
"redirect_document_id": false
107107
},
108+
{
109+
"source_path_from_root": "/articles/active-directory/saas-apps/planview-id-tutorial.md",
110+
"redirect_url": "/azure/active-directory/saas-apps/planview-admin-tutorial",
111+
"redirect_document_id": false
112+
},
108113
{
109114
"source_path_from_root": "/articles/active-directory/saas-apps/postman-provisioning-tutorialy.md",
110115
"redirect_url": "/azure/active-directory/saas-apps/postman-provisioning-tutorial",
Lines changed: 37 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Azure AD SSO integration with Planview ID'
3-
description: Learn how to configure single sign-on between Azure Active Directory and Planview ID.
2+
title: 'Tutorial: Azure AD SSO integration with Planview Admin'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Planview Admin.
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -9,85 +9,85 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 09/12/2023
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure AD SSO integration with Planview ID
17+
# Tutorial: Azure AD SSO integration with Planview Admin
1818

19-
In this tutorial, you'll learn how to integrate Planview ID with Azure Active Directory (Azure AD). When you integrate Planview ID with Azure AD, you can:
19+
In this tutorial, you'll learn how to integrate Planview Admin with Azure Active Directory (Azure AD). When you integrate Planview Admin with Azure AD, you can:
2020

21-
* Control in Azure AD who has access to Planview ID.
22-
* Enable your users to be automatically signed-in to Planview ID with their Azure AD accounts.
21+
* Control in Azure AD who has access to Planview Admin.
22+
* Enable your users to be automatically signed-in to Planview Admin with their Azure AD accounts.
2323
* Manage your accounts in one central location - the Azure portal.
2424

2525
## Prerequisites
2626

2727
To get started, you need the following items:
2828

2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30-
* Planview ID single sign-on (SSO) enabled subscription.
30+
* Planview Admin single sign-on (SSO) enabled subscription.
3131
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
3232
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3333

3434
## Scenario description
3535

3636
In this tutorial, you configure and test Azure AD SSO in a test environment.
3737

38-
* Planview ID supports **SP** and **IDP** initiated SSO.
38+
* Planview Admin supports **SP** and **IDP** initiated SSO.
3939

40-
> [!NOTE]
41-
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
40+
## Add Planview Admin from the gallery
4241

43-
## Add Planview ID from the gallery
44-
45-
To configure the integration of Planview ID into Azure AD, you need to add Planview ID from the gallery to your list of managed SaaS apps.
42+
To configure the integration of Planview Admin into Azure AD, you need to add Planview Admin from the gallery to your list of managed SaaS apps.
4643

4744
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
4845
1. On the left navigation pane, select the **Azure Active Directory** service.
4946
1. Navigate to **Enterprise Applications** and then select **All Applications**.
5047
1. To add new application, select **New application**.
51-
1. In the **Add from the gallery** section, type **Planview ID** in the search box.
52-
1. Select **Planview ID** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
48+
1. In the **Add from the gallery** section, type **Planview Admin** in the search box.
49+
1. Select **Planview Admin** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5350

5451
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
5552

56-
## Configure and test Azure AD SSO for Planview ID
53+
## Configure and test Azure AD SSO for Planview Admin
5754

58-
Configure and test Azure AD SSO with Planview ID using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Planview ID.
55+
Configure and test Azure AD SSO with Planview Admin using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Planview Admin.
5956

60-
To configure and test Azure AD SSO with Planview ID, perform the following steps:
57+
To configure and test Azure AD SSO with Planview Admin, perform the following steps:
6158

6259
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
6360
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
6461
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
65-
1. **[Configure Planview ID SSO](#configure-planview-id-sso)** - to configure the single sign-on settings on application side.
66-
1. **[Create Planview ID test user](#create-planview-id-test-user)** - to have a counterpart of B.Simon in Planview ID that is linked to the Azure AD representation of user.
62+
1. **[Configure Planview Admin SSO](#configure-planview-admin-sso)** - to configure the single sign-on settings on application side.
63+
1. **[Create Planview Admin test user](#create-planview-admin-test-user)** - to have a counterpart of B.Simon in Planview Admin that is linked to the Azure AD representation of user.
6764
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
6865

6966
## Configure Azure AD SSO
7067

7168
Follow these steps to enable Azure AD SSO in the Azure portal.
7269

73-
1. In the Azure portal, on the **Planview ID** application integration page, find the **Manage** section and select **single sign-on**.
70+
1. In the Azure portal, on the **Planview Admin** application integration page, find the **Manage** section and select **single sign-on**.
7471
1. On the **Select a single sign-on method** page, select **SAML**.
7572
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
7673

7774
![Screenshot shows to edit Basic S A M L Configuration.](common/edit-urls.png "Basic Configuration")
7875

79-
1. On the **Basic SAML Configuration** section, perform the following step:
76+
1. On the **Basic SAML Configuration** section, perform the following steps:
77+
78+
a. In the **Identifier** textbox, type a URL using the following pattern:
79+
`https://id.planview.com/<EntityID>`
8080

81-
In the **Reply URL** textbox, type a URL using the following pattern:
81+
b. In the **Reply URL** textbox, type a URL using the following pattern:
8282
`https://<Region>.id.planview.com/api/loginsso/callback`
8383

84-
1. Click **Set additional URLs** and perform the following step, if you wish to configure the application in **SP** initiated mode:
84+
1. Perform the following step, if you wish to configure the application in **SP** initiated mode:
8585

8686
In the **Sign-on URL** text box, type a URL using the following pattern:
8787
`https://<Region>.id.planview.com`
8888

8989
> [!Note]
90-
> These values are not real. Update these values with the actual Reply URL and Sign on URL. Contact [Planview ID support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
90+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Planview Admin support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9191
9292
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
9393

@@ -107,40 +107,40 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
107107

108108
### Assign the Azure AD test user
109109

110-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Planview ID.
110+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Planview Admin.
111111

112112
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
113-
1. In the applications list, select **Planview ID**.
113+
1. In the applications list, select **Planview Admin**.
114114
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
115115
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
116116
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
117117
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
118118
1. In the **Add Assignment** dialog, click the **Assign** button.
119119

120-
## Configure Planview ID SSO
120+
## Configure Planview Admin SSO
121121

122-
To configure single sign-on on **Planview ID** side, you need to send the **App Federation Metadata Url** to [Planview ID support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
122+
To configure single sign-on on **Planview Admin** side, you need to send the **App Federation Metadata Url** to [Planview Admin support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
123123

124-
### Create Planview ID test user
124+
### Create Planview Admin test user
125125

126-
In this section, you create a user called Britta Simon in Planview ID. Work with [Planview ID support team](mailto:[email protected]) to add the users in the Planview ID platform. Users must be created and activated before you use single sign-on.
126+
In this section, you create a user called Britta Simon in Planview Admin. Work with [Planview Admin support team](mailto:[email protected]) to add the users in the Planview Admin platform. Users must be created and activated before you use single sign-on.
127127

128128
## Test SSO
129129

130130
In this section, you test your Azure AD single sign-on configuration with following options.
131131

132132
#### SP initiated:
133133

134-
* Click on **Test this application** in Azure portal. This will redirect to Planview ID Sign-on URL where you can initiate the login flow.
134+
* Click on **Test this application** in Azure portal. This will redirect to Planview Admin Sign-on URL where you can initiate the login flow.
135135

136-
* Go to Planview ID Sign-on URL directly and initiate the login flow from there.
136+
* Go to Planview Admin Sign-on URL directly and initiate the login flow from there.
137137

138138
#### IDP initiated:
139139

140-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Planview ID for which you set up the SSO.
140+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Planview Admin for which you set up the SSO.
141141

142-
You can also use Microsoft My Apps to test the application in any mode. When you click the Planview ID tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Planview ID for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
142+
You can also use Microsoft My Apps to test the application in any mode. When you click the Planview Admin tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Planview Admin for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
143143

144144
## Next steps
145145

146-
Once you configure Planview ID you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
146+
Once you configure Planview Admin you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1961,8 +1961,8 @@
19611961
href: planmyleave-tutorial.md
19621962
- name: Planview Enterprise One
19631963
href: planview-enterprise-one-tutorial.md
1964-
- name: Planview ID
1965-
href: planview-id-tutorial.md
1964+
- name: Planview Admin
1965+
href: planview-admin-tutorial.md
19661966
- name: Planview LeanKit
19671967
href: planview-leankit-tutorial.md
19681968
- name: Pluralsight

0 commit comments

Comments
 (0)