You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/pendo-tutorial.md
+9-12Lines changed: 9 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ To get started, you need the following items:
41
41
In this tutorial, you configure and test Azure AD SSO in a test environment.
42
42
43
43
* Pendo supports **IDP** initiated SSO
44
-
* Once you configure Pendo you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
44
+
* Once you configure Pendo you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in realtime. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45
45
46
46
## Adding Pendo from the gallery
47
47
@@ -78,28 +78,25 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
> Identifier value is not real. Update this value with the actual Identifier. Contact [Pendo Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89
+
c. In the **Relay State** text box, type a URL using the following pattern:
90
+
`https://pingone.com/1.0/<CUSTOM_GUID>`
91
91
92
-
1. Pendo application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
92
+
> [!NOTE]
93
+
> These values are not real. Update these values with the actual Identifier and Relay State. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
93
94
94
-

95
+
1. Pendo application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of defaultattributes, where as **name** is mapped with **user.userprincipalname**. Pendo application expects **name** to be mapped with **user.mail**, so you need to edit the attribute mapping by clicking on **Edit** icon and change the attribute mapping.
95
96
96
-
1. In addition to above, Pendo application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
97
-
98
-
| Name | Source Attribute|
99
-
| ----------| --------- |
100
-
| name | user.mail |
97
+

101
98
102
-
1. On the **Setup single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
99
+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
0 commit comments