Skip to content

Commit dde51f7

Browse files
committed
update
1 parent da719df commit dde51f7

File tree

1 file changed

+9
-12
lines changed

1 file changed

+9
-12
lines changed

articles/active-directory/saas-apps/pendo-tutorial.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To get started, you need the following items:
4141
In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

4343
* Pendo supports **IDP** initiated SSO
44-
* Once you configure Pendo you can enforce session control, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
44+
* Once you configure Pendo you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4545

4646
## Adding Pendo from the gallery
4747

@@ -78,28 +78,25 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878

7979
![Edit Basic SAML Configuration](common/edit-urls.png)
8080

81-
1. On the **Set up single sign-on with SAML** page, enter the values for the following fields:
81+
1. On the **Set-up single sign-on with SAML** page, enter the values for the following fields:
8282

8383
a. In the **Identifier** text box, type a URL using the following pattern:
8484
`https://sso.connect.pingidentity.com/<CUSTOM_GUID>`
8585

8686
b. In the **Reply URL** text box, type a URL:
8787
`https://sso.connect.pingidentity.com/sso/sp/ACS.saml2`
8888

89-
> [!NOTE]
90-
> Identifier value is not real. Update this value with the actual Identifier. Contact [Pendo Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89+
c. In the **Relay State** text box, type a URL using the following pattern:
90+
`https://pingone.com/1.0/<CUSTOM_GUID>`
9191

92-
1. Pendo application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
92+
> [!NOTE]
93+
> These values are not real. Update these values with the actual Identifier and Relay State. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9394

94-
![image](common/default-attributes.png)
95+
1. Pendo application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes, where as **name** is mapped with **user.userprincipalname**. Pendo application expects **name** to be mapped with **user.mail**, so you need to edit the attribute mapping by clicking on **Edit** icon and change the attribute mapping.
9596

96-
1. In addition to above, Pendo application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
97-
98-
| Name | Source Attribute|
99-
| ----------| --------- |
100-
| name | user.mail |
97+
![image](common/edit-attribute.png)
10198

102-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
99+
1. On the **Set-up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
103100

104101
![The Certificate download link](common/metadataxml.png)
105102

0 commit comments

Comments
 (0)