You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/10000ftplans-tutorial.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,10 +38,8 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
38
38
39
39
To configure the integration of 10,000ft Plans into Azure AD, you need to add 10,000ft Plans from the gallery to your list of managed SaaS apps.
40
40
41
-
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
42
-
1. On the left navigation pane, select the **Azure Active Directory** service.
43
-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
44
-
1. To add new application, select **New application**.
41
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. In the **Add from the gallery** section, type **10,000ft Plans** in the search box.
46
44
1. Select **10,000ft Plans** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
47
45
@@ -64,13 +62,14 @@ To configure and test Azure AD SSO with 10,000ft Plans, perform the following st
64
62
65
63
Follow these steps to enable Azure AD SSO in the Azure portal.
66
64
67
-
1. In the Azure portal, on the **10,000ft Plans** application integration page, find the **Manage** section and select **single sign-on**.
65
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4. On the **Basic SAML Configuration** section, perform the following steps:
72
+
1. On the **Basic SAML Configuration** section, perform the following steps:
74
73
75
74
a. In the **Identifier (Entity ID)** text box, type the URL:
76
75
`https://rm.smartsheet.com/saml/metadata`
@@ -89,20 +88,22 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
89
88
90
89
In this section, you'll create a test user in the Azure portal called B.Simon.
91
90
92
-
1.In the Azure portal, in the **Azure services** pane, select **Users**, and then select **All users**.
93
-
1. Select **New user** at the top of the screen.
91
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
92
+
1. Browse to **Identity** > **Users** > **All users**.
93
+
1. Select **New user** > **Create new user**, at the top of the screen.
94
94
1. In the **User** properties, follow these steps:
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
98
-
1. Click **Create**.
98
+
1. Select **Review + create**.
99
+
1. Select **Create**.
99
100
100
101
### Assign the Azure AD test user
101
102
102
103
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 10,000ft Plans.
103
104
104
-
1.In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
105
-
1.In the applications list, select**10,000ft Plans**.
105
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
106
+
1.Browse to **Identity** > **Applications** > **Enterprise applications** >**10,000ft Plans**.
106
107
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
107
108
1. Select **Add user/group**, then select **Users and groups** in the **Add Assignment** dialog.
108
109
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/123formbuilder-tutorial.md
+19-18Lines changed: 19 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,10 +39,8 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
39
39
40
40
To configure the integration of 123FormBuilder SSO into Azure AD, you need to add 123FormBuilder SSO from the gallery to your list of managed SaaS apps.
41
41
42
-
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
43
-
1. On the left navigation pane, select the **Azure Active Directory** service.
44
-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
45
-
1. To add new application, select **New application**.
42
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. In the **Add from the gallery** section, type **123FormBuilder SSO** in the search box.
47
45
1. Select **123FormBuilder SSO** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
48
46
@@ -65,13 +63,14 @@ To configure and test Azure AD SSO with 123FormBuilder SSO, perform the followin
65
63
66
64
Follow these steps to enable Azure AD SSO in the Azure portal.
67
65
68
-
1. In the Azure portal, on the **123FormBuilder SSO** application integration page, find the **Manage** section and select **single sign-on**.
66
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
73
+
1. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
75
74
76
75
a. In the **Identifier** text box, type a URL using the following pattern: `https://www.123formbuilder.com/saml/azure_ad/<TENANT_ID>/metadata`
77
76
@@ -97,25 +96,27 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
97
96
98
97
In this section, you'll create a test user in the Azure portal called B.Simon.
99
98
100
-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
101
-
1. Select **New user** at the top of the screen.
99
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
100
+
1. Browse to **Identity** > **Users** > **All users**.
101
+
1. Select **New user** > **Create new user**, at the top of the screen.
102
102
1. In the **User** properties, follow these steps:
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
106
-
1. Click **Create**.
106
+
1. Select **Review + create**.
107
+
1. Select **Create**.
107
108
108
109
### Assign the Azure AD test user
109
110
110
111
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 123FormBuilder SSO.
111
112
112
-
1.In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
113
-
1.In the applications list, select**123FormBuilder SSO**.
114
-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
115
-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
116
-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
117
-
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
118
-
1. In the **Add Assignment** dialog, click the **Assign** button.
113
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
114
+
1.Browse to **Identity** > **Applications** > **Enterprise applications** >**123FormBuilder SSO**.
115
+
1. In the app's overview page, select **Users and groups**.
116
+
1. Select **Add user/group**, then select **Users and groups** in the **Add Assignment** dialog.
117
+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
118
+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
119
+
1. In the **Add Assignment** dialog, click the **Assign** button.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/15five-provisioning-tutorial.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,11 +80,12 @@ This section guides you through the steps to configure the Azure AD provisioning
80
80
81
81
### To configure automatic user provisioning for 15Five in Azure AD:
82
82
83
-
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
83
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
84
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/15five-tutorial.md
+21-20Lines changed: 21 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,10 +38,8 @@ In this tutorial, you configure and test Azure AD single sign-on in a test envir
38
38
39
39
To configure the integration of 15Five into Azure AD, you need to add 15Five from the gallery to your list of managed SaaS apps.
40
40
41
-
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
42
-
1. On the left navigation pane, select the **Azure Active Directory** service.
43
-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
44
-
1. To add new application, select **New application**.
41
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. In the **Add from the gallery** section, type **15Five** in the search box.
46
44
1. Select **15Five** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
47
45
@@ -64,13 +62,14 @@ To configure and test Azure AD SSO with 15Five, perform the following steps:
64
62
65
63
Follow these steps to enable Azure AD SSO in the Azure portal.
66
64
67
-
1. In the Azure portal, on the **15Five** application integration page, find the **Manage** section and select **single sign-on**.
65
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4. On the **Basic SAML Configuration** section, perform the following steps:
72
+
1. On the **Basic SAML Configuration** section, perform the following steps:
74
73
75
74
a. In the **Sign on URL** text box, type a URL using the following pattern:
76
75
`https://<COMPANY_NAME>.15five.com`
@@ -81,37 +80,39 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
81
80
> [!NOTE]
82
81
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [15Five Client support team](https://www.15five.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
83
82
84
-
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
83
+
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
In this section, you'll create a test user in the Azure portal called B.Simon.
95
94
96
-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
97
-
1. Select **New user** at the top of the screen.
95
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
96
+
1. Browse to **Identity** > **Users** > **All users**.
97
+
1. Select **New user** > **Create new user**, at the top of the screen.
98
98
1. In the **User** properties, follow these steps:
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
102
-
1. Click **Create**.
102
+
1. Select **Review + create**.
103
+
1. Select **Create**.
103
104
104
105
### Assign the Azure AD test user
105
106
106
107
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 15Five.
107
108
108
-
1.In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
109
-
1.In the applications list, select**15Five**.
110
-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
111
-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
112
-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
113
-
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
114
-
1. In the **Add Assignment** dialog, click the **Assign** button.
109
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
110
+
1.Browse to **Identity** > **Applications** > **Enterprise applications** >**15Five**.
111
+
1. In the app's overview page, select **Users and groups**.
112
+
1. Select **Add user/group**, then select **Users and groups** in the **Add Assignment** dialog.
113
+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
114
+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
115
+
1. In the **Add Assignment** dialog, click the **Assign** button.
0 commit comments