Skip to content

Commit e03d5ea

Browse files
authored
Merge pull request #254607 from Harshita-130901/CIC
Product Backlog Item 2718104: SaaS App Tutorial: CIC - Controle Intel…
2 parents cbc9187 + 7744475 commit e03d5ea

File tree

2 files changed

+143
-0
lines changed

2 files changed

+143
-0
lines changed
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
---
2+
title: Microsoft Entra SSO integration with CIC - Controle Inteligente de Compensação
3+
description: Learn how to configure single sign-on between Microsoft Entra ID and CIC - Controle Inteligente de Compensação.
4+
services: active-directory
5+
author: jeevansd
6+
manager: CelesteDG
7+
ms.reviewer: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: saas-app-tutorial
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 10/10/2023
13+
ms.author: jeedes
14+
15+
---
16+
17+
# Microsoft Entra SSO integration with CIC - Controle Inteligente de Compensação
18+
19+
In this tutorial, you'll learn how to integrate CIC - Controle Inteligente de Compensação with Microsoft Entra ID. When you integrate CIC - Controle Inteligente de Compensação with Microsoft Entra ID, you can:
20+
21+
* Control in Microsoft Entra ID who has access to CIC - Controle Inteligente de Compensação.
22+
* Enable your users to be automatically signed-in to CIC - Controle Inteligente de Compensação with their Microsoft Entra accounts.
23+
* Manage your accounts in one central location.
24+
25+
## Prerequisites
26+
27+
To integrate Microsoft Entra ID with CIC - Controle Inteligente de Compensação, you need:
28+
29+
* A Microsoft Entra subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30+
* CIC - Controle Inteligente de Compensação single sign-on (SSO) enabled subscription.
31+
32+
## Scenario description
33+
34+
In this tutorial, you configure and test Microsoft Entra SSO in a test environment.
35+
36+
* CIC - Controle Inteligente de Compensação supports **SP** initiated SSO.
37+
38+
> [!NOTE]
39+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
40+
41+
## Add CIC - Controle Inteligente de Compensação from the gallery
42+
43+
To configure the integration of CIC - Controle Inteligente de Compensação into Microsoft Entra ID, you need to add CIC - Controle Inteligente de Compensação from the gallery to your list of managed SaaS apps.
44+
45+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
46+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **New application**.
47+
1. In the **Add from the gallery** section, type **CIC - Controle Inteligente de Compensação** in the search box.
48+
1. Select **CIC - Controle Inteligente de Compensação** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
49+
50+
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, and walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
51+
52+
## Configure and test Microsoft Entra SSO for CIC - Controle Inteligente de Compensação
53+
54+
Configure and test Microsoft Entra SSO with CIC - Controle Inteligente de Compensação using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in CIC - Controle Inteligente de Compensação.
55+
56+
To configure and test Microsoft Entra SSO with CIC - Controle Inteligente de Compensação, perform the following steps:
57+
58+
1. **[Configure Microsoft Entra SSO](#configure-microsoft-entra-sso)** - to enable your users to use this feature.
59+
1. **[Create a Microsoft Entra ID test user](#create-a-microsoft-entra-id-test-user)** - to test Microsoft Entra single sign-on with B.Simon.
60+
1. **[Assign the Microsoft Entra ID test user](#assign-the-microsoft-entra-id-test-user)** - to enable B.Simon to use Microsoft Entra single sign-on.
61+
1. **[Configure CIC - Controle Inteligente de Compensação SSO](#configure-cic---controle-inteligente-de-compensação-sso)** - to configure the single sign-on settings on application side.
62+
1. **[Create CIC - Controle Inteligente de Compensação test user](#create-cic---controle-inteligente-de-compensação-test-user)** - to have a counterpart of B.Simon in CIC - Controle Inteligente de Compensação that is linked to the Microsoft Entra ID representation of user.
63+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
64+
65+
## Configure Microsoft Entra SSO
66+
67+
Follow these steps to enable Microsoft Entra SSO in the Microsoft Entra admin center.
68+
69+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
70+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **CIC - Controle Inteligente de Compensação** > **Single sign-on**.
71+
1. On the **Select a single sign-on method** page, select **SAML**.
72+
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
73+
74+
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
75+
76+
1. On the **Basic SAML Configuration** section, perform the following steps:
77+
78+
a. In the **Identifier (Entity ID)** text box, type the value:
79+
`cic-prod`
80+
81+
b. In the **Reply URL** text box, type the URL:
82+
`https://prodgtw.perdcomp.com.br/auth/login/saml/callback`
83+
84+
c. In the **Sign on URL** text box, type the URL:
85+
`https://perdcomp.com.br/`
86+
87+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
88+
89+
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
90+
91+
1. On the **Set up CIC - Controle Inteligente de Compensação** section, copy the appropriate URL(s) based on your requirement.
92+
93+
![Screenshot shows to copy configuration URLs.](common/copy-configuration-urls.png "Metadata")
94+
95+
### Create a Microsoft Entra ID test user
96+
97+
In this section, you'll create a test user in the Microsoft Entra admin center called B.Simon.
98+
99+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
100+
1. Browse to **Identity** > **Users** > **All users**.
101+
1. Select **New user** > **Create new user**, at the top of the screen.
102+
1. In the **User** properties, follow these steps:
103+
1. In the **Display name** field, enter `B.Simon`.
104+
1. In the **User principal name** field, enter the [email protected]. For example, `[email protected]`.
105+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
106+
1. Select **Review + create**.
107+
1. Select **Create**.
108+
109+
### Assign the Microsoft Entra ID test user
110+
111+
In this section, you'll enable B.Simon to use Microsoft Entra single sign-on by granting access to CIC - Controle Inteligente de Compensação.
112+
113+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
114+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **CIC - Controle Inteligente de Compensação**.
115+
1. In the app's overview page, select **Users and groups**.
116+
1. Select **Add user/group**, then select **Users and groups** in the **Add Assignment** dialog.
117+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
118+
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
119+
1. In the **Add Assignment** dialog, click the **Assign** button.
120+
121+
## Configure CIC - Controle Inteligente de Compensação SSO
122+
123+
To configure single sign-on on **CIC - Controle Inteligente de Compensação** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Microsoft Entra admin center to [CIC - Controle Inteligente de Compensação support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
124+
125+
### Create CIC - Controle Inteligente de Compensação test user
126+
127+
In this section, you create a user called B.Simon in CIC - Controle Inteligente de Compensação. Work with [CIC - Controle Inteligente de Compensação support team](mailto:[email protected]) to add the users in the CIC - Controle Inteligente de Compensação platform. Users must be created and activated before you use single sign-on.
128+
129+
## Test SSO
130+
131+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
132+
133+
* Click on **Test this application** in Microsoft Entra admin center. This will redirect to CIC - Controle Inteligente de Compensação Sign-on URL where you can initiate the login flow.
134+
135+
* Go to CIC - Controle Inteligente de Compensação Sign-on URL directly and initiate the login flow from there.
136+
137+
* You can use Microsoft My Apps. When you click the CIC - Controle Inteligente de Compensação tile in the My Apps, this will redirect to CIC - Controle Inteligente de Compensação Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
138+
139+
## Next steps
140+
141+
Once you configure CIC - Controle Inteligente de Compensação you can enforce session control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -474,6 +474,8 @@
474474
href: chronicx-tutorial.md
475475
- name: Chronus SAML
476476
href: chronus-saml-tutorial.md
477+
- name: CIC - Controle Inteligente de Compensação
478+
href: cic-intelligent-compensation-control-tutorial.md
477479
- name: Cimpl
478480
href: cimpl-tutorial.md
479481
- name: Circus Street

0 commit comments

Comments
 (0)