Skip to content

Commit e06b9c9

Browse files
authored
Merge pull request #197810 from bhavana-129/cyberark-update
Product Backlog Item 1896453: SaaS App Tutorial: CyberArk SAML Authen…
2 parents 3e1c42a + fb090af commit e06b9c9

File tree

1 file changed

+16
-11
lines changed

1 file changed

+16
-11
lines changed

articles/active-directory/saas-apps/cyberark-saml-authentication-tutorial.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with CyberArk SAML Authentication | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with CyberArk SAML Authentication'
33
description: Learn how to configure single sign-on between Azure Active Directory and CyberArk SAML Authentication.
44
services: active-directory
55
author: jeevansd
@@ -9,11 +9,11 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 02/09/2021
12+
ms.date: 05/11/2022
1313
ms.author: jeedes
1414
---
1515

16-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with CyberArk SAML Authentication
16+
# Tutorial: Azure AD SSO integration with CyberArk SAML Authentication
1717

1818
In this tutorial, you'll learn how to integrate CyberArk SAML Authentication with Azure Active Directory (Azure AD). When you integrate CyberArk SAML Authentication with Azure AD, you can:
1919

@@ -27,13 +27,18 @@ To get started, you need the following items:
2727

2828
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
2929
* CyberArk SAML Authentication single sign-on (SSO) enabled subscription.
30+
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
31+
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
3032

3133
## Scenario description
3234

3335
In this tutorial, you configure and test Azure AD SSO in a test environment.
3436

3537
* CyberArk SAML Authentication supports **SP and IDP** initiated SSO.
3638

39+
> [!NOTE]
40+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
41+
3742
## Add CyberArk SAML Authentication from the gallery
3843

3944
To configure the integration of CyberArk SAML Authentication into Azure AD, you need to add CyberArk SAML Authentication from the gallery to your list of managed SaaS apps.
@@ -66,9 +71,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
6671
1. On the **Select a single sign-on method** page, select **SAML**.
6772
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
6873

69-
![Edit Basic SAML Configuration](common/edit-urls.png)
74+
![Screenshot shows to edit Basic S A M L Configuration.](common/edit-urls.png "Basic Configuration")
7075

71-
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
76+
1. On the **Basic SAML Configuration** section, perform the following step:
7277

7378
In the **Reply URL** text box, type a URL using the following pattern:
7479
`https://<PVWA DNS or IP>/passwordvault/api/auth/saml/logon`
@@ -79,15 +84,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7984
`https://<PVWA DNS or IP>/PasswordVault/v10/logon/saml`
8085

8186
> [!NOTE]
82-
> These values are not real. Update these values with the actual Reply URL and Sign-On URL. Contact [CyberArk SAML Authentication Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
87+
> These values are not real. Update these values with the actual Reply URL and Sign-On URL. Contact your CyberArk Administration team to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8388

8489
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
8590

86-
![The Certificate download link](common/certificatebase64.png)
91+
![Screenshot shows the Certificate download link.](common/certificatebase64.png "Certificate")
8792

8893
1. On the **Set up CyberArk SAML Authentication** section, copy the appropriate URL(s) based on your requirement.
8994

90-
![Copy configuration URLs](common/copy-configuration-urls.png)
95+
![Screenshot shows to copy configuration appropriate U R L.](common/copy-configuration-urls.png "Attributes")
9196

9297
### Create an Azure AD test user
9398

@@ -115,11 +120,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
115120

116121
## Configure CyberArk SAML Authentication SSO
117122

118-
To configure single sign-on on **CyberArk SAML Authentication** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [CyberArk SAML Authentication support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
123+
To configure single sign-on on **CyberArk SAML Authentication** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to your CyberArk Administration team. They set this setting to have the SAML SSO connection set properly on both sides.
119124

120125
### Create CyberArk SAML Authentication test user
121126

122-
In this section, you create a user called B.Simon in CyberArk SAML Authentication. Work with [CyberArk SAML Authentication support team](mailto:[email protected]) to add the users in the CyberArk SAML Authentication platform. Users must be created and activated before you use single sign-on.
127+
In this section, you create a user called B.Simon in CyberArk SAML Authentication. Work with your CyberArk Administration team to add the users in the CyberArk SAML Authentication platform. Users must be created and activated before you use single sign-on.
123128

124129
## Test SSO
125130

@@ -139,4 +144,4 @@ You can also use Microsoft My Apps to test the application in any mode. When you
139144

140145
## Next steps
141146

142-
Once you configure CyberArk SAML Authentication you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
147+
Once you configure CyberArk SAML Authentication you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)