Skip to content

Commit e197199

Browse files
committed
more edits
1 parent bcef192 commit e197199

File tree

1 file changed

+25
-28
lines changed

1 file changed

+25
-28
lines changed

articles/active-directory/saas-apps/catchpoint-tutorial.md

Lines changed: 25 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ To learn more about SaaS app integration with Azure AD, see [What is application
3434
To get started, you need the following items:
3535

3636
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37-
* A Catchpoint single sign-on (SSO) enabled subscription.
37+
* A Catchpoint subscription with single sign-on (SSO) enabled.
3838

3939
## Scenario description
4040

@@ -44,54 +44,51 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4444
* Catchpoint supports just-in-time (JIT) user provisioning.
4545
* After you configure Catchpoint, you can enforce session control. This procedure protects against exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4646

47-
## Adding Catchpoint from the gallery
47+
## Add Catchpoint from the gallery
4848

49-
To configure the integration of Catchpoint into Azure AD, you need to add Catchpoint from the gallery to your list of managed SaaS apps.
49+
To configure the integration of Catchpoint into Azure AD, you need to add Catchpoint to your list of managed SaaS apps.
5050

51-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
51+
1. Sign in to the [Azure portal](https://portal.azure.com) with a work or school account, or a personal Microsoft account.
5252
1. On the left navigation pane, select the **Azure Active Directory** service.
53-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
53+
1. Go to **Enterprise Applications** and then select **All Applications**.
5454
1. To add new application, select **New application**.
5555
1. In the **Add from the gallery** section, type **Catchpoint** in the search box.
5656
1. Select **Catchpoint** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5757

5858
## Configure and test Azure AD single sign-on for Catchpoint
5959

60-
Configure and test Azure AD SSO with Catchpoint using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Catchpoint.
60+
For SSO to work, you need to link an Azure AD user with the same user in Catchpoint. For this tutorial, we'll configure a test user called **B.Simon**.
6161

62-
To configure and test Azure AD SSO with Catchpoint, complete the following building blocks:
62+
Complete the following sections:
6363

64-
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
64+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable this feature for your users.
6565
* **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
6666
* **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67-
1. **[Configure Catchpoint SSO](#configure-catchpoint-sso)** - to configure the single sign-on settings on application side.
68-
* **[Create Catchpoint test user](#create-catchpoint-test-user)** - to have a counterpart of B.Simon in Catchpoint that is linked to the Azure AD representation of user.
69-
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
67+
1. **[Configure Catchpoint SSO](#configure-catchpoint-sso)** - to configure the single sign-on settings on the application side.
68+
* **[Create Catchpoint test user](#create-catchpoint-test-user)** - the B.Simon test account in Catchpoint which is linked to the Azure AD test account.
69+
1. **[Test SSO](#test-sso)** - to verify that the configuration works.
7070

7171
## Configure Azure AD SSO
7272

73-
Follow these steps to enable Azure AD SSO in the Azure portal.
73+
Follow these steps in the Azure portal to enable Azure AD SSO .
7474

75-
1. In the [Azure portal](https://portal.azure.com/), on the **Catchpoint** application integration page, find the **Manage** section and select **single sign-on**.
75+
1. Sign in to the [Azure portal](https://portal.azure.com/)
76+
1. On the **Catchpoint** application integration page, find the **Manage** section and select **single sign-on**.
7677
1. On the **Select a single sign-on method** page, select **SAML**.
77-
1. On the **Setup single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
78+
1. On the **Setup single sign-on with SAML** page, select the edit/pen icon for **Basic SAML Configuration** to edit the settings.
7879

7980
![Edit Basic SAML Configuration](common/edit-urls.png)
8081

81-
1. If you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
82+
1. Configure Catchpoin in either **IDP** or **SP** intiated mode:
83+
- For **IDP** initiated mode, enter the values for the following fields:
84+
- For **Identifier**: `https://portal.catchpoint.com/SAML2`
85+
- For **Reply URL**: `https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx`
86+
- For **SP** initiated mode, **Set additional URLs** and enter the following value:
87+
- For **Sign-on URL**: `https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx`
8288

83-
a. In the **Identifier** text box, type the URL:
84-
`https://portal.catchpoint.com/SAML2`
89+
\***
8590

86-
b. In the **Reply URL** text box, type the URL:
87-
`https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx`
88-
89-
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
90-
91-
In the **Sign-on URL** text box, type the URL:
92-
`https://portal.catchpoint.com/ui/Entry/SingleSignOn.aspx`
93-
94-
1. Catchpoint application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
91+
1. The Catchpoint application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9592

9693
![image](common/default-attributes.png)
9794

@@ -183,9 +180,9 @@ When you click the Catchpoint tile in the Access Panel, you should be automatica
183180

184181
## Additional resources
185182

186-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
183+
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
187184

188-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
185+
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
189186

190187
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
191188

0 commit comments

Comments
 (0)