Skip to content

Commit e7c15ba

Browse files
authored
Merge pull request #103462 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 70a93b0 + 7d16e40 commit e7c15ba

File tree

2 files changed

+32
-35
lines changed

2 files changed

+32
-35
lines changed

articles/active-directory/saas-apps/eab-navigate-impl-tutorial.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -81,12 +81,18 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
![Edit Basic SAML Configuration](common/edit-urls.png)
8282

8383
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
84-
84+
In the **Identifier (Entity ID)** text box, enter exactly the following value:
85+
`https://impl.bouncer.eab.com`
86+
87+
In the **Reply URL (Assertion Consumer Service URL)** text box, enter both the following values as separate rows:
88+
`https://impl.bouncer.eab.com/sso/saml2/acs`
89+
`https://impl.bouncer.eab.com/sso/saml2/acs/`
90+
8591
In the **Sign-on URL** text box, type a URL using the following pattern:
8692
`https://<SUBDOMAIN>.navigate.impl.eab.com/`
8793

8894
> [!NOTE]
89-
> The value is not real. Update the value with the actual Sign-On URL. Contact [EAB Navigate IMPL Client support team](mailto:jmahoney@eab.com) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
95+
> The value is not real. Update the value with the actual Sign-On URL. Contact [EAB Navigate IMPL Client support team](mailto:EABTechSupport@eab.com) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9096

9197
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
9298

@@ -124,11 +130,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
124130

125131
## Configure EAB Navigate IMPL SSO
126132

127-
To configure single sign-on on **EAB Navigate IMPL** side, you need to send the **App Federation Metadata Url** to [EAB Navigate IMPL support team](mailto:jmahoney@eab.com). They set this setting to have the SAML SSO connection set properly on both sides.
133+
To configure single sign-on on **EAB Navigate IMPL** side, you need to send the **App Federation Metadata Url** to [EAB Navigate IMPL support team](mailto:EABTechSupport@eab.com). They set this setting to have the SAML SSO connection set properly on both sides.
128134

129135
### Create EAB Navigate IMPL test user
130136

131-
In this section, you create a user called B.Simon in EAB Navigate IMPL. Work with [EAB Navigate IMPL support team](mailto:jmahoney@eab.com) to add the users in the EAB Navigate IMPL platform. Users must be created and activated before you use single sign-on.
137+
In this section, you create a user called B.Simon in EAB Navigate IMPL. Work with [EAB Navigate IMPL support team](mailto:EABTechSupport@eab.com) to add the users in the EAB Navigate IMPL platform. Users must be created and activated before you use single sign-on.
132138

133139
## Test SSO
134140

@@ -144,4 +150,4 @@ When you click the EAB Navigate IMPL tile in the Access Panel, you should be aut
144150

145151
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
146152

147-
- [Try EAB Navigate IMPL with Azure AD](https://aad.portal.azure.com/)
153+
- [Try EAB Navigate IMPL with Azure AD](https://aad.portal.azure.com/)

articles/active-directory/saas-apps/eab-navigate-tutorial.md

Lines changed: 21 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

4343
* EAB Navigate supports **SP** initiated SSO
4444

45-
* Once you configure the EAB Navigate you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45+
> [!NOTE]
46+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
4647
4748
## Adding EAB Navigate from the gallery
4849

@@ -55,7 +56,6 @@ To configure the integration of EAB Navigate into Azure AD, you need to add EAB
5556
1. In the **Add from the gallery** section, type **EAB Navigate** in the search box.
5657
1. Select **EAB Navigate** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5758

58-
5959
## Configure and test Azure AD single sign-on for EAB Navigate
6060

6161
Configure and test Azure AD SSO with EAB Navigate using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in EAB Navigate.
@@ -79,33 +79,24 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7979

8080
![Edit Basic SAML Configuration](common/edit-urls.png)
8181

82-
1. On the **Basic SAML Configuration** section, if you have **Service Provider metadata file**, perform the following steps:
83-
84-
a. Click **Upload metadata file**.
85-
86-
![Upload metadata file](common/upload-metadata.png)
87-
88-
b. Click on **folder logo** to select the metadata file and click **Upload**.
89-
90-
![choose metadata file](common/browse-upload-metadata.png)
91-
92-
c. After the metadata file is successfully uploaded, the **Identifier** value gets auto populated in Basic SAML Configuration section.
93-
94-
![EAB Navigate Domain and URLs single sign-on information](common/sp-identifier.png)
95-
96-
In the **Sign-on URL** text box, type a URL using the following pattern:
97-
`https://<SUBDOMAIN>.navigate.eab.com`
98-
99-
> [!Note]
100-
> If the **Identifier** value does not get auto polulated, then please fill in the value manually according to your requirement. The Sign-on URL value is not real. Update this value with the actual Sign-on URL. Contact [EAB Navigate Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
101-
102-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Raw)** and select **Download** to download the certificate and save it on your computer.
82+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
83+
84+
In the **Identifier (Entity ID)** text box, enter exactly the following value:
85+
`https://bouncer.eab.com`
86+
87+
In the **Reply URL (Assertion Consumer Service URL)** text box, enter both the following values as separate rows:
88+
`https://bouncer.eab.com/sso/saml2/acs`
89+
`https://bouncer.eab.com/sso/saml2/acs/`
90+
91+
In the **Sign-on URL** text box, type a URL using the following pattern:
92+
`https://<SUBDOMAIN>.navigate.eab.com/`
10393

104-
![The Certificate download link](common/certificateraw.png)
94+
> [!NOTE]
95+
> The value is not real. Update the value with the actual Sign-On URL. Contact [EAB Navigate Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
10596

106-
1. On the **Set up EAB Navigate** section, copy the appropriate URL(s) based on your requirement.
97+
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
10798

108-
![Copy configuration URLs](common/copy-configuration-urls.png)
99+
![The Certificate download link](common/copy-metadataurl.png)
109100

110101
### Create an Azure AD test user
111102

@@ -139,13 +130,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
139130

140131
## Configure EAB Navigate SSO
141132

142-
To configure single sign-on on **EAB Navigate** side, you need to send the downloaded **Certificate (Raw)** and appropriate copied URLs from Azure portal to [EAB Navigate support team](mailto:jmahoney@eab.com). They set this setting to have the SAML SSO connection set properly on both sides.
133+
To configure single sign-on on **EAB Navigate** side, you need to send the **App Federation Metadata Url** to [EAB Navigate support team](mailto:EABTechSupport@eab.com). They set this setting to have the SAML SSO connection set properly on both sides.
143134

144135
### Create EAB Navigate test user
145136

146-
In this section, you create a user called B.Simon in EAB Navigate. Work with [EAB Navigate support team](mailto:jmahoney@eab.com) to add the users in the EAB Navigate platform. Users must be created and activated before you use single sign-on.
137+
In this section, you create a user called B.Simon in EAB Navigate. Work with [EAB Navigate support team](mailto:EABTechSupport@eab.com) to add the users in the EAB Navigate platform. Users must be created and activated before you use single sign-on.
147138

148-
## Test SSO
139+
## Test SSO
149140

150141
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
151142

@@ -163,4 +154,4 @@ When you click the EAB Navigate tile in the Access Panel, you should be automati
163154

164155
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
165156

166-
- [How to protect EAB Navigate with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
157+
- [How to protect EAB Navigate with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)

0 commit comments

Comments
 (0)