You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
84
-
84
+
In the **Identifier (Entity ID)** text box, enter exactly the following value:
85
+
`https://impl.bouncer.eab.com`
86
+
87
+
In the **Reply URL (Assertion Consumer Service URL)** text box, enter both the following values as separate rows:
88
+
`https://impl.bouncer.eab.com/sso/saml2/acs`
89
+
`https://impl.bouncer.eab.com/sso/saml2/acs/`
90
+
85
91
In the **Sign-on URL** text box, type a URL using the following pattern:
86
92
`https://<SUBDOMAIN>.navigate.impl.eab.com/`
87
93
88
94
> [!NOTE]
89
-
> The value is not real. Update the value with the actual Sign-On URL. Contact [EAB Navigate IMPL Client support team](mailto:jmahoney@eab.com) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
95
+
> The value is not real. Update the value with the actual Sign-On URL. Contact [EAB Navigate IMPL Client support team](mailto:EABTechSupport@eab.com) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
90
96
91
97
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
92
98
@@ -124,11 +130,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
124
130
125
131
## Configure EAB Navigate IMPL SSO
126
132
127
-
To configure single sign-on on **EAB Navigate IMPL** side, you need to send the **App Federation Metadata Url** to [EAB Navigate IMPL support team](mailto:jmahoney@eab.com). They set this setting to have the SAML SSO connection set properly on both sides.
133
+
To configure single sign-on on **EAB Navigate IMPL** side, you need to send the **App Federation Metadata Url** to [EAB Navigate IMPL support team](mailto:EABTechSupport@eab.com). They set this setting to have the SAML SSO connection set properly on both sides.
128
134
129
135
### Create EAB Navigate IMPL test user
130
136
131
-
In this section, you create a user called B.Simon in EAB Navigate IMPL. Work with [EAB Navigate IMPL support team](mailto:jmahoney@eab.com) to add the users in the EAB Navigate IMPL platform. Users must be created and activated before you use single sign-on.
137
+
In this section, you create a user called B.Simon in EAB Navigate IMPL. Work with [EAB Navigate IMPL support team](mailto:EABTechSupport@eab.com) to add the users in the EAB Navigate IMPL platform. Users must be created and activated before you use single sign-on.
132
138
133
139
## Test SSO
134
140
@@ -144,4 +150,4 @@ When you click the EAB Navigate IMPL tile in the Access Panel, you should be aut
144
150
145
151
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
146
152
147
-
-[Try EAB Navigate IMPL with Azure AD](https://aad.portal.azure.com/)
153
+
-[Try EAB Navigate IMPL with Azure AD](https://aad.portal.azure.com/)
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/eab-navigate-tutorial.md
+21-30Lines changed: 21 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,8 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
42
42
43
43
* EAB Navigate supports **SP** initiated SSO
44
44
45
-
* Once you configure the EAB Navigate you can enforce session controls, which protect exfiltration and infiltration of your organization’s sensitive data in real-time. Session controls extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45
+
> [!NOTE]
46
+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
46
47
47
48
## Adding EAB Navigate from the gallery
48
49
@@ -55,7 +56,6 @@ To configure the integration of EAB Navigate into Azure AD, you need to add EAB
55
56
1. In the **Add from the gallery** section, type **EAB Navigate** in the search box.
56
57
1. Select **EAB Navigate** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57
58
58
-
59
59
## Configure and test Azure AD single sign-on for EAB Navigate
60
60
61
61
Configure and test Azure AD SSO with EAB Navigate using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in EAB Navigate.
@@ -79,33 +79,24 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
c. After the metadata file is successfully uploaded, the **Identifier** value gets auto populated in Basic SAML Configuration section.
93
-
94
-

95
-
96
-
In the **Sign-on URL** text box, type a URL using the following pattern:
97
-
`https://<SUBDOMAIN>.navigate.eab.com`
98
-
99
-
> [!Note]
100
-
> If the **Identifier** value does not get auto polulated, then please fill in the value manually according to your requirement. The Sign-on URL value is not real. Update this value with the actual Sign-on URL. Contact [EAB Navigate Client support team](mailto:[email protected]) to get this value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
101
-
102
-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Raw)** and select **Download** to download the certificate and save it on your computer.
82
+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
83
+
84
+
In the **Identifier (Entity ID)** text box, enter exactly the following value:
85
+
`https://bouncer.eab.com`
86
+
87
+
In the **Reply URL (Assertion Consumer Service URL)** text box, enter both the following values as separate rows:
88
+
`https://bouncer.eab.com/sso/saml2/acs`
89
+
`https://bouncer.eab.com/sso/saml2/acs/`
90
+
91
+
In the **Sign-on URL** text box, type a URL using the following pattern:
> The value is not real. Update the value with the actual Sign-On URL. Contact [EAB Navigate Client support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
105
96
106
-
1. On the **Set up EAB Navigate** section, copy the appropriate URL(s) based on your requirement.
97
+
1. On the **Set up single sign-on with SAML**page, In the **SAML Signing Certificate**section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
@@ -139,13 +130,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
139
130
140
131
## Configure EAB Navigate SSO
141
132
142
-
To configure single sign-on on **EAB Navigate** side, you need to send the downloaded **Certificate (Raw)**and appropriate copied URLs from Azure portal to [EAB Navigate support team](mailto:jmahoney@eab.com). They set this setting to have the SAML SSO connection set properly on both sides.
133
+
To configure single sign-on on **EAB Navigate** side, you need to send the **App Federation Metadata Url** to [EAB Navigate support team](mailto:EABTechSupport@eab.com). They set this setting to have the SAML SSO connection set properly on both sides.
143
134
144
135
### Create EAB Navigate test user
145
136
146
-
In this section, you create a user called B.Simon in EAB Navigate. Work with [EAB Navigate support team](mailto:jmahoney@eab.com) to add the users in the EAB Navigate platform. Users must be created and activated before you use single sign-on.
137
+
In this section, you create a user called B.Simon in EAB Navigate. Work with [EAB Navigate support team](mailto:EABTechSupport@eab.com) to add the users in the EAB Navigate platform. Users must be created and activated before you use single sign-on.
147
138
148
-
## Test SSO
139
+
## Test SSO
149
140
150
141
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
151
142
@@ -163,4 +154,4 @@ When you click the EAB Navigate tile in the Access Panel, you should be automati
163
154
164
155
-[What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
165
156
166
-
-[How to protect EAB Navigate with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
157
+
-[How to protect EAB Navigate with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
0 commit comments