You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/infinitecampus-tutorial.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ To test the steps in this tutorial, you should follow these recommendations:
45
45
46
46
- Do not use your production environment, unless it is necessary.
47
47
- If you don't have an Azure AD trial environment, you can [get a one-month trial](https://azure.microsoft.com/pricing/free-trial/).
48
-
- At minimum, you need to be an Azure Active Directory administrator to complete the configuration.
48
+
- At minimum, you need to be an Azure Active Directory administrator, and have a Campus Product Security Role of "Student Information System (SIS)" to complete the configuration.
49
49
50
50
## Scenario description
51
51
@@ -109,7 +109,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
109
109
110
110

111
111
112
-
4. On the **Basic SAML Configuration** section, if you have a **Service Provider metadata file**, complete steps 4.a through 4.d, and then skip to step 11.c. If you don't have a Service Provider Metadata file, skip to step 5.
112
+
4. On the **Basic SAML Configuration** section, if you have a **Service Provider metadata file** exported from Infinite Campus, complete steps 4.a through 4.d, and then skip to step 11.c. If you don't have a Service Provider Metadata file, skip to step 5.
113
113
114
114
a. Click **Upload metadata file**.
115
115
@@ -165,13 +165,15 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
165
165
166
166
a. Select **Enable SAML Single Sign On**.
167
167
168
-
b. On the **Select an option to retrieve Identity Provider (IDP) server data** section, select **Metadata URL**, paste the **App Federation Metadata Url** in the box, and then click **Sync**.
168
+
b. Edit the **Optional Attribute Name** to contain **name**
169
+
170
+
c. On the **Select an option to retrieve Identity Provider (IDP) server data** section, select **Metadata URL**, paste the **App Federation Metadata Url** (from Step 6 above) in the box, and then click **Sync**.
169
171
170
-
c. Click on **Service Provider Metadata** link to save the **Service Provider metadata file** on your computer, and upload it in **Basic SAML Configuration** section to auto populate the **Identifier** and **Reply URL** values in the Azure portal (refer to step 4 for upload and automatic population of values, or step 5 for manual entry).
172
+
d. Click on **Service Provider Metadata** link to save the **Service Provider metadata file** on your computer, and upload it in **Basic SAML Configuration** section to auto populate the **Identifier** and **Reply URL** values in the Azure portal (refer to step 4 for upload and automatic population of values, or step 5 for manual entry).
171
173
172
-
d. After clicking **Sync** the values get auto-populated in **SSO Service Provider Configuration** page.
174
+
e. After clicking **Sync** the values get auto-populated in **SSO Service Provider Configuration** page.
0 commit comments