Skip to content

Commit f41d9e4

Browse files
Merge pull request #90462 from v-viinde/incasecrsis
Product Backlog Item 826403: SaaS App Tutorial: In Case of Crisis - M…
2 parents 93b4f61 + e00bff3 commit f41d9e4

File tree

3 files changed

+148
-0
lines changed

3 files changed

+148
-0
lines changed
Lines changed: 146 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,146 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with In Case of Crisis - Mobile | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and In Case of Crisis - Mobile.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: 6afa98e9-a123-4cbb-add6-afcefc1242e5
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: tutorial
17+
ms.date: 10/04/2019
18+
ms.author: jeedes
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with In Case of Crisis - Mobile
24+
25+
In this tutorial, you'll learn how to integrate In Case of Crisis - Mobile with Azure Active Directory (Azure AD). When you integrate In Case of Crisis - Mobile with Azure AD, you can:
26+
27+
* Control in Azure AD who has access to In Case of Crisis - Mobile.
28+
* Enable your users to be automatically signed-in to In Case of Crisis - Mobile with their Azure AD accounts.
29+
* Manage your accounts in one central location - the Azure portal.
30+
31+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32+
33+
## Prerequisites
34+
35+
To get started, you need the following items:
36+
37+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
38+
* In Case of Crisis - Mobile single sign-on (SSO) enabled subscription.
39+
40+
## Scenario description
41+
42+
In this tutorial, you configure and test Azure AD SSO in a test environment.
43+
44+
* In Case of Crisis - Mobile supports **IDP** initiated SSO
45+
46+
> [!NOTE]
47+
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
48+
49+
## Adding In Case of Crisis - Mobile from the gallery
50+
51+
To configure the integration of In Case of Crisis - Mobile into Azure AD, you need to add In Case of Crisis - Mobile from the gallery to your list of managed SaaS apps.
52+
53+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
54+
1. On the left navigation pane, select the **Azure Active Directory** service.
55+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
56+
1. To add new application, select **New application**.
57+
1. In the **Add from the gallery** section, type **In Case of Crisis - Mobile** in the search box.
58+
1. Select **In Case of Crisis - Mobile** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
59+
60+
## Configure and test Azure AD single sign-on for In Case of Crisis - Mobile
61+
62+
Configure and test Azure AD SSO with In Case of Crisis - Mobile using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in In Case of Crisis - Mobile.
63+
64+
To configure and test Azure AD SSO with In Case of Crisis - Mobile, complete the following building blocks:
65+
66+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
67+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
68+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
69+
1. **[Configure In Case of Crisis - Mobile SSO](#configure-in-case-of-crisis---mobile-sso)** - to configure the single sign-on settings on application side.
70+
1. **[Create In Case of Crisis - Mobile test user](#create-in-case-of-crisis---mobile-test-user)** - to have a counterpart of B.Simon in In Case of Crisis - Mobile that is linked to the Azure AD representation of user.
71+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
72+
73+
## Configure Azure AD SSO
74+
75+
Follow these steps to enable Azure AD SSO in the Azure portal.
76+
77+
1. In the [Azure portal](https://portal.azure.com/), on the **In Case of Crisis - Mobile** application integration page, find the **Manage** section and select **single sign-on**.
78+
1. On the **Select a single sign-on method** page, select **SAML**.
79+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
80+
81+
![Edit Basic SAML Configuration](common/edit-urls.png)
82+
83+
1. On the **Basic SAML Configuration** section the application is pre-configured in **IDP** initiated mode and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
84+
85+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Raw)** and select **Download** to download the certificate and save it on your computer.
86+
87+
![The Certificate download link](common/certificateraw.png)
88+
89+
1. Navigate to the **Manage** section on left side of page, click on **Properties tab** then copy the **User access URL** and save it on your computer.
90+
91+
![Single sign-on properties](./media/in-case-of-crisis-mobile-tutorial/properties.png)
92+
93+
### Create an Azure AD test user
94+
95+
In this section, you'll create a test user in the Azure portal called B.Simon.
96+
97+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
98+
1. Select **New user** at the top of the screen.
99+
1. In the **User** properties, follow these steps:
100+
1. In the **Name** field, enter `B.Simon`.
101+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
102+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
103+
1. Click **Create**.
104+
105+
### Assign the Azure AD test user
106+
107+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to In Case of Crisis - Mobile.
108+
109+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
110+
1. In the applications list, select **In Case of Crisis - Mobile**.
111+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
112+
113+
![The "Users and groups" link](common/users-groups-blade.png)
114+
115+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
116+
117+
![The Add User link](common/add-assign-user.png)
118+
119+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
120+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
121+
1. In the **Add Assignment** dialog, click the **Assign** button.
122+
123+
## Configure In Case of Crisis - Mobile SSO
124+
125+
To configure single sign-on on **In Case of Crisis - Mobile** side, you need to send the downloaded **Certificate (Raw)** and copied **User access URL** from Azure portal to [In Case of Crisis - Mobile support team](https://www.rockdovesolutions.com/features/enterprise-ready). They set this setting to have the SAML SSO connection set properly on both sides.
126+
127+
### Create In Case of Crisis - Mobile test user
128+
129+
In this section, you create a user called Britta Simon in In Case of Crisis - Mobile. Work with [In Case of Crisis - Mobile support team](https://www.rockdovesolutions.com/features/enterprise-ready) to add the users in the In Case of Crisis - Mobile platform. Users must be created and activated before you use single sign-on.
130+
131+
## Test SSO
132+
133+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
134+
135+
When you click the In Case of Crisis - Mobile tile in the Access Panel, you should be automatically signed in to the In Case of Crisis - Mobile for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
136+
137+
## Additional resources
138+
139+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
140+
141+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
142+
143+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
144+
145+
- [Try In Case of Crisis - Mobile with Azure AD](https://aad.portal.azure.com/)
146+
56.7 KB
Loading

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -623,6 +623,8 @@
623623
href: imagineerwebVision-tutorial.md
624624
- name: IMPAC Risk Manager
625625
href: impacriskmanager-tutorial.md
626+
- name: In Case of Crisis - Mobile
627+
href: in-case-of-crisis-mobile-tutorial.md
626628
- name: Infinite Campus
627629
href: infinitecampus-tutorial.md
628630
- name: Infogix Data3Sixty Govern

0 commit comments

Comments
 (0)