You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
c. In the **Sign on URL** textbox, type a URL using the following pattern:
83
-
`https://<Customer_Name>.granitegrc.com`
82
+
c. In the **Sign on URL** textbox, type a URL using the following pattern:
83
+
`https://<Customer_Name>.granitegrc.com`
84
84
85
85
> [!NOTE]
86
-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Granite support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
86
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Granite support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Microsoft Entra admin center.
87
87
88
88
1. Granite application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
89
89
@@ -140,14 +140,14 @@ In this section, a user called B.Simon is created in Granite. Granite supports j
140
140
141
141
## Test SSO
142
142
143
-
In this section, you test your Azure AD single sign-on configuration with following options.
143
+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
144
144
145
-
* Click on **Test this application** in Azure portal. This will redirect to Granite Sign on URL where you can initiate the login flow.
145
+
* Click on **Test this application** in Microsoft Entra admin center. This will redirect to Granite Sign on URL where you can initiate the login flow.
146
146
147
147
* Go to Granite Sign-on URL directly and initiate the login flow from there.
148
148
149
149
* You can use Microsoft My Apps. When you click the Granite tile in the My Apps, this will redirect to Granite Sign on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
150
150
151
151
## Next Steps
152
152
153
-
Once you configure Granite you can enforce session control, which protects exfiltration and infiltration of your organization�s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
153
+
Once you configure Granite you can enforce session control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments