Skip to content

Commit f5cbcb2

Browse files
Update granite-tutorial.md
1 parent 0402403 commit f5cbcb2

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/active-directory/saas-apps/granite-tutorial.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/22/2023
12+
ms.date: 09/25/2023
1313
ms.author: jeedes
1414

1515
---
@@ -73,17 +73,17 @@ Follow these steps to enable Microsoft Entra SSO in the Microsoft Entra admin ce
7373

7474
1. On the **Basic SAML Configuration** section, perform the following steps:
7575

76-
a. In the **Identifier** textbox, type a value using the following pattern:
77-
`<Customer_Name>.granitegrc.com`
76+
a. In the **Identifier** textbox, type a value using the following pattern:
77+
`<Customer_Name>.granitegrc.com`
7878

79-
b. In the **Reply URL** textbox, type a URL using the following pattern:
80-
`https://<Customer_Name>.granitegrc.com/simplesaml/module.php/saml/sp/saml2-acs.php/default`
79+
b. In the **Reply URL** textbox, type a URL using the following pattern:
80+
`https://<Customer_Name>.granitegrc.com/simplesaml/module.php/saml/sp/saml2-acs.php/default`
8181

82-
c. In the **Sign on URL** textbox, type a URL using the following pattern:
83-
`https://<Customer_Name>.granitegrc.com`
82+
c. In the **Sign on URL** textbox, type a URL using the following pattern:
83+
`https://<Customer_Name>.granitegrc.com`
8484

8585
> [!NOTE]
86-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Granite support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
86+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Granite support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Microsoft Entra admin center.
8787
8888
1. Granite application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
8989

@@ -140,14 +140,14 @@ In this section, a user called B.Simon is created in Granite. Granite supports j
140140

141141
## Test SSO
142142

143-
In this section, you test your Azure AD single sign-on configuration with following options.
143+
In this section, you test your Microsoft Entra single sign-on configuration with following options.
144144

145-
* Click on **Test this application** in Azure portal. This will redirect to Granite Sign on URL where you can initiate the login flow.
145+
* Click on **Test this application** in Microsoft Entra admin center. This will redirect to Granite Sign on URL where you can initiate the login flow.
146146

147147
* Go to Granite Sign-on URL directly and initiate the login flow from there.
148148

149149
* You can use Microsoft My Apps. When you click the Granite tile in the My Apps, this will redirect to Granite Sign on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
150150

151151
## Next Steps
152152

153-
Once you configure Granite you can enforce session control, which protects exfiltration and infiltration of your organizations sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
153+
Once you configure Granite you can enforce session control, which protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)