You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/e-days-tutorial.md
+3-10Lines changed: 3 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,14 +82,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
82
82
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
83
83
84
84
a. In the **Identifier** text box, type a URL using the following pattern:
85
+
85
86
`https://<SUBDOMAIN>.e-days.com`
86
87
87
88
b. In the **Reply URL** text box, type a URL using the following pattern:
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
91
93
92
94
In the **Sign-on URL** text box, type a URL using the following pattern:
95
+
93
96
`https://<SUBDOMAIN>.e-days.com`
94
97
95
98
> [!NOTE]
@@ -99,16 +102,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
99
102
100
103

101
104
102
-
1. In addition to above, E-days application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
103
-
104
-
| Name | Source Attribute|
105
-
| ------------ | --------- |
106
-
| emailaddress | user.mail |
107
-
| surname | user.surname |
108
-
| givenname | user.givenname |
109
-
| name | user.userprincipalname |
110
-
111
-
112
105
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
0 commit comments