You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert

166
166
167
167
1. On the **SAML Configuration for Administration Console** page, perform the following steps:

170
170
171
171
a. For **Provider**, select **Azure Active Directory** from the Dropdown.
172
172
@@ -184,19 +184,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
184
184
185
185
1. Navigate to **Administration** > **Directories** > **Internal Directories**.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/mimecast-personal-portal-tutorial.md
+10-10
Original file line number
Diff line number
Diff line change
@@ -150,23 +150,23 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
150
150
151
151
1. Navigate to **Administration** > **Services** > **Applications**.
152
152
153
-

153
+

154
154
155
155
1. Click **Authentication Profiles** tab.
156
156
157
-

157
+

158
158
159
159
1. Click **New Authentication Profile** tab.
160
160
161
-

161
+

162
162
163
163
1. Provide a valid description in the **Description** textbox and select **Enforce SAML Authentication for Mimecast Personal Portal** checkbox.
164
164
165
-

165
+

166
166
167
167
1. On the **SAML Configuration for Mimecast Personal Portal** page, perform the following steps:
168
168
169
-

169
+

170
170
171
171
a. For **Provider**, select **Azure Active Directory** from the Dropdown.
172
172
@@ -184,19 +184,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
184
184
185
185
1. Navigate to **Administration** > **Directories** > **Internal Directories**.
186
186
187
-

187
+

188
188
189
189
1. Select on your domain, if the domain is mentioned below, otherwise please create a new domain by clicking on the **New Domain**.
190
190
191
-

191
+

192
192
193
193
1. Click **New Address** tab.
194
194
195
-

195
+

196
196
197
197
1. Provide the required user information on the following page:
198
198
199
-

199
+

200
200
201
201
a. In the **Email Address** textbox, enter the email address of the user like `[email protected]`.
202
202
@@ -210,7 +210,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
210
210
211
211
f. To assign roles to the user, click on **Role Edit** and assign the required role to user as per your organization requirement.
212
212
213
-

213
+

Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/mitel-connect-tutorial.md
+15-15
Original file line number
Diff line number
Diff line change
@@ -106,15 +106,15 @@ To configure MiCloud Connect with SSO for Azure AD, it is easiest to open the Az
106
106
107
107
4. In the Azure portal, select the **Edit** icon in the **Basic SAML Configuration** section.
108
108
109
-

109
+

110
110
111
111
The Basic SAML Configuration dialog box appears.
112
112
113
113
5. Copy the URL from the **Mitel Identifier (Entity ID)** field in the Mitel Account portal and paste it into the **Identifier (Entity ID)** field in the Azure portal.
114
114
115
115
6. Copy the URL from the **Reply URL (Assertion Consumer Service URL)** field in the Mitel Account portal and paste it into the **Reply URL (Assertion Consumer Service URL)** field in the Azure portal.

118
118
119
119
7. In the **Sign-on URL** text box, type one of the following URLs:
120
120
@@ -128,19 +128,19 @@ To configure MiCloud Connect with SSO for Azure AD, it is easiest to open the Az
128
128
129
129
9. In the **SAML Signing Certificate** section on the **SAML-based sign-on** page in the Azure portal, select **Download** next to **Certificate (Base64)** to download the **Signing Certificate** and save it to your computer.

132
132
133
133
10. Open the Signing Certificate file in a text editor, copy all data in the file, and then paste the data in the **Signing Certificate** field in the Mitel Account portal.

144
144
145
145
12. Select **Save** on the **Connect Single Sign-On Settings** dialog box in the Mitel Account portal.
146
146
@@ -235,7 +235,7 @@ To configure CloudLink platform with single sign-on for Azure AD, it is recommen
235
235
236
236
The **SAML-based Sign-on** page opens, displaying the **Basic SAML Configuration** section.

239
239
240
240
2. To access the **Azure AD Single Sign On** configuration panel in the CloudLink Accounts portal:
241
241
@@ -245,33 +245,33 @@ To configure CloudLink platform with single sign-on for Azure AD, it is recommen
245
245
246
246
1. Select the **3rd party** tab. A list of supported third-party applications is displayed. Select the **Add** button associated with **Azure AD Single Sign On**, and select **Done**.

259
259
260
260
Mitel recommends that the **Enable Mitel Credentials (Optional)** check box in the **Optional Mitel credentials** section is not selected. Select this check box only if you want the user to sign in to the CloudLink application using the Mitel credentials in addition to the single sign-on option.
261
261
262
262
3. In the Azure portal, from the **SAML-based Sign-on** page, select the **Edit** icon in the **Basic SAML Configuration** section. The **Basic SAML Configuration** panel opens.

265
265
266
266
4. Copy the URL from the **Mitel Identifier (Entity ID)** field in the CloudLink Accounts portal and paste it into the **Identifier (Entity ID)** field in the Azure portal.
267
267
268
268
5. Copy the URL from the **Reply URL (Assertion Consumer Service URL)** field in the CloudLink Accounts portal and paste it into the **Reply URL (Assertion Consumer Service URL)** field in the Azure portal.

271
271
272
272
6. In the **Sign-on URL** text box, type the URL `https://accounts.mitel.io` to use the CloudLink Accounts portal as your default Mitel application.

275
275
276
276
> [!NOTE]
277
277
> The default Mitel application is the application that opens when a user selects the Mitel Connect tile in the Access Panel. This is also the application accessed when the user configures a test setup from Azure AD.
@@ -280,22 +280,22 @@ To configure CloudLink platform with single sign-on for Azure AD, it is recommen
280
280
281
281
8. In the **SAML Signing Certificate** section on the **SAML-based sign-on** page in the Azure portal, select **Download** beside **Certificate (Base64)** to download the **Signing Certificate**. Save the certificate on your computer.

284
284
285
285
9. Open the Signing Certificate file in a text editor, copy all data in the file, and then paste the data into the **Signing Certificate** field in the CloudLink Accounts portal.
286
286
287
287
> [!NOTE]
288
288
> If you have more than one certificate, we recommend that you paste them one after the other.

291
291
292
292
10. In the **Set up Mitel Connect** section on the **SAML-based sign-on** page of the Azure portal:
293
293
294
294
1. Copy the URL from the **Login URL** field and paste it into the **Sign-in URL** field in the CloudLink Accounts portal.
295
295
296
296
1. Copy the URL from the **Azure AD Identifier** field and paste it into the **IDP Identifier (Entity ID)** field in the CloudLink Accounts portal.

133
133
134
134
5. In the authentication URL textbox on the **Change your authentication URL** dialog page, paste the value of **Login URL** which you have copied from Azure portal, and then click **NEXT**.
0 commit comments