You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/gtnexus-sso-module-tutorial.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -95,11 +95,11 @@ To configure Azure AD single sign-on with GTNexus SSO System, perform the follow
95
95
96
96
a. Click **Upload metadata file**.
97
97
98
-

98
+

99
99
100
100
b. Click on **folder logo** to select the metadata file and click **Upload**.
101
101
102
-

102
+

103
103
104
104
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in GTNexus SSO System section textbox:
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/hackerone-tutorial.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -122,11 +122,11 @@ To configure Azure AD single sign-on with HackerOne, perform the following steps
122
122
123
123
2. In the menu on the top, click the **Settings**.
124
124
125
-

125
+

126
126
127
127
3. Navigate to **Authentication** and click **Add SAML settings**.
128
128
129
-

129
+

130
130
131
131
4. On the **SAML Settings** dialog, perform the following steps:
132
132
@@ -142,7 +142,7 @@ To configure Azure AD single sign-on with HackerOne, perform the following steps
142
142
143
143
5. On the Authentication Settings dialog, perform the following steps:
144
144
145
-

145
+

Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/halogen-software-tutorial.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -129,15 +129,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
129
129
130
130
2. Click the **Options** tab.
131
131
132
-

132
+

133
133
134
134
3. In the left navigation pane, click **SAML Configuration**.
135
135
136
-

136
+

137
137
138
138
4. On the **SAML Configuration** page, perform the following steps:
139
139
140
-

140
+

141
141
142
142
a. As **Unique Identifier**, select **NameID**.
143
143
@@ -164,7 +164,7 @@ The objective of this section is to create a user called Britta Simon in Saba Ta
164
164
165
165
2. Click the **User Center** tab, and then click **Create User**.
166
166
167
-

167
+

168
168
169
169
3. On the **New User** dialog page, perform the following steps:
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/happyfox-tutorial.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -128,19 +128,19 @@ To configure Azure AD single sign-on with HappyFox, perform the following steps:
128
128
129
129
2. Navigate to **Manage**, click on **Integrations** tab.
130
130
131
-

131
+

132
132
133
133
3. In the Integrations tab, click **Configure** under **SAML Integration** to open the Single Sign On Settings.
134
134
135
-

135
+

136
136
137
137
4. Inside SAML configuration section, paste the **Login URL** value, which you have copied from Azure portal into **SSO Target URL** textbox.
138
138
139
-

139
+

140
140
141
141
5. Open the certificate downloaded from Azure portal in notepad and paste its content in **IdP Signature** section.
142
142
143
-

143
+


139
139
140
140
5. On the **SSO Providers** section, click on **+ Add SSO Providers** > **SAML**.

147
147
148
148
a. Copy the **In your SSO Provider, please enable SAML-based login, then enter the following URL** instance and paste it in Reply URL textbox in **Basic SAML Configuration** section on Azure portal.
149
149
@@ -163,11 +163,11 @@ To enable Azure AD users to sign in to Harness, they must be provisioned into Ha
163
163
164
164
1. On the top-right of the page, click on **Continuous Security** > **Access Management** > **Users**.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/header-citrix-netscaler-tutorial.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -390,7 +390,7 @@ To bind a rewrite policy to a virtual server by using the GUI:
390
390
391
391
1. On the **Load Balancing Virtual Server** pane, under **Advanced Settings**, select **Policies**. All policies that are configured for your NetScaler instance appear in the list.
392
392
393
-

393
+

394
394
395
395

Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/kantegassoforconfluence-tutorial.md
+19-19
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ To configure Azure AD single sign-on with Kantega SSO for Confluence, perform th
93
93
94
94
4. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
95
95
96
-

96
+

97
97
98
98
a. In the **Identifier** text box, type a URL using the following pattern:
@@ -131,87 +131,87 @@ To configure Azure AD single sign-on with Kantega SSO for Confluence, perform th
131
131
132
132
1. Hover on cog and click the **Add-ons**.
133
133
134
-

134
+

135
135
136
136
1. Under **ATLASSIAN MARKETPLACE** tab, click **Find new add-ons**.
137
137
138
-

138
+

139
139
140
140
1. Search **Kantega SSO for Confluence SAML Kerberos** and click **Install** button to install the new SAML plugin.
141
141
142
-

142
+

143
143
144
144
1. The plugin installation starts.
145
145
146
-

146
+

147
147
148
148
1. Once the installation is complete. Click **Close**.
149
149
150
-

150
+

151
151
152
152
1. Click **Manage**.
153
153
154
-

154
+

155
155
156
156
1. Click **Configure** to configure the new plugin.
157
157
158
-

158
+

159
159
160
160
1. This new plugin can also be found under **USERS & SECURITY** tab.
161
161
162
-

162
+

163
163
164
164
1. In the **SAML** section. Select **Azure Active Directory (Azure AD)** from the **Add identity provider** dropdown.
165
165
166
-

166
+

167
167
168
168
1. Select subscription level as **Basic**.
169
169
170
-

170
+

171
171
172
172
1. On the **App properties** section, perform following steps:
173
173
174
-

174
+

175
175
176
176
a. Copy the **App ID URI** value and use it as **Identifier, Reply URL, and Sign-On URL** on the **Basic SAML Configuration** section in Azure portal.
177
177
178
178
b. Click **Next**.
179
179
180
180
1. On the **Metadata import** section, perform following steps:
181
181
182
-

182
+

183
183
184
184
a. Select **Metadata file on my computer**, and upload metadata file, which you have downloaded from Azure portal.
185
185
186
186
b. Click **Next**.
187
187
188
188
1. On the **Name and SSO location** section, perform following steps:
189
189
190
-

190
+

191
191
192
192
a. Add Name of the Identity Provider in **Identity provider name** textbox (e.g Azure AD).
193
193
194
194
b. Click **Next**.
195
195
196
196
1. Verify the Signing certificate and click **Next**.
197
197
198
-

198
+

199
199
200
200
1. On the **Confluence user accounts** section, perform following steps:
201
201
202
-

202
+

203
203
204
204
a. Select **Create users in Confluence's internal Directory if needed** and enter the appropriate name of the group for users (can be multiple no. of groups separated by comma).
205
205
206
206
b. Click **Next**.
207
207
208
208
1. Click **Finish**.
209
209
210
-

210
+

211
211
212
212
1. On the **Known domains for Azure AD** section, perform following steps:
213
213
214
-

214
+

215
215
216
216
a. Select **Known domains** from the left panel of the page.
217
217
@@ -280,7 +280,7 @@ To enable Azure AD users to sign in to Confluence, they must be provisioned into
280
280
281
281
1. Hover on cog and click the **User management**.
0 commit comments