At the active directory management menu, select Enterprise applications.
At the Enterprise applications menu, select New Application
Ad the brows applications menu, select create your own application
At the create application form, add application Oitchau and click “Create”
At the application window select set up single sign on
At the single sign-on configuration screen, select “SAML”
Copy to clipboard the App Federation Metadata Url:
Login as Administrator to Oitcahu Admin and navigate to the security configuration. Paste the copied URL from previous step to the IdP metadata field and click “Save”
In the same screen, add mapping field for email with the value http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress for
email and click save.
From the same screen, copy the metadata url and download the file using any download tool and save it for later. In this example we called the file metadata.xml
Download the Oitcahu public certificate in DER format and save it for later use.
Return the Azure Active Directory screen and continue with the SAML configuration.
In the setup SAML screen, select upload metadata file
In the upload menu, upload the metadata.xml file that was downloaded in the early stages.
Once the metadata.xml uploaded, verify the details and click “Save”.
You should now have the application configure as in the screenshoot below
Navigate to the “Token Encryption” under the Oitchau application security section and click “Import Certificate”
Select the Oitchau public certificate that downloaded previously and click “Add”
Once uploaded, Activate the token encryption. Assign users/groups to whom your organization permits to use the Oitchau application
Test SSO and make sure everything works
Comments
0 comments
Article is closed for comments.