Skip to content

Commit 253d0b0

Browse files
Merge pull request #212468 from v-hgampala/headspace-update-pr
Product Backlog Item 2092254: SaaS App Tutorial: Headspace Update
2 parents 2685cd1 + 8631f54 commit 253d0b0

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/saas-apps/headspace-tutorial.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/09/2022
12+
ms.date: 09/26/2022
1313
ms.author: jeedes
1414

1515
---
@@ -80,13 +80,13 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8080
`urn:auth0:<Auth0TenantName>:<CustomerConnectionName>`
8181

8282
b. In the **Reply URL** textbox, type a value using the following pattern:
83-
`https://auth.<Enviornment>.headspace.com/login/callback?connection=<CustomerConnectionName>`
83+
`https://auth.<Environment>.headspace.com/login/callback?connection=<CustomerConnectionName>`
8484

85-
c. In the **Sign on URL** textbox, type a value using the following pattern:
86-
`https://<Environment>.headspace.com/sso-login`
85+
c. In the **Sign on URL** textbox, type the URL:
86+
`https://headspace.com/sso-login`
8787

8888
> [!Note]
89-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Headspace Client support team](mailto:ecosystem-integration-squad@headspace.com) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
89+
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Headspace Client support team](mailto:ecosystem-integration-squad@headspace.com) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9090
9191
1. Headspace application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9292

@@ -164,4 +164,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
164164

165165
## Next steps
166166

167-
Once you configure Headspace you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
167+
Once you configure Headspace you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)