|
| 1 | +--- |
| 2 | +title: 'Tutorial: Azure Active Directory integration with Abstract | Microsoft Docs' |
| 3 | +description: Learn how to configure single sign-on between Azure Active Directory and Abstract. |
| 4 | +services: active-directory |
| 5 | +documentationCenter: na |
| 6 | +author: jeevansd |
| 7 | +manager: mtillman |
| 8 | +ms.reviewer: barbkess |
| 9 | + |
| 10 | +ms.assetid: 2eb167ab-d769-4661-a8cb-ae371cb63d2a |
| 11 | +ms.service: active-directory |
| 12 | +ms.subservice: saas-app-tutorial |
| 13 | +ms.workload: identity |
| 14 | +ms.tgt_pltfrm: na |
| 15 | +ms.devlang: na |
| 16 | +ms.topic: tutorial |
| 17 | +ms.date: 07/16/2019 |
| 18 | +ms.author: jeedes |
| 19 | + |
| 20 | +ms.collection: M365-identity-device-management |
| 21 | +--- |
| 22 | + |
| 23 | +# Tutorial: Integrate Abstract with Azure Active Directory |
| 24 | + |
| 25 | +In this tutorial, you'll learn how to integrate Abstract with Azure Active Directory (Azure AD). When you integrate Abstract with Azure AD, you can: |
| 26 | + |
| 27 | +* Control in Azure AD who has access to Abstract. |
| 28 | +* Enable your users to be automatically signed-in to Abstract with their Azure AD accounts. |
| 29 | +* Manage your accounts in one central location - the Azure portal. |
| 30 | + |
| 31 | +To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis). |
| 32 | + |
| 33 | +## Prerequisites |
| 34 | + |
| 35 | +To get started, you need the following items: |
| 36 | + |
| 37 | +* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/). |
| 38 | +* Abstract single sign-on (SSO) enabled subscription. |
| 39 | + |
| 40 | +## Scenario description |
| 41 | + |
| 42 | +In this tutorial, you configure and test Azure AD SSO in a test environment. |
| 43 | + |
| 44 | +* Abstract supports **SP and IDP** initiated SSO |
| 45 | + |
| 46 | +## Adding Abstract from the gallery |
| 47 | + |
| 48 | +To configure the integration of Abstract into Azure AD, you need to add Abstract from the gallery to your list of managed SaaS apps. |
| 49 | + |
| 50 | +1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account. |
| 51 | +1. On the left navigation pane, select the **Azure Active Directory** service. |
| 52 | +1. Navigate to **Enterprise Applications** and then select **All Applications**. |
| 53 | +1. To add new application, select **New application**. |
| 54 | +1. In the **Add from the gallery** section, type **Abstract** in the search box. |
| 55 | +1. Select **Abstract** from results panel and then add the app. Wait a few seconds while the app is added to your tenant. |
| 56 | + |
| 57 | + |
| 58 | +## Configure and test Azure AD single sign-on |
| 59 | + |
| 60 | +Configure and test Azure AD SSO with Abstract using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Abstract. |
| 61 | + |
| 62 | +To configure and test Azure AD SSO with Abstract, complete the following building blocks: |
| 63 | + |
| 64 | +1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature. |
| 65 | +2. **[Configure Abstract SSO](#configure-abstract-sso)** - to configure the Single Sign-On settings on application side. |
| 66 | +3. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon. |
| 67 | +4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on. |
| 68 | +5. **[Create Abstract test user](#create-abstract-test-user)** - to have a counterpart of Britta Simon in Abstract that is linked to the Azure AD representation of user. |
| 69 | +6. **[Test SSO](#test-sso)** - to verify whether the configuration works. |
| 70 | + |
| 71 | +### Configure Azure AD SSO |
| 72 | + |
| 73 | +Follow these steps to enable Azure AD SSO in the Azure portal. |
| 74 | + |
| 75 | +1. In the [Azure portal](https://portal.azure.com/), on the **Abstract** application integration page, find the **Manage** section and select **Single sign-on**. |
| 76 | +1. On the **Select a Single sign-on method** page, select **SAML**. |
| 77 | +1. On the **Set up Single Sign-On with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings. |
| 78 | + |
| 79 | +  |
| 80 | + |
| 81 | +1. On the **Basic SAML Configuration** section the application is pre-configured in **IDP** initiated mode and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button. |
| 82 | + |
| 83 | +1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode: |
| 84 | + |
| 85 | + In the **Sign-on URL** text box, type a URL: |
| 86 | + `https://app.abstract.com/signin` |
| 87 | + |
| 88 | +4. On the **Set up Single Sign-On with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer. |
| 89 | + |
| 90 | +  |
| 91 | + |
| 92 | +### Configure Abstract SSO |
| 93 | + |
| 94 | +Make sure to retrieve your `App Federation Metadata Url` and the `Azure AD Identifier` from the Azure portal, as you will need those to configure SSO on Abstract. |
| 95 | + |
| 96 | +You will find those information on the **Set up Single Sign-On with SAML** page: |
| 97 | + |
| 98 | +* The `App Federation Metadata Url` is located in the **SAML Signing Certificate** section. |
| 99 | +* The `Azure AD Identifier` is located in the **Set up Abstract** section. |
| 100 | + |
| 101 | + |
| 102 | +You are now ready to configure SSO on Abstract: |
| 103 | + |
| 104 | +>[!Note] |
| 105 | +>You will need to authenticate with an organization Admin account to access the SSO settings on Abstract. |
| 106 | +
|
| 107 | +1. Open the [Abstract web app](https://app.abstract.com/). |
| 108 | +2. Go to the **Permissions** page in the left side bar. |
| 109 | +3. In the **Configure SSO** section, enter your **Metadata URL** and **Entity ID**. |
| 110 | +4. Enter any manual exceptions you might have. Emails listed in the manual exceptions section will bypass SSO and be able to log in with email and password. |
| 111 | +5. Click **Save Changes**. |
| 112 | + |
| 113 | +>[!Note] |
| 114 | +>You’ll need to use primary email addresses in the manual exceptions list. SSO activation will fail if the email you list is a user’s secondary email. If that happens, you’ll see an error message with the primary email for the failing account. Add that primary email to the manual exceptions list after you’ve verified you know the user. |
| 115 | +
|
| 116 | +### Create an Azure AD test user |
| 117 | + |
| 118 | +In this section, you'll create a test user in the Azure portal called B.Simon. |
| 119 | + |
| 120 | +1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**. |
| 121 | +1. Select **New user** at the top of the screen. |
| 122 | +1. In the **User** properties, follow these steps: |
| 123 | + 1. In the **Name** field, enter `B.Simon`. |
| 124 | + 1. In the **User name** field, enter the username@companydomain.extension. For example, `B.Simon@contoso.com`. |
| 125 | + 1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box. |
| 126 | + 1. Click **Create**. |
| 127 | + |
| 128 | +### Assign the Azure AD test user |
| 129 | + |
| 130 | +In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Abstract. |
| 131 | + |
| 132 | +1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**. |
| 133 | +1. In the applications list, select **Abstract**. |
| 134 | +1. In the app's overview page, find the **Manage** section and select **Users and groups**. |
| 135 | + |
| 136 | +  |
| 137 | + |
| 138 | +1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog. |
| 139 | + |
| 140 | +  |
| 141 | + |
| 142 | +1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen. |
| 143 | +1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen. |
| 144 | +1. In the **Add Assignment** dialog, click the **Assign** button. |
| 145 | + |
| 146 | +### Create Abstract test user |
| 147 | + |
| 148 | +To test SSO on Abstract: |
| 149 | + |
| 150 | +1. Open the [Abstract web app](https://app.abstract.com/). |
| 151 | +2. Go to the **Permissions** page in the left side bar. |
| 152 | +3. Click **Test with my Account**. If the test fails, please [contact our support team](https://www.abstract.com/help/contact/). |
| 153 | + |
| 154 | +>[!Note] |
| 155 | +>You will need to authenticate with an organization Admin account to access the SSO settings on Abstract. |
| 156 | +This organization Admin account will need to be assigned to Abstract on the Azure portal. |
| 157 | + |
| 158 | +### Test SSO |
| 159 | + |
| 160 | +In this section, you test your Azure AD single sign-on configuration using the Access Panel. |
| 161 | + |
| 162 | +When you click the Abstract tile in the Access Panel, you should be automatically signed in to the Abstract for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction). |
| 163 | + |
| 164 | +## Additional Resources |
| 165 | + |
| 166 | +- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list) |
| 167 | + |
| 168 | +- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis) |
| 169 | + |
| 170 | +- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview) |
| 171 | + |
0 commit comments