|
| 1 | +--- |
| 2 | +title: 'Tutorial: Azure Active Directory integration with Wingspan eTMF | Microsoft Docs' |
| 3 | +description: Learn how to configure single sign-on between Azure Active Directory and Wingspan eTMF. |
| 4 | +services: active-directory |
| 5 | +documentationCenter: na |
| 6 | +author: jeevansd |
| 7 | +manager: femila |
| 8 | + |
| 9 | +ms.assetid: ace320d3-521c-449c-992f-feabe7538de7 |
| 10 | +ms.service: active-directory |
| 11 | +ms.workload: identity |
| 12 | +ms.tgt_pltfrm: na |
| 13 | +ms.devlang: na |
| 14 | +ms.topic: article |
| 15 | +ms.date: 04/19/2017 |
| 16 | +ms.author: jeedes |
| 17 | + |
| 18 | +--- |
| 19 | +# Tutorial: Azure Active Directory integration with Wingspan eTMF |
| 20 | + |
| 21 | +In this tutorial, you learn how to integrate Wingspan eTMF with Azure Active Directory (Azure AD). |
| 22 | + |
| 23 | +Integrating Wingspan eTMF with Azure AD provides you with the following benefits: |
| 24 | + |
| 25 | +- You can control in Azure AD who has access to Wingspan eTMF |
| 26 | +- You can enable your users to automatically get signed-on to Wingspan eTMF (Single Sign-On) with their Azure AD accounts |
| 27 | +- You can manage your accounts in one central location - the Azure portal |
| 28 | + |
| 29 | +If you want to know more details about SaaS app integration with Azure AD, see [what is application access and single sign-on with Azure Active Directory](active-directory-appssoaccess-whatis.md). |
| 30 | + |
| 31 | +## Prerequisites |
| 32 | + |
| 33 | +To configure Azure AD integration with Wingspan eTMF, you need the following items: |
| 34 | + |
| 35 | +- An Azure AD subscription |
| 36 | +- A Wingspan eTMF single-sign on enabled subscription |
| 37 | + |
| 38 | +> [!NOTE] |
| 39 | +> To test the steps in this tutorial, we do not recommend using a production environment. |
| 40 | +
|
| 41 | +To test the steps in this tutorial, you should follow these recommendations: |
| 42 | + |
| 43 | +- Do not use your production environment, unless it is necessary. |
| 44 | +- If you don't have an Azure AD trial environment, you can get a one-month trial [here](https://azure.microsoft.com/pricing/free-trial/). |
| 45 | + |
| 46 | +## Scenario description |
| 47 | +In this tutorial, you test Azure AD single sign-on in a test environment. |
| 48 | +The scenario outlined in this tutorial consists of two main building blocks: |
| 49 | + |
| 50 | +1. Adding Wingspan eTMF from the gallery |
| 51 | +2. Configuring and testing Azure AD single sign-on |
| 52 | + |
| 53 | +## Adding Wingspan eTMF from the gallery |
| 54 | +To configure the integration of Wingspan eTMF into Azure AD, you need to add Wingspan eTMF from the gallery to your list of managed SaaS apps. |
| 55 | + |
| 56 | +**To add Wingspan eTMF from the gallery, perform the following steps:** |
| 57 | + |
| 58 | +1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon. |
| 59 | + |
| 60 | + ![Active Directory][1] |
| 61 | + |
| 62 | +2. Navigate to **Enterprise applications**. Then go to **All applications**. |
| 63 | + |
| 64 | + ![Applications][2] |
| 65 | + |
| 66 | +3. To add new application, click **New application** button on the top of dialog. |
| 67 | + |
| 68 | + ![Applications][3] |
| 69 | + |
| 70 | +4. In the search box, type **Wingspan eTMF**. |
| 71 | + |
| 72 | +  |
| 73 | + |
| 74 | +5. In the results panel, select **Wingspan eTMF**, and then click **Add** button to add the application. |
| 75 | + |
| 76 | +  |
| 77 | + |
| 78 | +## Configuring and testing Azure AD single sign-on |
| 79 | +In this section, you configure and test Azure AD single sign-on with Wingspan eTMF based on a test user called "Britta Simon." |
| 80 | + |
| 81 | +For single sign-on to work, Azure AD needs to know what the counterpart user in Wingspan eTMF is to a user in Azure AD. In other words, a link relationship between an Azure AD user and the related user in Wingspan eTMF needs to be established. |
| 82 | + |
| 83 | +This link relationship is established by assigning the value of the **user name** in Azure AD as the value of the **Username** in Wingspan eTMF. |
| 84 | + |
| 85 | +To configure and test Azure AD single sign-on with Wingspan eTMF, you need to complete the following building blocks: |
| 86 | + |
| 87 | +1. **[Configuring Azure AD Single Sign-On](#configuring-azure-ad-single-sign-on)** - to enable your users to use this feature. |
| 88 | +2. **[Creating an Azure AD test user](#creating-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon. |
| 89 | +3. **[Creating a Wingspan eTMF test user](#creating-a-wingspan-etmf-test-user)** - to have a counterpart of Britta Simon in Wingspan eTMF that is linked to the Azure AD representation of user. |
| 90 | +4. **[Assigning the Azure AD test user](#assigning-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on. |
| 91 | +5. **[Testing Single Sign-On](#testing-single-sign-on)** - to verify whether the configuration works. |
| 92 | + |
| 93 | +### Configuring Azure AD single sign-on |
| 94 | + |
| 95 | +In this section, you enable Azure AD single sign-on in the Azure portal and configure single sign-on in your Wingspan eTMF application. |
| 96 | + |
| 97 | +**To configure Azure AD single sign-on with Wingspan eTMF, perform the following steps:** |
| 98 | + |
| 99 | +1. In the Azure portal, on the **Wingspan eTMF** application integration page, click **Single sign-on**. |
| 100 | + |
| 101 | + ![Configure Single Sign-On][4] |
| 102 | + |
| 103 | +2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on. |
| 104 | + |
| 105 | +  |
| 106 | + |
| 107 | +3. On the **Wingspan eTMF Domain and URLs** section, perform the following steps: |
| 108 | + |
| 109 | +  |
| 110 | + |
| 111 | + a. In the **Sign-on URL** textbox, type a URL using the following pattern: `https://<customer name>.<instance name>.mywingspan.com/saml` |
| 112 | + |
| 113 | + b. In the **Identifier** textbox, type a URL using the following pattern: `http://saml.<instance name>.wingspan.com/shibboleth` |
| 114 | + |
| 115 | + c. In the **Reply URL** textbox, type a URL using the following pattern: `https://<customer name>.<instance name>.mywingspan.com/` |
| 116 | + |
| 117 | + > [!NOTE] |
| 118 | + > These values are not the real. Update these values with the actual Sign-On URL, Identifier and Reply URL including the actual customer name and instance name. Contact [Wingspan eTMF Client support team](http://www.wingspan.com/contact-us/) to get these values. |
| 119 | + |
| 120 | +4. On the **SAML Signing Certificate** section, click **Metadata XML** and then save the metadata file on your computer. |
| 121 | + |
| 122 | +  |
| 123 | + |
| 124 | +5. Click **Save** button. |
| 125 | + |
| 126 | +  |
| 127 | + |
| 128 | +6. To configure single sign-on on **Wingspan eTMF** side, you need to send the downloaded **Metadata XML** to [Wingspan eTMF support](http://www.wingspan.com/contact-us/). They set this up to have the SAML SSO connection set properly on both sides. |
| 129 | + |
| 130 | +> [!TIP] |
| 131 | +> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation]( https://go.microsoft.com/fwlink/?linkid=845985) |
| 132 | + |
| 133 | + |
| 134 | +### Creating an Azure AD test user |
| 135 | +The objective of this section is to create a test user in the Azure portal called Britta Simon. |
| 136 | + |
| 137 | +![Create Azure AD User][100] |
| 138 | + |
| 139 | +**To create a test user in Azure AD, perform the following steps:** |
| 140 | + |
| 141 | +1. In the **Azure portal**, on the left navigation pane, click **Azure Active Directory** icon. |
| 142 | + |
| 143 | +  |
| 144 | + |
| 145 | +2. To display the list of users, go to **Users and groups** and click **All users**. |
| 146 | + |
| 147 | +  |
| 148 | + |
| 149 | +3. To open the **User** dialog, click **Add** on the top of the dialog. |
| 150 | + |
| 151 | +  |
| 152 | + |
| 153 | +4. On the **User** dialog page, perform the following steps: |
| 154 | + |
| 155 | +  |
| 156 | + |
| 157 | + a. In the **Name** textbox, type **BrittaSimon**. |
| 158 | + |
| 159 | + b. In the **User name** textbox, type the **email address** of BrittaSimon. |
| 160 | + |
| 161 | + c. Select **Show Password** and write down the value of the **Password**. |
| 162 | + |
| 163 | + d. Click **Create**. |
| 164 | + |
| 165 | +### Creating a Wingspan eTMF test user |
| 166 | + |
| 167 | +In this section, you create a user called Britta Simon in Wingspan eTMF. Work with [Wingspan eTMF support](http://www.wingspan.com/contact-us/) to add the users in the Wingspan eTMF application. Users must be created and activated before you use single sign-on. |
| 168 | + |
| 169 | +### Assigning the Azure AD test user |
| 170 | + |
| 171 | +In this section, you enable Britta Simon to use Azure single sign-on by granting access to Wingspan eTMF. |
| 172 | + |
| 173 | +![Assign User][200] |
| 174 | + |
| 175 | +**To assign Britta Simon to Wingspan eTMF, perform the following steps:** |
| 176 | + |
| 177 | +1. In the Azure portal, open the applications view, and then navigate to the directory view and go to **Enterprise applications** then click **All applications**. |
| 178 | + |
| 179 | + ![Assign User][201] |
| 180 | + |
| 181 | +2. In the applications list, select **Wingspan eTMF**. |
| 182 | + |
| 183 | +  |
| 184 | + |
| 185 | +3. In the menu on the left, click **Users and groups**. |
| 186 | + |
| 187 | + ![Assign User][202] |
| 188 | + |
| 189 | +4. Click **Add** button. Then select **Users and groups** on **Add Assignment** dialog. |
| 190 | + |
| 191 | + ![Assign User][203] |
| 192 | + |
| 193 | +5. On **Users and groups** dialog, select **Britta Simon** in the Users list. |
| 194 | + |
| 195 | +6. Click **Select** button on **Users and groups** dialog. |
| 196 | + |
| 197 | +7. Click **Assign** button on **Add Assignment** dialog. |
| 198 | + |
| 199 | +### Testing single sign-on |
| 200 | + |
| 201 | +In this section, you test your Azure AD single sign-on configuration using the Access Panel. |
| 202 | + |
| 203 | +Click the Wingspan eTMF tile in the Access Panel, you will be redirected to Organization sign on page. After successful login, you will be signed-on to your Wingspan eTMF application. For more information about the Access Panel, see [Introduction to the Access Panel](https://msdn.microsoft.com/library/dn308586). |
| 204 | + |
| 205 | +## Additional resources |
| 206 | + |
| 207 | +* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](active-directory-saas-tutorial-list.md) |
| 208 | +* [What is application access and single sign-on with Azure Active Directory?](active-directory-appssoaccess-whatis.md) |
| 209 | + |
| 210 | + |
| 211 | + |
| 212 | +<!--Image references--> |
| 213 | + |
| 214 | +[1]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_01.png |
| 215 | +[2]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_02.png |
| 216 | +[3]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_03.png |
| 217 | +[4]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_04.png |
| 218 | + |
| 219 | +[100]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_100.png |
| 220 | + |
| 221 | +[200]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_200.png |
| 222 | +[201]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_201.png |
| 223 | +[202]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_202.png |
| 224 | +[203]: ./media/active-directory-saas-wingspanetmf-tutorial/tutorial_general_203.png |
| 225 | + |
0 commit comments