Skip to content

Commit 7be504c

Browse files
authored
Merge pull request #58805 from kisi-inc/update_kisi_sso_endpoints
Update SAML endpoint URLs for Kisi SSO integration
2 parents 7dc12f5 + 2c81ec4 commit 7be504c

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

articles/active-directory/saas-apps/kisi-physical-security-tutorial.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,12 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8383
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8484

8585
a. In the **Identifier** text box, type a URL using the following pattern:
86-
`https://identity.kms.kisi.io/saml/<DOMAIN>`
86+
`https://api.kisi.io/saml/metadata`
8787

8888
b. In the **Reply URL** text box, type a URL using the following pattern:
89-
`https://identity.kms.kisi.io/saml/<DOMAIN>`
89+
`https://api.kisi.io/saml/consume/<DOMAIN>`
90+
91+
*Note: `DOMAIN` is a lowercase alphanumeric identifier assigned to the organization by Kisi, it's **not** the same as the organization's DNS domain name.*
9092

9193
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9294

@@ -101,7 +103,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
101103
![image](common/default-attributes.png)
102104

103105
1. In addition to above, Kisi Physical Security application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
104-
106+
105107
| Name | Source Attribute|
106108
| ---------------| --------- |
107109
| FirstName | user.givenname |
@@ -119,7 +121,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
119121
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
120122
1. Select **New user** at the top of the screen.
121123
1. In the **User** properties, follow these steps:
122-
1. In the **Name** field, enter `B.Simon`.
124+
1. In the **Name** field, enter `B.Simon`.
123125
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
124126
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
125127
1. Click **Create**.
@@ -150,7 +152,7 @@ To configure single sign-on on **Kisi Physical Security** side, you need to send
150152

151153
In this section, a user called Britta Simon is created in Kisi Physical Security. Kisi Physical Security supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Kisi Physical Security, a new one is created after authentication.
152154

153-
## Test SSO
155+
## Test SSO
154156

155157
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
156158

0 commit comments

Comments
 (0)