You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/migrate-okta-federation.md
+17-19Lines changed: 17 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,7 @@ You can migrate federation to Azure Active Directory (Azure AD) in a staged mann
23
23
24
24
- An Office 365 tenant federated to Okta for SSO
25
25
- An Azure AD Connect server or Azure AD Connect cloud provisioning agents configured for user provisioning to Azure AD
26
+
- One of the following roles: Global Administrator, Application Administrator, Cloud Application Administrator, or Hybrid Identity Administrator.
26
27
27
28
## Configure Azure AD Connect for authentication
28
29
@@ -59,7 +60,7 @@ For this tutorial, you configure password hash synchronization and seamless SSO.
59
60
60
61

61
62
62
-
5. Enter Global Administrator credentials.
63
+
5. Enter the credentials of the Global Administrator of the Azure AD Connect server.
63
64
64
65

65
66
@@ -89,11 +90,8 @@ Learn more: [Migrate to cloud authentication using Staged Rollout](../hybrid/con
89
90
90
91
After you enable password hash sync and seamless SSO on the Azure AD Connect server, configure a staged rollout:
91
92
92
-
1. Sign in to the [Azure portal](https://portal.azure.com), then select **View** or **Manage Azure Active Directory**.
93
-
94
-

95
-
96
-
2. On the **Azure Active Directory** menu, select **Azure AD Connect**.
93
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Hybrid Identity Administrator](../roles/permissions-reference.md#hybrid-identity-administrator).
94
+
2. Browse to **Identity** > **Hybrid management** > **Azure AD Connect** > **Connect Sync**.
97
95
3. Confirm **Password Hash Sync** is enabled in the tenant.
98
96
4. Select **Enable staged rollout for managed user sign-in**.
99
97
@@ -104,11 +102,11 @@ After you enable password hash sync and seamless SSO on the Azure AD Connect ser
104
102
7.**Seamless single sign-on** is **Off**. If you enable it, an error appears because it's enabled in the tenant.
105
103
8. Select **Manage groups**.
106
104
107
-

105
+

108
106
109
107
9. Add a group to the password hash sync rollout. In the following example, the security group starts with 10 members.
110
108
111
-

109
+

112
110
113
111
10. Wait about 30 minutes for the feature to take effect in your tenant.
114
112
11. When the feature takes effect, users aren't redirected to Okta when attempting to access Office 365 services.
@@ -125,14 +123,14 @@ Users that converted to managed authentication might need access to applications
125
123
126
124
Configure the enterprise application registration for Okta.
127
125
128
-
1. Sign in to the [Azure portal](https://portal.azure.com), then under **Manage Azure Active Directory**, select **View**.
129
-
2.On the left menu, under **Manage**, select**Enterprise applications**.
126
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
127
+
2.Browse to **Identity** > **Applications** >**Enterprise applications** > **All applications**.
130
128
131
-

129
+

132
130
133
-
3.On the **All applications** menu, select**New application**.
131
+
3.Select**New application**.
134
132
135
-

133
+

136
134
137
135
4. Select **Create your own application**.
138
136
5. On the menu, name the Okta app.
@@ -146,14 +144,14 @@ Configure the enterprise application registration for Okta.
146
144
10. On the Azure AD menu, select **App registrations**.
147
145
11. Open the created registration.
148
146
149
-

147
+

150
148
151
149
12. Record the Tenant ID and Application ID.
152
150
153
151
>[!Note]
154
152
>You need the Tenant ID and Application ID to configure the identity provider in Okta.
155
153
156
-

154
+

157
155
158
156
13. On the left menu, select **Certificates & secrets**.
159
157
14. Select **New client secret**.
@@ -181,7 +179,7 @@ Configure the enterprise application registration for Okta.
181
179
27. On the left menu, select **Branding**.
182
180
28. For **Home page URL**, add your user application home page.
183
181
184
-

182
+

185
183
186
184
29. In the Okta administration portal, to add a new identity provider, select **Security** then **Identity Providers**.
187
185
30. Select **Add Microsoft**.
@@ -218,7 +216,7 @@ You created the identity provider (IDP). Send users to the correct IDP.
218
216
8. Add the redirect URI you recorded in the IDP in Okta.
219
217
9. Select **Access tokens** and **ID tokens**.
220
218
221
-

219
+

222
220
223
221
10. In the admin console, select **Directory**.
224
222
11. Select **People**.
@@ -234,15 +232,15 @@ You created the identity provider (IDP). Send users to the correct IDP.
234
232
235
233
After you configure the Okta app in Azure AD and configure the IDP in the Okta portal, assign the application to users.
236
234
237
-
1. In the Azure portal, select **Azure Active Directory** then**Enterprise applications**.
235
+
1. In the Microsoft Entra admin center, browse to **Identity** > **Applications** >**Enterprise applications**.
238
236
2. Select the app registration you created.
239
237
3. Go to **Users and groups**.
240
238
4. Add the group that correlates with the managed authentication pilot.
241
239
242
240
>[!NOTE]
243
241
>You can add users and groups from the **Enterprise applications** page. You can't add users from the **App registrations** menu.
244
242
245
-

243
+

246
244
247
245
5. Wait about 15 minutes.
248
246
6. Sign in as a managed authentication pilot user.
0 commit comments