Skip to content

Commit 0d92582

Browse files
authored
Merge pull request #89858 from paulth1/howto-app-gallery-listing
edit pass: howto-app-gallery-listing
2 parents 05fb3d4 + 97073ed commit 0d92582

File tree

1 file changed

+52
-56
lines changed

1 file changed

+52
-56
lines changed

articles/active-directory/develop/howto-app-gallery-listing.md

Lines changed: 52 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ ms.custom: aaddev, seoapril2019
2222
ms.collection: M365-identity-device-management
2323
---
2424

25-
# How to: List your application in the Azure Active Directory application gallery
25+
# List your application in the Azure Active Directory application gallery
2626

27-
This article shows how to list an application in the Azure AD application gallery, implement single sign-on (SSO), and manage the listing.
27+
This article shows how to list an application in the Azure Active Directory (Azure AD) application gallery, implement single sign-on (SSO), and manage the listing.
2828

2929
## What is the Azure AD application gallery?
3030

@@ -33,106 +33,102 @@ This article shows how to list an application in the Azure AD application galler
3333
- A quick search finds your application in the gallery.
3434
- Free, Basic, and Premium Azure AD customers can all use this integration.
3535
- Mutual customers get a step-by-step configuration tutorial.
36-
- Customers who use SCIM can use provisioning for the same app.
36+
- Customers who use the System for Cross-domain Identity Management (SCIM) can use provisioning for the same app.
3737

3838
## Prerequisites
3939

40-
- For Federated applications (Open ID and SAML/WS-Fed), the application must support the SaaS model for getting listed in Azure AD gallery. The enterprise gallery applications should support multiple customer configurations and not any specific customer.
41-
42-
- For Open ID Connect, the application should be multi-tenanted and [Azure AD consent framework](consent-framework.md) should be properly implemented for the application. The user can send the login request to a common endpoint so that any customer can provide consent to the application. You can control user access based on the tenant ID and the user's UPN received in the token.
43-
44-
- For SAML 2.0/WS-Fed, your application needs to have the capability to do the SAML/WS-Fed SSO integration in SP or IDP mode. Please ensure this is working correctly before submitting the request.
45-
46-
- For password SSO, please ensure that your application supports form authentication so that password vaulting can be done to get single sign-on work as expected.
47-
48-
- Need a permanent account for testing with atleast 2 users registered.
40+
- For federated applications (Open ID and SAML/WS-Fed), the application must support the software-as-a-service (SaaS) model for getting listed in the Azure AD app gallery. The enterprise gallery applications must support multiple customer configurations and not any specific customer.
41+
- For Open ID Connect, the application must be multitenanted and the [Azure AD consent framework](consent-framework.md) must be properly implemented for the application. The user can send the sign-in request to a common endpoint so that any customer can provide consent to the application. You can control user access based on the tenant ID and the user's UPN received in the token.
42+
- For SAML 2.0/WS-Fed, your application must have the capability to do the SAML/WS-Fed SSO integration in SP or IDP mode. Make sure this capability is working correctly before you submit the request.
43+
- For password SSO, make sure that your application supports form authentication so that password vaulting can be done to get single sign-on to work as expected.
44+
- You need a permanent account for testing with at least two users registered.
4945

5046
## Submit the request in the portal
5147

52-
After you've tested that your application integration works with Azure AD, submit your request for access on our [Application Network Portal](https://microsoft.sharepoint.com/teams/apponboarding/Apps). If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account (such as Outlook or Hotmail) to sign in.
48+
After you've tested that your application integration works with Azure AD, submit your request for access in the [Application Network portal](https://microsoft.sharepoint.com/teams/apponboarding/Apps). If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account, such as Outlook or Hotmail, to sign in.
5349

54-
If the following page appears after sign in, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>) and provide the email account which you want to use for submitting the request. Then Azure AD team will add the account in the Microsoft Application Network Portal.
50+
If the following page appears after you sign in, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>). Provide the email account that you want to use for submitting the request. The Azure AD team will add the account in the Microsoft Application Network portal.
5551

56-
![Access Request on SharePoint portal](./media/howto-app-gallery-listing/errorimage.png)
52+
![Access request message on SharePoint portal](./media/howto-app-gallery-listing/errorimage.png)
5753

58-
Once the account is added, you can sign in to the Microsoft Application Network Portal.
54+
After the account is added, you can sign in to the Microsoft Application Network portal.
5955

60-
And if the following page appears after sign in, provide a business justification for needing access in the text box, and then select **Request Access**.
56+
If the following page appears after you sign in, provide a business justification for needing access in the text box. Then select **Request Access**.
6157

62-
![Access Request on SharePoint portal](./media/howto-app-gallery-listing/accessrequest.png)
58+
![Business justification box on SharePoint portal](./media/howto-app-gallery-listing/accessrequest.png)
6359

64-
Our team reviews the details and gives you access accordingly. Once your request is approved, you can sign in to the portal and submit the request by clicking the **Submit Request (ISV)** tile form the home page.
60+
Our team reviews the details and gives you access accordingly. After your request is approved, you can sign in to the portal and submit the request by selecting the **Submit Request (ISV)** tile on the home page.
6561

66-
![SharePoint portal Home page](./media/howto-app-gallery-listing/homepage.png)
62+
![Submit Request (ISV) tile on home page](./media/howto-app-gallery-listing/homepage.png)
6763

6864
> [!NOTE]
69-
> If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
65+
> If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
7066
71-
## Implementing SSO using federation protocol
67+
## Implement SSO by using the federation protocol
7268

73-
To list an application in the Azure AD app gallery, you first need to implement one of the following federation protocols supported by Azure AD and agree with Azure AD application Gallery terms and conditions. Read the terms and conditions of the Azure AD application gallery from [here](https://azure.microsoft.com/support/legal/active-directory-app-gallery-terms/).
69+
To list an application in the Azure AD app gallery, you first need to implement one of the following federation protocols supported by Azure AD. You also need to agree to the Azure AD application gallery terms and conditions. Read the terms and conditions of the Azure AD application gallery on [this website](https://azure.microsoft.com/support/legal/active-directory-app-gallery-terms/).
7470

75-
- **OpenID Connect**: To integrate your application with Azure AD using the Open ID Connect protocol, follow the [developers' instructions](authentication-scenarios.md).
71+
- **OpenID Connect**: To integrate your application with Azure AD by using the Open ID Connect protocol, follow the [developers' instructions](authentication-scenarios.md).
7672

77-
![TimeLine of listing OpenID Connect application into the gallery](./media/howto-app-gallery-listing/openid.png)
73+
![Listing an OpenID Connect application in the gallery](./media/howto-app-gallery-listing/openid.png)
7874

79-
* If you want to add your application to list in the gallery using OpenID Connect, select **OpenID Connect & OAuth 2.0** as above.
80-
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
75+
* If you want to add your application to list in the gallery by using OpenID Connect, select **OpenID Connect & OAuth 2.0** as shown.
76+
* If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
8177

82-
- **SAML 2.0** or **WS-Fed**: If your app supports SAML 2.0, you can integrate it directly with an Azure AD tenant by using the [instructions to add a custom application](../active-directory-saas-custom-apps.md).
78+
- **SAML 2.0** or **WS-Fed**: If your app supports SAML 2.0, you can integrate it directly with an Azure AD tenant by following the [instructions to add a custom application](../active-directory-saas-custom-apps.md).
8379

84-
![TimeLine of listing SAML 2.0 or WS-Fed application into the gallery](./media/howto-app-gallery-listing/saml.png)
80+
![Listing a SAML 2.0 or WS-Fed application in the gallery](./media/howto-app-gallery-listing/saml.png)
8581

86-
* If you want to add your application to list in the gallery using **SAML 2.0** or **WS-Fed**, select **SAMl 2.0/WS-Fed** as above.
87-
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
82+
* If you want to add your application to list in the gallery by using **SAML 2.0** or **WS-Fed**, select **SAML 2.0/WS-Fed** as shown.
83+
* If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
8884

89-
## Implementing SSO using password SSO
85+
## Implement SSO by using the password SSO
9086

91-
Create a web application that has an HTML sign-in page to configure [password-based single sign-on](../manage-apps/what-is-single-sign-on.md). Password-based SSO, also referred to as password vaulting, enables you to manage user access and passwords to web applications that don't support identity federation. It is also useful for scenarios in which several users need to share a single account, such as to your organization's social media app accounts.
87+
Create a web application that has an HTML sign-in page to configure [password-based single sign-on](../manage-apps/what-is-single-sign-on.md). Password-based SSO, also referred to as password vaulting, enables you to manage user access and passwords to web applications that don't support identity federation. It's also useful for scenarios in which several users need to share a single account, such as to your organization's social media app accounts.
9288

93-
![TimeLine of listing Password SSO application into the gallery](./media/howto-app-gallery-listing/passwordsso.png)
89+
![Listing a password SSO application in the gallery](./media/howto-app-gallery-listing/passwordsso.png)
9490

95-
* If you want to add your application to list in the gallery using Password SSO, select **Password SSO** as above.
96-
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
91+
* If you want to add your application to list in the gallery by using password SSO, select **Password SSO** as shown.
92+
* If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
9793

98-
## Requesting for User Provisioning
94+
## Request for user provisioning
9995

100-
Follow the below process to request for user provisioning-
96+
Follow the process shown in the following image to request user provisioning.
10197

102-
![TimeLine of listing saml application into the gallery](./media/howto-app-gallery-listing/user-provisioning.png)
98+
![Request for user provisioning](./media/howto-app-gallery-listing/user-provisioning.png)
10399

104-
## Update/Remove existing listing
100+
## Update or remove an existing listing
105101

106-
To update or remove an existing application in the Azure AD app gallery, you first need to submit the request in the [Application Network Portal](https://microsoft.sharepoint.com/teams/apponboarding/Apps). If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account (such as Outlook or Hotmail) to sign in.
102+
To update or remove an existing application in the Azure AD app gallery, you first need to submit the request in the [Application Network portal](https://microsoft.sharepoint.com/teams/apponboarding/Apps). If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account, such as Outlook or Hotmail, to sign in.
107103

108-
- Select the appropriate option as shown in the following image:
104+
- Select the appropriate option as shown in the following image.
109105

110-
![TimeLine of listing saml application into the gallery](./media/howto-app-gallery-listing/updateorremove.png)
106+
![Listing a SAML application in the gallery](./media/howto-app-gallery-listing/updateorremove.png)
111107

112-
* If you want to update an existing application, select appropriate option as per your requirement.
113-
* If you want to remove an existing application from the Azure AD gallery, select **Remove my application listing from the gallery**.
114-
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
108+
* To update an existing application, select the appropriate option as per your requirement.
109+
* To remove an existing application from the Azure AD app gallery, select **Remove my application listing from the gallery**.
110+
* If you have any issues with access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
115111

116-
## Listing requests by customers
112+
## List requests by customers
117113

118-
Customers can submit the request of listing an application by clicking **App requests by Customers** -> **Submit new request**.
114+
Customers can submit a request to list an application by selecting **App requests by Customers** > **Submit new request**.
119115

120-
![Shows the customer requested apps tile](./media/howto-app-gallery-listing/customer-submit-request.png)
116+
![Shows the customer-requested apps tile](./media/howto-app-gallery-listing/customer-submit-request.png)
121117

122-
Below is the flow of customer requested applications-
118+
Here's the flow of customer-requested applications.
123119

124-
![Shows the customer requested apps flow](./media/howto-app-gallery-listing/customer-request.png)
120+
![Shows the customer-requested apps flow](./media/howto-app-gallery-listing/customer-request.png)
125121

126122
## Timelines
127123

128-
The timeline for the process of listing a SAML 2.0 or WS-Fed application in the gallery is 7-10 business days.
124+
The timeline for the process of listing a SAML 2.0 or WS-Fed application in the gallery is 7 to 10 business days.
129125

130-
![TimeLine of listing SAML application into the gallery](./media/howto-app-gallery-listing/timeline.png)
126+
![Timeline for listing a SAML application in the gallery](./media/howto-app-gallery-listing/timeline.png)
131127

132-
The timeline for the process of listing an OpenID Connect application in the gallery is 2-5 business days.
128+
The timeline for the process of listing an OpenID Connect application in the gallery is 2 to 5 business days.
133129

134-
![TimeLine of listing SAML application into the gallery](./media/howto-app-gallery-listing/timeline2.png)
130+
![Timeline for listing an OpenID Connect application in the gallery](./media/howto-app-gallery-listing/timeline2.png)
135131

136132
## Escalations
137133

138-
For any escalations, send email to the [Azure AD SSO Integration Team](mailto:[email protected]) which is [email protected] and we'll respond as soon as possible.
134+
For any escalations, send email to the [Azure AD SSO Integration Team](mailto:[email protected]) at [email protected], and we'll respond as soon as possible.

0 commit comments

Comments
 (0)