|
1 | 1 | ---
|
2 |
| -title: enforce signed SAML authentication requests |
| 2 | +title: Enforce signed SAML authentication requests |
3 | 3 | description: Learn how to enforce signed SAML authentication requests.
|
4 | 4 | services: active-directory
|
5 | 5 | author: AllisonAm
|
@@ -31,47 +31,47 @@ If enabled Azure Active Directory will validate the requests against the public
|
31 | 31 |
|
32 | 32 | ## To configure SAML Request Signature Verification in the Azure portal
|
33 | 33 |
|
34 |
| -1. Inside the Azure Portal, navigate to **Azure Active Directory** from the Search bar or Azure Services. |
35 |
| - |
36 |
| - |
37 |
| - |
| 34 | +1. Inside the Azure portal, navigate to **Azure Active Directory** from the Search bar or Azure Services. |
| 35 | + |
| 36 | +  |
| 37 | + |
38 | 38 | 2. Navigate to **Enterprise applications** from the left menu.
|
39 |
| - |
40 |
| - |
41 |
| - |
| 39 | + |
| 40 | +  |
| 41 | + |
42 | 42 | 3. Select the application you wish to apply the changes.
|
43 | 43 |
|
44 | 44 | 4. Navigate to **Single sign-on.**
|
45 | 45 |
|
46 | 46 | 5. In the **Single sign-on** screen, there's a new subsection called **Verification certificates** under **SAML Certificates.**
|
47 |
| - |
48 |
| - |
49 |
| - |
| 47 | + |
| 48 | +  |
| 49 | + |
50 | 50 | 6. Click on **Edit.**
|
51 | 51 |
|
52 | 52 | 7. In the new blade, you'll be able to enable the verification of signed requests and opt-in for weak algorithm verification in case your application still uses RSA-SHA1 to sign the authentication requests.
|
53 | 53 |
|
54 | 54 | 8. To enable the verification of signed requests, click **Enable verification certificates** and upload a verification public key that matches with the private key used to sign the request.
|
55 |
| - |
56 |
| - |
57 |
| - |
58 |
| - |
59 |
| - |
60 |
| - |
| 55 | + |
| 56 | +  |
| 57 | + |
| 58 | +  |
| 59 | + |
| 60 | +  |
61 | 61 |
|
62 | 62 | 9. Once you have your verification certificate uploaded, click **Save.**
|
63 |
| - |
64 |
| - |
65 |
| - |
66 |
| - |
| 63 | + |
| 64 | +  |
| 65 | + |
| 66 | +  |
67 | 67 |
|
68 | 68 | 10. When the verification of signed requests is enabled, the test experience is disabled as the requests requires to be signed by the service provider.
|
69 |
| - |
70 |
| - |
71 |
| - |
| 69 | + |
| 70 | +  |
| 71 | + |
72 | 72 | 11. If you want to see the current configuration of an enterprise application, you can navigate to the **Single Sign-on** screen and see the summary of your configuration under **SAML Certificates**. There you'll be able to see if the verification of signed requests is enabled and the count of Active and Expired verification certificates.
|
73 |
| - |
74 |
| - |
| 73 | + |
| 74 | +  |
75 | 75 |
|
76 | 76 | ## Next steps
|
77 | 77 |
|
|
0 commit comments