You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Set up sign-up and sign-in with a Microsoft account - Azure Active Directory B2C | Microsoft Docs
2
+
title: Set up sign-up and sign-in with a Microsoft account - Azure Active Directory B2C
3
3
description: Provide sign-up and sign-in to customers with Microsoft accounts in your applications using Azure Active Directory B2C.
4
4
services: active-directory-b2c
5
5
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 09/21/2018
11
+
ms.date: 06/11/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
14
---
@@ -19,22 +19,28 @@ ms.subservice: B2C
19
19
20
20
To use a Microsoft account as an [identity provider](active-directory-b2c-reference-oidc.md) in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Microsoft account, you can get it at [https://www.live.com/](https://www.live.com/).
21
21
22
-
1. Sign in to the [Microsoft Application Registration Portal](https://apps.dev.microsoft.com/?referrer=https://azure.microsoft.com/documentation/articles&deeplink=/appList) with your Microsoft account credentials.
23
-
2. In the upper-right corner, select **Add an app**.
24
-
3. Enter a **Name** for your application. For example, *MSAapp1*.
25
-
4. Select **Generate New Password** and make sure that you copy the password to use when you configure the identity provider. Also copy the **Application Id**.
26
-
5. Select **Add platform**, and then and choose **Web**.
27
-
4. Enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Redirect URLs**. Replace `your-tenant-name` with the name of your tenant.
28
-
5. Select **Save**.
22
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
23
+
1. Select **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
24
+
1. Select **New registration**
25
+
1. Enter a **Name** for your application. For example, *MSAapp1*.
26
+
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com)**. This option targets the widest set of Microsoft identities.
27
+
28
+
For more information on the different account type selections, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
29
+
1. Under **Redirect URI (optional)**, select **Web** and enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in the text box. Replace `your-tenant-name` with your Azure AD B2C tenant name.
30
+
1. Select **Register**
31
+
1. Record the **Application (client) ID** shown on the application Overview page. You need this when you configure the identity provider in the next section.
32
+
1. Select **Certificates & secrets**
33
+
1. Click **New client secret**
34
+
1. Enter a **Description** for the secret, for example *Application password 1*, and then click **Add**.
35
+
1. Record the application password shown in the **VALUE** column. You need this when you configure the identity provider in the next section.
29
36
30
37
## Configure a Microsoft account as an identity provider
31
38
32
39
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
33
-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
34
-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
35
-
4. Select **Identity providers**, and then select **Add**.
7. Select **Set up this identity provider** and enter the Application Id that you recorded earlier as the **Client ID** and enter the password that you recorded as the **Client secret** of the Microsoft account application that you created earlier.
39
-
8. Click **OK** and then click **Create** to save your Microsoft account configuration.
40
-
40
+
1. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
41
+
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
42
+
1. Select **Identity providers**, and then select **Add**.
1. Select **Set up this identity provider** and enter the Application (client) ID that you recorded earlier in the **Client ID** text box, and enter the client secret that you recorded in the **Client secret** text box.
46
+
1. Click **OK** and then click **Create** to save your Microsoft account configuration.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ After the feature has been running in audit mode for a reasonable period, you ca
33
33
34
34
## Deployment requirements
35
35
36
-
*Azure Active Directory Premium P1 or P2 license. For more detailed information about Azure Active Directory licensing, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory/).
36
+
*Licensing requirements for Azure AD password protection can be found in the article [Eliminate bad passwords in your organization](concept-password-ban-bad.md#license-requirements).
37
37
* All domain controllers that get the DC Agent service for Azure AD password protection installed must run Windows Server 2012 or later. This requirement does not imply that the Active Directory domain or forest must also be at Windows Server 2012 domain or forest functional level. As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there is no minimum DFL or FFL required for either the DC agent or proxy software to run.
38
38
* All machines that get the DC agent service installed must have .NET 4.5 installed.
39
39
* All machines that get the proxy service for Azure AD password protection installed must run Windows Server 2012 R2 or later.
title: 'Configure an One Click SSO to your application from the Azure AD app gallery | Microsoft Docs'
3
+
description: Steps to configure One Click SSO to your application from the Azure AD app gallery.
4
+
services: active-directory
5
+
documentationCenter: na
6
+
author: jeevansd
7
+
manager: mtillman
8
+
ms.reviewer: celested
9
+
10
+
ms.assetid: e0416991-4b5d-4b18-89bb-91b6070ed3ba
11
+
ms.service: active-directory
12
+
ms.subservice: saas-app-tutorial
13
+
ms.workload: identity
14
+
ms.tgt_pltfrm: na
15
+
ms.devlang: na
16
+
ms.topic: tutorial
17
+
ms.date: 06/11/2019
18
+
ms.author: jeedes
19
+
20
+
ms.collection: M365-identity-device-management
21
+
---
22
+
23
+
# One Click SSO feature for Azure AD Gallery Applications
24
+
25
+
In this tutorial, you learn how to perform One Click SSO for all the SAML applications that provide UI for SSO configuration.
26
+
27
+
## Introduction to One Click SSO
28
+
29
+
One Click SSO feature is introduced to configure the Single Sign On for Azure AD gallery apps that support SAML protocol. On Azure AD SSO configuration page, we have provided this option to allow our customers to configure the Azure AD metadata on the application side automatically. The objective is to help customers setting up SSO quickly with minimal manual efforts.
30
+
31
+
## Advantages of the One Click SSO
32
+
33
+
- Quick SSO configuration of the gallery applications where customers need to do manual setup on application side.
34
+
- More efficient and accurate way of configuration.
35
+
- No partner communication or support needed for the setup as the application provides the UI for SAML configuration.
36
+
37
+
## Prerequisites
38
+
39
+
- Active subscription of the application with admin credentials that you want to configure with OneClick SSO.
40
+
-**My Apps Secure Sign-in browser extension** from Microsoft installed in the browser. If you would like to know more about this extension, refer to this [link](https://docs.microsoft.com/azure/active-directory/user-help/my-apps-portal-end-user-access).
41
+
42
+
## One Click SSO feature step by step details
43
+
44
+
1. Add the application from the Azure AD App gallery.
45
+
46
+
2. Click on Single sign-on.
47
+
48
+
3. Click on Enable Single sign-on.
49
+
50
+
4. Populate the mandatory configuration values in Basic SAML Configuration section.
51
+
52
+
> [!NOTE]
53
+
> If application needs configuration of custom claims, please configure them before performing OneClick SSO.
54
+
55
+
5. If One Click SSO feature is implemented for any gallery application, you see following screen. If the **My Apps Secure Sign-in browser extension** is not already installed, you need to click on **Install the extension** option.
56
+
57
+

58
+
59
+
6. After adding the extension to the browser, click on **Setup Application Name** which will redirect you to the application admin portal. You need to sign-in as administrator to get into the application.
7. The browser extension will now automatically configure the application for you. It first asks your confirmation if you want to proceed. Click **Yes**.
64
+
65
+

66
+
67
+
> [!NOTE]
68
+
> If any application needs extra nagivation or steps, you should see proper messages asking you to perform those steps.
69
+
70
+
8. Once the configuration is done, click **Ok** to save the changes.
71
+
72
+

73
+
74
+
9. A successful confirmation pop-up message is displayed and your SSO settings are successfully configured. You can then test the application.
10. Once the configuration is successfully complete, the application will be logged off and you are returned back to Azure portal.
79
+
80
+
11. You can click on the Test button to test the Single sign-on.
81
+
82
+
## Additional resources
83
+
84
+
*[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/tutorial-list)
85
+
*[What is My Apps Secure Sign-in browser extension](https://docs.microsoft.com/azure/active-directory/user-help/my-apps-portal-end-user-access)
0 commit comments