You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 05/27/2022
11
+
ms.date: 02/02/2023
12
12
ms.author: jomondi
13
13
ms.reviewer: jeedes
14
14
ms.collection: M365-identity-device-management
@@ -22,7 +22,7 @@ In this article, we cover common questions and information related to certificat
22
22
23
23
This tutorial is relevant only to apps that are configured to use Azure AD SSO through [Security Assertion Markup Language](https://wikipedia.org/wiki/Security_Assertion_Markup_Language) (SAML) federation.
24
24
25
-
Using the information in this tutorial, an administrator of the application learns how to:
25
+
In this tutorial, an administrator of the application learns how to:
26
26
27
27
> [!div class="checklist"]
28
28
> * Generate certificates for gallery and non-gallery applications
@@ -41,13 +41,13 @@ Using the information in this tutorial, an administrator of the application lear
41
41
42
42
When you add a new application from the gallery and configure a SAML-based sign-on (by selecting **Single sign-on** > **SAML** from the application overview page), Azure AD generates a self-signed certificate for the application that is valid for three years. To download the active certificate as a security certificate (**.cer**) file, return to that page (**SAML-based sign-on**) and select a download link in the **SAML Signing Certificate** heading. You can choose between the raw (binary) certificate or the Base64 (base 64-encoded text) certificate. For gallery applications, this section might also show a link to download the certificate as federation metadata XML (an **.xml** file), depending on the requirement of the application.
43
43
44
-
You can also download an active or inactive certificate by selecting the **SAML Signing Certificate** heading's **Edit** icon (a pencil), which displays the **SAML Signing Certificate** page. Select the ellipsis (**...**) next to the certificate you want to download, and then choose which certificate format you want. You have the additional option to download the certificate in privacy-enhanced mail (PEM) format. This format is identical to Base64 but with a **.pem** file name extension, which isn't recognized in Windows as a certificate format.
44
+
You can also download an active or inactive certificate by selecting the **SAML Signing Certificate** heading's **Edit** icon (a pencil), which displays the **SAML Signing Certificate** page. Select the ellipsis (**...**) next to the certificate you want to download, and then choose which certificate format you want. You have the other option to download the certificate in privacy-enhanced mail (PEM) format. This format is identical to Base64 but with a **.pem** file name extension, which isn't recognized in Windows as a certificate format.
## Customize the expiration date for your federation certificate and roll it over to a new certificate
49
49
50
-
By default, Azure configures a certificate to expire after three years when it's created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you have to:
50
+
By default, Azure configures a certificate to expire after three years when it's created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you've to:
51
51
52
52
1. Create a new certificate with the desired date.
53
53
1. Save the new certificate.
@@ -91,14 +91,16 @@ Next, download the new certificate in the correct format, upload it to the appli
91
91
92
92
If your application doesn't have any validation for the certificate's expiration, and the certificate matches in both Azure Active Directory and your application, your application is still accessible despite having an expired certificate. Ensure your application can validate the certificate's expiration date.
93
93
94
+
If you intend to keep certificate expiry validation disabled, then the new certificate shouldn't be created until your scheduled maintenance window for the certificate rollover. If both an expired and an inactive valid certificate exist on the application, Azure AD will automatically utilize the valid certificate. In this case, users may experience application outage.
95
+
94
96
## Add email notification addresses for certificate expiration
95
97
96
-
Azure AD will send an email notification 60, 30, and 7 days before the SAML certificate expires. You may add more than one email address to receive notifications. To specify the email address(es) you want the notifications to be sent to:
98
+
Azure AD will send an email notification 60, 30, and 7 days before the SAML certificate expires. You may add more than one email address to receive notifications. To specify the email address(es), you want the notifications to be sent to:
97
99
98
100
1. In the **SAML Signing Certificate** page, go to the **notification email addresses** heading. By default, this heading uses only the email address of the admin who added the application.
99
101
1. Below the final email address, type the email address that should receive the certificate's expiration notice, and then press Enter.
100
102
1. Repeat the previous step for each email address you want to add.
101
-
1. For each email address you want to delete, select the **Delete** icon (a garbage can) next to the email address.
103
+
1. For each email address you want to delete, select the **Delete** icon (garbage can) next to the email address.
102
104
1. Select **Save**.
103
105
104
106
You can add up to five email addresses to the Notification list (including the email address of the admin who added the application). If you need more people to be notified, use the distribution list emails.
0 commit comments