You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/debug-saml-sso-issues.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,13 +9,13 @@ ms.service: active-directory
9
9
ms.subservice: app-mgmt
10
10
ms.topic: troubleshooting
11
11
ms.workload: identity
12
-
ms.date: 05/27/2022
12
+
ms.date: 06/15/2023
13
13
ms.custom: enterprise-apps
14
14
---
15
15
16
16
# Debug SAML-based single sign-on to applications
17
17
18
-
Learn how to find and fix [single sign-on](what-is-single-sign-on.md) issues for applications in Azure Active Directory (Azure AD) that use SAML-based single sign-on.
18
+
In this article, you learn how to find and fix [single sign-on](what-is-single-sign-on.md) issues for applications in Azure Active Directory (Azure AD) that use SAML-based single sign-on.
19
19
20
20
## Before you begin
21
21
@@ -33,10 +33,10 @@ To download and install the My Apps Secure Sign-in Extension, use one of the fol
33
33
To test SAML-based single sign-on between Azure AD and a target application:
34
34
35
35
1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator or other administrator that is authorized to manage applications.
36
-
1. In the left blade, select **Azure Active Directory**, and then select **Enterprise applications**.
37
-
1. From the list of enterprise applications, select the application for which you want to test single sign-on, and then from the options on the left select **Single sign-on**.
36
+
1. In the left navigation pane, select **Azure Active Directory**, and then select **Enterprise applications**.
37
+
1. From the list of enterprise applications, select the application for which you want to test single sign-on, and then from the options on the left, select **Single sign-on**.
38
38
1. To open the SAML-based single sign-on testing experience, go to **Test single sign-on** (step 5). If the **Test** button is greyed out, you need to fill out and save the required attributes first in the **Basic SAML Configuration** section.
39
-
1. In the **Test single sign-on**blade, use your corporate credentials to sign in to the target application. You can sign in as the current user or as a different user. If you sign in as a different user, a prompt will ask you to authenticate.
39
+
1. In the **Test single sign-on**page, use your corporate credentials to sign in to the target application. You can sign in as the current user or as a different user. If you sign in as a different user, a prompt asks you to authenticate.
40
40
41
41

42
42
@@ -54,10 +54,10 @@ To debug this error, you need the error message and the SAML request. The My App
54
54
55
55
### To resolve the sign-in error with the My Apps Secure Sign-in Extension installed
56
56
57
-
1. When an error occurs, the extension redirects you back to the Azure AD **Test single sign-on**blade.
58
-
1. On the **Test single sign-on**blade, select **Download the SAML request**.
57
+
1. When an error occurs, the extension redirects you back to the Azure AD **Test single sign-on**page.
58
+
1. On the **Test single sign-on**page, select **Download the SAML request**.
59
59
1. You should see specific resolution guidance based on the error and the values in the SAML request.
60
-
1. You'll see a **Fix it** button to automatically update the configuration in Azure AD to resolve the issue. If you don't see this button, then the sign-in issue isn't due to a misconfiguration on Azure AD.
60
+
1. You see a **Fix it** button to automatically update the configuration in Azure AD to resolve the issue. If you don't see this button, then the sign-in issue isn't due to a misconfiguration on Azure AD.
61
61
62
62
If no resolution is provided for the sign-in error, we suggest that you use the feedback textbox to inform us.
63
63
@@ -66,7 +66,7 @@ If no resolution is provided for the sign-in error, we suggest that you use the
66
66
1. Copy the error message at the bottom right corner of the page. The error message includes:
67
67
- A CorrelationID and Timestamp. These values are important when you create a support case with Microsoft because they help the engineers to identify your problem and provide an accurate resolution to your issue.
68
68
- A statement identifying the root cause of the problem.
69
-
1. Go back to Azure AD and find the **Test single sign-on**blade.
69
+
1. Go back to Azure AD and find the **Test single sign-on**page.
70
70
1. In the text box above **Get resolution guidance**, paste the error message.
71
71
1. Select **Get resolution guidance** to display steps for resolving the issue. The guidance might require information from the SAML request or SAML response. If you're not using the My Apps Secure Sign-in Extension, you might need a tool such as [Fiddler](https://www.telerik.com/fiddler) to retrieve the SAML request and response.
72
72
1. Verify that the destination in the SAML request corresponds to the SAML Single Sign-on Service URL obtained from Azure AD.
@@ -75,13 +75,13 @@ If no resolution is provided for the sign-in error, we suggest that you use the
75
75
76
76
## Resolve a sign-in error on the application page
77
77
78
-
You might sign in successfully and then see an error on the application's page. This occurs when Azure AD issued a token to the application, but the application doesn't accept the response.
78
+
You might sign in successfully and then see an error on the application's page. This error occurs when Azure AD issued a token to the application, but the application doesn't accept the response.
79
79
80
80
To resolve the error, follow these steps, or watch this [short video about how to use Azure AD to troubleshoot SAML SSO](https://www.youtube.com/watch?v=poQCJK0WPUk&list=PLLasX02E8BPBm1xNMRdvP6GtA6otQUqp0&index=8):
81
81
82
82
1. If the application is in the Azure AD Gallery, verify that you've followed all the steps for integrating the application with Azure AD. To find the integration instructions for your application, see the [list of SaaS application integration tutorials](../saas-apps/tutorial-list.md).
83
83
1. Retrieve the SAML response.
84
-
- If the My Apps Secure Sign-in extension is installed, from the **Test single sign-on**blade, select **download the SAML response**.
84
+
- If the My Apps Secure Sign-in extension is installed, from the **Test single sign-on**page, select **download the SAML response**.
85
85
- If the extension isn't installed, use a tool such as [Fiddler](https://www.telerik.com/fiddler) to retrieve the SAML response.
86
86
1. Notice these elements in the SAML response token:
87
87
- User unique identifier of NameID value and format
@@ -95,4 +95,4 @@ To resolve the error, follow these steps, or watch this [short video about how t
95
95
96
96
## Next steps
97
97
98
-
Now that single sign-on is working to your application, you could [Automate user provisioning and de-provisioning to SaaS applications](../app-provisioning/user-provisioning.md) or [get started with Conditional Access](../conditional-access/app-based-conditional-access.md).
98
+
Now that single sign-on is working to your application, you could [Automate user provisioning and deprovisioning to SaaS applications](../app-provisioning/user-provisioning.md) or [get started with Conditional Access](../conditional-access/app-based-conditional-access.md).
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/howto-saml-token-encryption.md
+29-8Lines changed: 29 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 07/21/2022
11
+
ms.date: 06/15/2023
12
12
ms.author: jomondi
13
13
ms.reviewer: alamaral
14
14
ms.collection: M365-identity-device-management
@@ -42,8 +42,8 @@ To configure enterprise application's SAML token encryption, follow these steps:
42
42
43
43
Create an asymmetric key pair to use for encryption. Or, if the application supplies a public key to use for encryption, follow the application's instructions to download the X.509 certificate.
44
44
45
-
The public key should be stored in an X.509 certificate file in .cer format.
46
-
45
+
The public key should be stored in an X.509 certificate file in .cer format. You can copy the contents of the certificate file to a text editor and save it as a .cer file. The certificate file should contain only the public key and not the private key.
46
+
47
47
If the application uses a key that you create for your instance, follow the instructions provided by your application for installing the private key that the application will use to decrypt tokens from your Azure AD tenant.
48
48
49
49
1. Add the certificate to the application configuration in Azure AD.
@@ -54,7 +54,9 @@ You can add the public cert to your application configuration within the Azure p
54
54
55
55
1. Go to the [Azure portal](https://portal.azure.com).
56
56
57
-
1. Go to the **Azure Active Directory > Enterprise applications** blade and then select the application that you wish to configure token encryption for.
57
+
1. Search for and select the **Azure Active Directory**.
58
+
59
+
1. Select **Enterprise applications** blade and then select the application that you wish to configure token encryption for.
58
60
59
61
1. On the application's page, select **Token encryption**.
60
62
@@ -101,8 +103,6 @@ To configure token encryption, follow these steps:
101
103
102
104
1. In the application's page, select **Manifest** to edit the [application manifest](../develop/reference-app-manifest.md).
103
105
104
-
1. Set the value for the `tokenEncryptionKeyId` attribute.
105
-
106
106
The following example shows an application manifest configured with two encryption certificates, and with the second selected as the active one using the tokenEncryptionKeyId.
107
107
108
108
```json
@@ -172,7 +172,7 @@ To configure token encryption, follow these steps:
172
172
}
173
173
```
174
174
175
-
# [PowerShell](#tab/azure-powershell)
175
+
# [Azure AD PowerShell](#tab/azuread-powershell)
176
176
177
177
1. Use the latest Azure AD PowerShell module to connect to your tenant.
178
178
@@ -190,7 +190,29 @@ To configure token encryption, follow these steps:
1. Use the Microsoft Graph PowerShell module to connect to your tenant.
196
+
197
+
1. Set the token encryption settings using the **[Update-MgApplication](/powershell/module/microsoft.graph.applications/update-mgapplication?view=graph-powershell-1.0&preserve-view=true)** command.
1. Update the application's `keyCredentials` with an X.509 certificate for encryption. The following example shows a Microsoft Graph JSON payload with a collection of key credentials associated with the application.
@@ -221,7 +243,6 @@ To configure token encryption, follow these steps:
221
243
222
244
---
223
245
224
-
225
246
## Next steps
226
247
227
248
* Find out [How Azure AD uses the SAML protocol](../develop/active-directory-saml-protocol-reference.md)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/whats-new-docs.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "What's new in Azure Active Directory application management"
3
3
description: "New and updated documentation for the Azure Active Directory application management."
4
-
ms.date: 06/06/2023
4
+
ms.date: 07/04/2023
5
5
ms.service: active-directory
6
6
ms.subservice: app-mgmt
7
7
ms.topic: reference
@@ -15,6 +15,21 @@ manager: CelesteDG
15
15
16
16
Welcome to what's new in Azure Active Directory (Azure AD) application management documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the application management service, see [What's new in Azure AD](../fundamentals/whats-new.md).
17
17
18
+
## June 2023
19
+
20
+
### Updated articles
21
+
22
+
-[Manage consent to applications and evaluate consent requests](manage-consent-requests.md)
23
+
-[Plan application migration to Azure Active Directory](migrate-adfs-apps-phases-overview.md)
24
+
-[Tutorial: Configure Secure Hybrid Access with Azure Active Directory and Silverfort](silverfort-integration.md)
25
+
-[Tutorial: Migrate your applications from Okta to Azure Active Directory](migrate-applications-from-okta.md)
26
+
-[Tutorial: Configure Datawiza to enable Azure Active Directory Multi-Factor Authentication and single sign-on to Oracle JD Edwards](datawiza-sso-oracle-jde.md)
27
+
-[Tutorial: Configure Datawiza to enable Azure Active Directory Multi-Factor Authentication and single sign-on to Oracle PeopleSoft](datawiza-sso-oracle-peoplesoft.md)
28
+
-[Tutorial: Configure Cloudflare with Azure Active Directory for secure hybrid access](cloudflare-integration.md)
29
+
-[Configure Datawiza for Azure AD Multi-Factor Authentication and single sign-on to Oracle EBS](datawiza-sso-mfa-oracle-ebs.md)
30
+
-[Tutorial: Configure F5 BIG-IP Access Policy Manager for Kerberos authentication](f5-big-ip-kerberos-advanced.md)
31
+
-[Tutorial: Configure F5 BIG-IP Easy Button for Kerberos single sign-on](f5-big-ip-kerberos-easy-button.md)
32
+
18
33
## May 2023
19
34
20
35
### New articles
@@ -48,18 +63,3 @@ Welcome to what's new in Azure Active Directory (Azure AD) application managemen
48
63
-[Configure F5 BIG-IP Access Policy Manager for form-based SSO](f5-big-ip-forms-advanced.md)
49
64
-[Tutorial: Configure F5 BIG-IP Easy Button for SSO to Oracle EBS](f5-big-ip-oracle-enterprise-business-suite-easy-button.md)
50
65
-[Tutorial: Configure F5 BIG-IP Access Policy Manager for header-based single sign-on](f5-big-ip-header-advanced.md)
51
-
## March 2023
52
-
53
-
### Updated articles
54
-
55
-
-[Move application authentication to Azure Active Directory](migrate-adfs-apps-to-azure.md)
56
-
-[Quickstart: Create and assign a user account](add-application-portal-assign-users.md)
57
-
-[Configure sign-in behavior using Home Realm Discovery](configure-authentication-for-federated-users-portal.md)
0 commit comments