Skip to content

Commit 500e29c

Browse files
authored
Merge pull request #251650 from kenwith/admin-center-app-provisioning-steps-1
[SCOPED] Updates "Azure portal" to new branding.
2 parents 6cfd3a8 + 09ae7e3 commit 500e29c

26 files changed

+60
-60
lines changed

articles/active-directory/app-proxy/app-proxy-protect-ndes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,14 +50,14 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
5050
* If Internet Explorer Enhanced Security Configuration is turned on for the server where you install the connector, the registration screen might be blocked. To allow access, follow the instructions in the error message, or turn off Internet Explorer Enhanced Security during the install process.
5151
* If connector registration fails, see [Troubleshoot Application Proxy](application-proxy-troubleshoot.md).
5252
1. At the end of the setup, a note is shown for environments with an outbound proxy. To configure the Azure AD Application Proxy connector to work through the outbound proxy, run the provided script, such as `C:\Program Files\Microsoft AAD App Proxy connector\ConfigureOutBoundProxy.ps1`.
53-
1. On the Application proxy page in the Azure portal, the new connector is listed with a status of *Active*, as shown in the following example:
53+
1. On the Application proxy page in the Microsoft Entra admin center, the new connector is listed with a status of *Active*, as shown in the following example:
5454

55-
![The new Azure AD Application Proxy connector shown as active in the Azure portal](./media/app-proxy-protect-ndes/connected-app-proxy.png)
55+
![The new Azure AD Application Proxy connector shown as active in the Microsoft Entra admin center](./media/app-proxy-protect-ndes/connected-app-proxy.png)
5656

5757
> [!NOTE]
5858
> To provide high availability for applications authenticating through the Azure AD Application Proxy, you can install connectors on multiple VMs. Repeat the same steps listed in the previous section to install the connector on other servers joined to the Azure AD DS managed domain.
5959
60-
1. After successful installation, go back to the Azure portal.
60+
1. After successful installation, go back to the Microsoft Entra admin center.
6161

6262
1. Select **Enterprise applications**.
6363

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Tutorial - Add an on-premises app - Application Proxy in Azure Active Directory
3-
description: Azure Active Directory (Azure AD) has an Application Proxy service that enables users to access on-premises applications by signing in with their Azure AD account. This tutorial shows you how to prepare your environment for use with Application Proxy. Then, it uses the Azure portal to add an on-premises application to your Azure AD tenant.
3+
description: Azure Active Directory (Azure AD) has an Application Proxy service that enables users to access on-premises applications by signing in with their Azure AD account. This tutorial shows you how to prepare your environment for use with Application Proxy. Then, it uses the Microsoft Entra admin center to add an on-premises application to your Azure AD tenant.
44
services: active-directory
55
author: kenwith
66
manager: amycolannino
@@ -180,9 +180,9 @@ For information about connectors, capacity planning, and how they stay up-to-dat
180180
181181
## Verify the connector installed and registered correctly
182182
183-
You can use the Azure portal or your Windows server to confirm that a new connector installed correctly.
183+
You can use the Microsoft Entra admin center or your Windows server to confirm that a new connector installed correctly.
184184
185-
### Verify the installation through Azure portal
185+
### Verify the installation through Microsoft Entra admin center
186186
187187
To confirm the connector installed and registered correctly:
188188
@@ -219,7 +219,7 @@ Now that you've prepared your environment and installed a connector, you're read
219219
220220
| Field | Description |
221221
| :--------------------- | :----------------------------------------------------------- |
222-
| **Name** | The name of the application that appears on My Apps and in the Azure portal. |
222+
| **Name** | The name of the application that appears on My Apps and in the Microsoft Entra admin center. |
223223
| **Maintenance Mode** | Select if you would like to enable maintenance mode and temporarily disable access for all users to the application. |
224224
| **Internal URL** | The URL for accessing the application from inside your private network. You can provide a specific path on the backend server to publish, while the rest of the server is unpublished. In this way, you can publish different sites on the same server as different apps, and give each one its own name and access rules.<br><br>If you publish a path, make sure that it includes all the necessary images, scripts, and style sheets for your application. For example, if your app is at `https://yourapp/app` and uses images located at `https://yourapp/media`, then you should publish `https://yourapp/` as the path. This internal URL doesn't have to be the landing page your users see. For more information, see [Set a custom home page for published apps](application-proxy-configure-custom-home-page.md). |
225225
| **External URL** | The address for users to access the app from outside your network. If you don't want to use the default Application Proxy domain, read about [custom domains in Azure AD Application Proxy](./application-proxy-configure-custom-domain.md). |

articles/active-directory/app-proxy/application-proxy-application-gateway-waf.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,13 @@ Azure Web Application Firewall (WAF) on Azure Application Gateway provides centr
2222

2323
## Deployment steps
2424

25-
This article guides you through the steps to securely expose a web application on the Internet, by integrating the Azure AD Application Proxy with Azure WAF on Application Gateway. In this guide we'll be using the Azure portal. The reference architecture for this deployment is represented below.
25+
This article guides you through the steps to securely expose a web application on the Internet, by integrating the Azure AD Application Proxy with Azure WAF on Application Gateway. In this guide we'll be using the Microsoft Entra admin center. The reference architecture for this deployment is represented below.
2626

2727
![Diagram of deployment described.](./media/application-proxy-waf/application-proxy-waf.png)
2828

2929
### Configure Azure Application Gateway to send traffic to your internal application.
3030

31-
Some steps of the Application Gateway configuration will be omitted in this article. For a detailed guide on how to create and configure an Application Gateway, see [Quickstart: Direct web traffic with Azure Application Gateway - Azure portal][appgw_quick].
31+
Some steps of the Application Gateway configuration will be omitted in this article. For a detailed guide on how to create and configure an Application Gateway, see [Quickstart: Direct web traffic with Azure Application Gateway - Microsoft Entra admin center][appgw_quick].
3232

3333
##### 1. Create a private-facing HTTPS listener.
3434

articles/active-directory/app-proxy/application-proxy-azure-front-door.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Azure Front Door helps deliver low-latency, high-throughput content at scale fro
2222

2323
## Deployment steps
2424

25-
This article guides you through the steps to securely expose a web application on the Internet, by integrating the Azure AD Application Proxy with Azure Front Door. In this guide we'll be using the Azure portal. The reference architecture for this deployment is represented below.
25+
This article guides you through the steps to securely expose a web application on the Internet, by integrating the Azure AD Application Proxy with Azure Front Door. In this guide we'll be using the Microsoft Entra admin center. The reference architecture for this deployment is represented below.
2626

2727
:::image type="content" source="./media/application-proxy-azure-front-door/azure-front-door.png" alt-text="Diagram of deployment described." lightbox="./media/application-proxy-azure-front-door/azure-front-door.png":::
2828

articles/active-directory/app-proxy/application-proxy-back-end-kerberos-constrained-delegation-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ The consumer of the Kerberos ticket provided by the connector. At this stage, ex
131131

132132
- Check the SPN defined against the application’s settings in the portal. Make sure that the same SPN configured against the target Azure AD account is used by the application’s app pool.
133133

134-
![SPN configuration in the Azure portal](./media/application-proxy-back-end-kerberos-constrained-delegation-how-to/graphic11.png)
134+
![SPN configuration in the Microsoft Entra admin center](./media/application-proxy-back-end-kerberos-constrained-delegation-how-to/graphic11.png)
135135

136136
- Go into IIS and select the **Configuration Editor** option for the application. Navigate to **system.webServer/security/authentication/windowsAuthentication**. Make sure the value **UseAppPoolCredentials** is **True**.
137137

articles/active-directory/app-proxy/application-proxy-config-how-to.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article helps you to understand how to configure an Application Proxy appli
2121

2222
To learn about the initial configurations and creation of an Application Proxy application through the Admin Portal, follow the [Publish applications using Azure AD Application Proxy](application-proxy-add-on-premises-application.md).
2323

24-
For details on configuring Connectors, see [Enable Application Proxy in the Azure portal](application-proxy-add-on-premises-application.md).
24+
For details on configuring Connectors, see [Enable Application Proxy in the Microsoft Entra admin center](application-proxy-add-on-premises-application.md).
2525

2626
For information on uploading certificates and using custom domains, see [Working with custom domains in Azure AD Application Proxy](application-proxy-configure-custom-domain.md).
2727

@@ -37,7 +37,7 @@ If you are following the steps in the [Publish applications using Azure AD Appli
3737

3838
The error message should display in the top-right corner when you create the application. You can also select the notification icon to see the error messages.
3939

40-
![Shows where to find the Notification prompt in the Azure portal](./media/application-proxy-config-how-to/error-message.png)
40+
![Shows where to find the Notification prompt in the Microsoft Entra admin center](./media/application-proxy-config-how-to/error-message.png)
4141

4242
## Configure connectors/connector groups
4343

articles/active-directory/app-proxy/application-proxy-config-problem.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Problem creating an Azure Active Directory Application Proxy application
3-
description: How to troubleshoot issues creating Application Proxy applications in the Azure portal
3+
description: How to troubleshoot issues creating Application Proxy applications in the Microsoft Entra admin center
44
services: active-directory
55
author: kenwith
66
manager: amycolannino
@@ -42,4 +42,4 @@ The error message should display in the top right corner when you create the app
4242
![Notification prompt](./media/application-proxy-config-problem/error-message.png)
4343

4444
## Next steps
45-
[Enable Application Proxy in the Azure portal](application-proxy-add-on-premises-application.md)
45+
[Enable Application Proxy in the Microsoft Entra admin center](application-proxy-add-on-premises-application.md)

articles/active-directory/app-proxy/application-proxy-config-sso-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ To configure SSO, first make sure that your application is configured for Pre-Au
2828

2929
For more information on the Pre-Authentication methods, see step 4 of the [app publishing document](application-proxy-add-on-premises-application.md).
3030

31-
![Pre-authentication method in Azure portal](./media/application-proxy-config-sso-how-to/app-proxy.png)
31+
![Pre-authentication method in Microsoft Entra admin center](./media/application-proxy-config-sso-how-to/app-proxy.png)
3232

3333
## Configuring single sign-on modes for Application Proxy Applications
3434
Configure the specific type of single sign-on. The sign-on methods are classified based on what type of authentication the backend application uses. App Proxy applications support three types of sign-on:

articles/active-directory/app-proxy/application-proxy-configure-cookie-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,11 @@ Additionally, if your back-end application has cookies that need to be available
4040

4141

4242

43-
## Set the cookie settings - Azure portal
43+
## Set the cookie settings - Microsoft Entra admin center
4444

4545
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4646

47-
To set the cookie settings using the Azure portal:
47+
To set the cookie settings using the Microsoft Entra admin center:
4848

4949
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
5050
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.

articles/active-directory/app-proxy/application-proxy-configure-custom-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ To create and verify a custom domain:
6767
1. Go to your domain registrar and create a new TXT record for your domain, based on your copied DNS information.
6868
1. After you register the domain, on the domain's page in Azure Active Directory, select **Verify**. Once the domain status is **Verified**, you can use the domain across all your Azure AD configurations, including Application Proxy.
6969

70-
For more detailed instructions, see [Add your custom domain name using the Azure portal](../fundamentals/add-custom-domain.md).
70+
For more detailed instructions, see [Add your custom domain name using the Microsoft Entra admin center](../fundamentals/add-custom-domain.md).
7171

7272
### Configure an app to use a custom domain
7373

@@ -105,7 +105,7 @@ To publish your app through Application Proxy with a custom domain:
105105

106106
![Add CNAME DNS entry](./media/application-proxy-configure-custom-domain/dns-info.png)
107107

108-
10. Follow the instructions at [Manage DNS records and record sets by using the Azure portal](../../dns/dns-operations-recordsets-portal.md) to add a DNS record that redirects the new external URL to the *msappproxy.net* domain in Azure DNS. If a different DNS provider is used, please contact the vendor for the instructions.
108+
10. Follow the instructions at [Manage DNS records and record sets by using the Microsoft Entra admin center](../../dns/dns-operations-recordsets-portal.md) to add a DNS record that redirects the new external URL to the *msappproxy.net* domain in Azure DNS. If a different DNS provider is used, please contact the vendor for the instructions.
109109

110110
> [!IMPORTANT]
111111
> Ensure that you are properly using a CNAME record that points to the *msappproxy.net* domain. Do not point records to IP addresses or server DNS names since these are not static and may impact the resiliency of the service.

0 commit comments

Comments
 (0)