Skip to content

Commit 53dcc1f

Browse files
Merge pull request #250216 from omondiatieno/oidc-sso
OIDC SSO - update UI steps
2 parents 8fc7648 + ab6db78 commit 53dcc1f

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/manage-apps/add-application-portal-setup-oidc-sso.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,18 +26,18 @@ It is recommended that you use a non-production environment to test the steps in
2626

2727
To configure OIDC-based SSO, you need:
2828

29-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30-
- One of the following roles: Global Administrator, or owner of the service principal.
29+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3131

3232
## Add the application
3333

3434
When you add an enterprise application that uses the OIDC standard for SSO, you select a setup button. When you select the button, you complete the sign-up process for the application.
3535

3636
To configure OIDC-based SSO for an application:
3737

38-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
39-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant.
40-
1. In the **Enterprise applications** pane, select **New application**.
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
39+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
40+
1. In the **All applications** pane, select **New application**.
4141
1. The **Browse Azure AD Gallery** pane opens and displays tiles for cloud platforms, on-premises applications, and featured applications. Applications listed in the **Featured applications** section have icons indicating whether they support federated SSO and provisioning. Search for and select the application. In this example, **SmartSheet** is being used.
4242
1. Select **Sign-up**. Sign in with the user account credentials from Azure Active Directory. If you already have a subscription to the application, then user details and tenant information is validated. If the application is not able to verify the user, then it redirects you to sign up for the application service.
4343

0 commit comments

Comments
 (0)