You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/add-application-portal-setup-oidc-sso.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,18 +26,18 @@ It is recommended that you use a non-production environment to test the steps in
26
26
27
27
To configure OIDC-based SSO, you need:
28
28
29
-
- An Azure account with an active subscription.[Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
-
- One of the following roles: Global Administrator, or owner of the service principal.
29
+
- An Azure AD user account. If you don't already have one, you can[Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
31
31
32
32
## Add the application
33
33
34
34
When you add an enterprise application that uses the OIDC standard for SSO, you select a setup button. When you select the button, you complete the sign-up process for the application.
35
35
36
36
To configure OIDC-based SSO for an application:
37
37
38
-
1. Sign in to the [Azure portal](https://portal.azure.com)and sign in using one of the roles listed in the prerequisites.
39
-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The**All applications** pane opens and displays a list of the applications in your Azure AD tenant.
40
-
1. In the **Enterprise applications** pane, select **New application**.
38
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. In the **All applications** pane, select **New application**.
41
41
1. The **Browse Azure AD Gallery** pane opens and displays tiles for cloud platforms, on-premises applications, and featured applications. Applications listed in the **Featured applications** section have icons indicating whether they support federated SSO and provisioning. Search for and select the application. In this example, **SmartSheet** is being used.
42
42
1. Select **Sign-up**. Sign in with the user account credentials from Azure Active Directory. If you already have a subscription to the application, then user details and tenant information is validated. If the application is not able to verify the user, then it redirects you to sign up for the application service.
0 commit comments