You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: How the Microsoft identity platform uses the SAML protocol
3
-
description: This article provides an overview of the Single Sign-On and Single Sign-Out SAML profiles in Azure Active Directory.
3
+
description: This article provides an overview of the single sign-on and Single Sign-Out SAML profiles in Azure Active Directory.
4
4
services: active-directory
5
5
author: kenwith
6
6
manager: CelesteDG
@@ -9,27 +9,29 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 10/05/2018
12
+
ms.date: 10/27/2021
13
13
ms.author: kenwith
14
14
ms.custom: aaddev
15
15
ms.reviewer: paulgarn
16
16
---
17
17
18
18
# How the Microsoft identity platform uses the SAML protocol
19
19
20
-
The Microsoft identity platform uses the SAML 2.0 protocol to enable applications to provide a single sign-on experience to their users. The [Single Sign-On](single-sign-on-saml-protocol.md) and [Single Sign-Out](single-sign-out-saml-protocol.md) SAML profiles of Azure AD explain how SAML assertions, protocols, and bindings are used in the identity provider service.
20
+
The Microsoft identity platform uses the SAML 2.0 and other protocols to enable applications to provide a single sign-on (SSO) experience to their users. The [SSO](single-sign-on-saml-protocol.md) and [Single Sign-Out](single-sign-out-saml-protocol.md) SAML profiles of Azure Active Directory (Azure AD) explain how SAML assertions, protocols, and bindings are used in the identity provider service.
21
21
22
-
SAML Protocol requires the identity provider (Microsoft identity platform) and the service provider (the application) to exchange information about themselves.
22
+
The SAML protocol requires the identity provider (Microsoft identity platform) and the service provider (the application) to exchange information about themselves.
23
23
24
24
When an application is registered with Azure AD, the app developer registers federation-related information with Azure AD. This information includes the **Redirect URI** and **Metadata URI** of the application.
25
25
26
-
The Microsoft identity platform uses the cloud service's **Metadata URI** to retrieve the signing key and the logout URI. Customer can open the app in **Azure AD -> App Registration** and then in **Settings -> Properties**, they can update the Logout URL. This way the Microsoft identity platform can send the response to the correct URL.
26
+
The Microsoft identity platform uses the cloud service's **Metadata URI** to retrieve the signing key and the logout URI. In the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a>, you can open the app in **Azure Active Directory -> App registrations**, and then in **Manage -> Authentication**, you can update the Logout URL. This way the Microsoft identity platform can send the response to the correct URL.
27
27
28
-
Azure Active Directory exposes tenant-specific and common (tenant-independent) single sign-on and single sign-out endpoints. These URLs represent addressable locations -- they are not just identifiers -- so you can go to the endpoint to read the metadata.
28
+
Azure AD exposes tenant-specific and common (tenant-independent) SSO and single sign-out endpoints. These URLs represent addressable locations--they're not just identifiers--so you can go to the endpoint to read the metadata.
29
29
30
-
* The tenant-specific endpoint is located at `https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml`. The *\<TenantDomainName>* placeholder represents a registered domain name or TenantID GUID of an Azure AD tenant. For example, the federation metadata of the contoso.com tenant is at: https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
30
+
- The tenant-specific endpoint is located at `https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml`. The _\<TenantDomainName>_ placeholder represents a registered domain name or TenantID GUID of an Azure AD tenant. For example, the federation metadata of the contoso.com tenant is at: https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
31
31
32
-
* The tenant-independent endpoint is located at
32
+
- The tenant-independent endpoint is located at
33
33
`https://login.microsoftonline.com/common/FederationMetadata/2007-06/FederationMetadata.xml`. In this endpoint address, **common** appears instead of a tenant domain name or ID.
34
34
35
+
## Next steps
36
+
35
37
For information about the federation metadata documents that Azure AD publishes, see [Federation Metadata](../azuread-dev/azure-ad-federation-metadata.md).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/consent-framework.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ The following steps show you how the consent experience works for both the appli
56
56

57
57
58
58
> [!IMPORTANT]
59
-
> Granting explicit consent using the **Grant permissions** button is currently required for single-page applications (SPA) that use ADAL.js. Otherwise, the application fails when the access token is requested.
59
+
> Granting explicit consent using the **Grant permissions** button is currently required for single-page applications (SPA) that use MSAL.js. Otherwise, the application fails when the access token is requested.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-install-express.md
+1-8Lines changed: 1 addition & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.workload: identity
11
11
ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: how-to
14
-
ms.date: 09/28/2018
14
+
ms.date: 11/29/2021
15
15
ms.subservice: hybrid
16
16
ms.author: billmath
17
17
@@ -25,7 +25,6 @@ Before you start installing Azure AD Connect, make sure to [download Azure AD Co
25
25
If express settings does not match your topology, see [related documentation](#related-documentation) for other scenarios.
26
26
27
27
## Express installation of Azure AD Connect
28
-
You can see these steps in action in the [videos](#videos) section.
29
28
30
29
1. Sign in as a local administrator to the server you wish to install Azure AD Connect on. You should do this on the server you wish to be the sync server.
31
30
2. Navigate to and double-click **AzureADConnect.msi**.
@@ -48,12 +47,6 @@ You can see these steps in action in the [videos](#videos) section.
48
47
9. When the installation completes, click **Exit**.
49
48
10. After the installation has completed, sign off and sign in again before you use Synchronization Service Manager or Synchronization Rule Editor.
50
49
51
-
## Videos
52
-
For a video on using the express installation, see:
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/tshoot-connect-connectivity.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: troubleshooting
16
-
ms.date: 04/25/2019
16
+
ms.date: 11/18/2021
17
17
ms.subservice: hybrid
18
18
ms.author: billmath
19
19
@@ -24,7 +24,10 @@ ms.custom: has-adal-ref
24
24
This article explains how connectivity between Azure AD Connect and Azure AD works and how to troubleshoot connectivity issues. These issues are most likely to be seen in an environment with a proxy server.
25
25
26
26
## Troubleshoot connectivity issues in the installation wizard
27
-
Azure AD Connect is using Modern Authentication (using the ADAL library) for authentication. The installation wizard and the sync engine proper require machine.config to be properly configured since these two are .NET applications.
27
+
Azure AD Connect uses the MSAL library for authentication. The installation wizard and the sync engine proper require machine.config to be properly configured since these two are .NET applications.
28
+
29
+
>[!NOTE]
30
+
>Azure AD Connect v1.6.xx.x uses the ADAL library. The ADAL library is being depricated and support will end in June 2022. Microsot recommendeds that you upgrade to the latest version of [Azure AD Connect v2](whatis-azure-ad-connect-v2.md).
28
31
29
32
In this article, we show how Fabrikam connects to Azure AD through its proxy. The proxy server is named fabrikamproxy and is using port 8080.
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-ip-addresses.md
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,13 +14,11 @@ ms.custom: fasttrack-edit
14
14
15
15
# IP addresses of Azure API Management
16
16
17
-
In this article we describe how to retrieve the IP addresses of Azure API Management service. IP addresses can be public or private if the service is in a virtual network.
18
-
19
-
You can use IP addresses to create firewall rules, filter the incoming traffic to the backend services, or restrict the outbound traffic.
17
+
In this article we describe how to retrieve the IP addresses of Azure API Management service. IP addresses can be public or private if the service is in a virtual network. You can use IP addresses to create firewall rules, filter the incoming traffic to the backend services, or restrict the outbound traffic.
20
18
21
19
## IP addresses of API Management service
22
20
23
-
Every API Management service instance in Developer, Basic, Standard, or Premium tier has public IP addresses, which are exclusive only to that service instance (they are not shared with other resources).
21
+
Every API Management service instance in Developer, Basic, Standard, or Premium tier has public IP addresses, which are exclusive only to that service instance (they are not shared with other resources).
24
22
25
23
You can retrieve the IP addresses from the overview dashboard of your resource in the Azure portal.
26
24
@@ -54,7 +52,7 @@ In [multi-regional deployments](api-management-howto-deploy-multi-region.md), ea
54
52
55
53
If your API Management service is inside a virtual network, it will have two types of IP addresses - public and private.
56
54
57
-
Public IP addresses are used for internal communication on port `3443` - for managing configuration (for example, through Azure Resource Manager). In the external VNet configuration, they are also used for runtime API traffic.
55
+
Public IP addresses are used for internal communication on port `3443` - for managing configuration (for example, through Azure Resource Manager). In the external VNet configuration, they are also used for runtime API traffic.
58
56
59
57
Private virtual IP (VIP) addresses, available **only** in the [internal VNet mode](api-management-using-with-internal-vnet.md), are used to connect from within the network to API Management endpoints - gateways, the developer portal, and the management plane for direct API access. You can use them for setting up DNS records within the network.
60
58
@@ -82,15 +80,15 @@ GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/
82
80
}
83
81
```
84
82
85
-
API Management uses a public IP address for connections outside the VNet and a private IP address for connections within the VNet.
83
+
API Management uses a public IP address for connections outside the VNet and a private IP address for connections within the VNet.
86
84
87
-
When API management is deployed in the [internal VNet configuration](api-management-using-with-internal-vnet.md) and API management connects to private (intranet-facing) backends, internal IP addresses from the subnet are used for the runtime API traffic. When a request is sent from API Management to a private backend, a private IP address will be visible as the origin of the request. Therefore in this configuration, if a requirement exists to restrict traffic between API Management and an internal backend, it is better to use the whole API Management subnet prefix with an IP rule and not just the private IP address associated with the API Management resource.
85
+
When API management is deployed in the [internal VNet configuration](api-management-using-with-internal-vnet.md) and API management connects to private (intranet-facing) backends, internal IP addresses from the subnet are used for the runtime API traffic. When a request is sent from API Management to a private backend, a private IP address will be visible as the origin of the request. Therefore in this configuration, if a requirement exists to restrict traffic between API Management and an internal backend, it is better to use the whole API Management subnet prefix with an IP rule and not just the private IP address associated with the API Management resource.
88
86
89
87
When a request is sent from API Management to a public-facing (internet-facing) backend, a public IP address will always be visible as the origin of the request.
90
88
91
89
## IP addresses of Consumption tier API Management service
92
90
93
-
If your API Management service is a Consumption tier service, it doesn't have a dedicated IP address. Consumption tier service runs on a shared infrastructure and without a deterministic IP address.
91
+
If your API Management service is a Consumption tier service, it doesn't have a dedicated IP address. Consumption tier service runs on a shared infrastructure and without a deterministic IP address.
94
92
95
93
For traffic restriction purposes, you can use the range of IP addresses of Azure data centers. Refer to [the Azure Functions documentation article](../azure-functions/ip-addresses.md#data-center-outbound-ip-addresses) for precise steps.
96
94
@@ -102,5 +100,6 @@ In the Developer, Basic, Standard, and Premium tiers of API Management, the publ
102
100
* The service subscription is [suspended](https://github.com/Azure/azure-resource-manager-rpc/blob/master/v1.0/subscription-lifecycle-api-reference.md#subscription-states) or [warned](https://github.com/Azure/azure-resource-manager-rpc/blob/master/v1.0/subscription-lifecycle-api-reference.md#subscription-states) (for example, for nonpayment) and then reinstated.
103
101
* Azure Virtual Network is added to or removed from the service.
104
102
* API Management service is switched between External and Internal VNet deployment mode.
103
+
*[Availability zones](zone-redundancy.md) are enabled, added, or removed.
105
104
106
-
In [multi-regional deployments](api-management-howto-deploy-multi-region.md), the regional IP address changes if a region is vacated and then reinstated. The regional IP address also changes when you enable, add, or remove [availability zones](zone-redundancy.md).
105
+
In [multi-regional deployments](api-management-howto-deploy-multi-region.md), the regional IP address changes if a region is vacated and then reinstated.
0 commit comments