Skip to content

Commit 5797c6a

Browse files
authored
Merge pull request #213050 from omondiatieno/sso-refresh
sso refresh
2 parents 4c9cfdd + 22a47d5 commit 5797c6a

File tree

5 files changed

+30
-27
lines changed

5 files changed

+30
-27
lines changed

articles/active-directory/manage-apps/add-application-portal-setup-sso.md

Lines changed: 18 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: 'Quickstart: Enable single sign-on for an enterprise application'
2+
title: Enable single sign-on for an enterprise application
33
description: Enable single sign-on for an enterprise application in Azure Active Directory.
44
services: active-directory
5-
author: davidmu1
5+
author: omondiatieno
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
9-
ms.topic: quickstart
9+
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 09/21/2021
12-
ms.author: davidmu
11+
ms.date: 09/29/2022
12+
ms.author: jomondi
1313
ms.reviewer: ergleenl
1414
ms.custom: contperf-fy22q2, mode-other
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to enable single sign-on for an enterprise application.
1616
---
1717

18-
# Quickstart: Enable single sign-on for an enterprise application
18+
# Enable single sign-on for an enterprise application
1919

20-
In this quickstart, you use the Azure Active Directory Admin Center to enable single sign-on (SSO) for an enterprise application that you added to your Azure Active Directory (Azure AD) tenant. After you configure SSO, your users can sign in by using their Azure AD credentials.
20+
In this article, you use the Azure Active Directory Admin Center to enable single sign-on (SSO) for an enterprise application that you added to your Azure Active Directory (Azure AD) tenant. After you configure SSO, your users can sign in by using their Azure AD credentials.
2121

22-
Azure AD has a gallery that contains thousands of pre-integrated applications that use SSO. This quickstart uses an enterprise application named **Azure AD SAML Toolkit** as an example, but the concepts apply for most pre-configured enterprise applications in the gallery.
22+
Azure AD has a gallery that contains thousands of pre-integrated applications that use SSO. This article uses an enterprise application named **Azure AD SAML Toolkit 1** as an example, but the concepts apply for most pre-configured enterprise applications in the gallery.
2323

24-
It is recommended that you use a non-production environment to test the steps in this quickstart.
24+
It is recommended that you use a non-production environment to test the steps in this article.
2525

2626
## Prerequisites
2727

@@ -39,7 +39,7 @@ To enable SSO for an application:
3939
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to use. For example, **Azure AD SAML Toolkit 1**.
4040
1. In the **Manage** section of the left menu, select **Single sign-on** to open the **Single sign-on** pane for editing.
4141
1. Select **SAML** to open the SSO configuration page. After the application is configured, users can sign in to it by using their credentials from the Azure AD tenant.
42-
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit** are listed in this quickstart.
42+
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the **configuration guide** link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit 1** are listed in this article.
4343

4444
:::image type="content" source="media/add-application-portal-setup-sso/saml-configuration.png" alt-text="Configure single sign-on for an enterprise application.":::
4545

@@ -55,7 +55,7 @@ To configure SSO in Azure AD:
5555
1. For **Reply URL (Assertion Consumer Service URL)**, enter `https://samltoolkit.azurewebsites.net/SAML/Consume`.
5656
1. For **Sign on URL**, enter `https://samltoolkit.azurewebsites.net/`.
5757
1. Select **Save**.
58-
1. In the **SAML Signing Certificate** section, select **Download** for **Certificate (Raw)** to download the SAML signing certificate and save it to be used later.
58+
1. In the **SAML Certificates** section, select **Download** for **Certificate (Raw)** to download the SAML signing certificate and save it to be used later.
5959

6060
## Configure single sign-on in the application
6161

@@ -70,15 +70,15 @@ To register a user account with the application:
7070

7171
:::image type="content" source="media/add-application-portal-setup-sso/toolkit-register.png" alt-text="Register a user account in the Azure AD SAML Toolkit application.":::
7272

73-
1. For **Email**, enter the email address of the user that will access the application. For example, in a previous quickstart, the user account was created that uses the address of `[email protected]`. Be sure to change `contoso.com` to the domain of your tenant.
73+
1. For **Email**, enter the email address of the user that will access the application. Ensure that the user account is already assigned to the application.
7474
1. Enter a **Password** and confirm it.
7575
1. Select **Register**.
7676

7777
### Configure SAML settings
7878

79-
To configure SAML setting for the application:
79+
To configure SAML settings for the application:
8080

81-
1. Signed in with the credentials of the user account that you created, select **SAML Configuration** at the upper-left corner of the page.
81+
1. Signed in with the credentials of the user account that you already assigned to the application, select **SAML Configuration** at the upper-left corner of the page.
8282
1. Select **Create** in the middle of the page.
8383
1. For **Login URL**, **Azure AD Identifier**, and **Logout URL**, enter the values that you recorded earlier.
8484
1. Select **Choose file** to upload the certificate that you previously downloaded.
@@ -102,15 +102,12 @@ You can test the single sign-on configuration from the **Set up single sign-on**
102102

103103
To test SSO:
104104

105-
1. In the **Test single sign-on with Azure AD SAML Toolkit 1** section, on the **Set up single sign-on** pane, select **Test**.
105+
1. In the **Test single sign-on with Azure AD SAML Toolkit 1** section, on the **Set up single sign-on with SAML** pane, select **Test**.
106106
1. Sign in to the application using the Azure AD credentials of the user account that you assigned to the application.
107107

108-
## Clean up resources
109-
110-
If you are planning to complete the next quickstart, keep the enterprise application that you created. Otherwise, you can consider deleting it to clean up your tenant.
111108

112109
## Next steps
113110

114-
Learn how to configure the properties of an enterprise application.
115-
> [!div class="nextstepaction"]
116-
> [Configure an application](add-application-portal-configure.md)
111+
- [Manage self service access](manage-self-service-access.md)
112+
- [Configure user consent](configure-user-consent.md)
113+
- [Grant tenant-wide admin consent](grant-admin-consent.md)

articles/active-directory/manage-apps/index.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,10 @@ landingContent:
101101
url: configure-permission-classifications.md
102102
- text: Manage entitlement
103103
url: ../governance/entitlement-management-scenarios.md
104+
- linkListType: learn
105+
links:
106+
- text: Configure admin consent workflow
107+
url: /training/modules/configure-admin-consent-workflow/
104108
- title: Maintain an app
105109
linkLists:
106110
- linkListType: how-to-guide

articles/active-directory/manage-apps/plan-sso-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,4 +108,4 @@ The following SSO protocols are available to use:
108108

109109
## Next steps
110110

111-
- Consider completing the single sign-on training in [Enable single sign-on for applications by using Azure Active Directory](/training/modules/enable-single-sign-on).
111+
- [Enable single sign-on for applications by using Azure Active Directory](add-application-portal-setup-sso.md).

articles/active-directory/manage-apps/toc.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -212,11 +212,13 @@
212212
href: silverfort-azure-ad-integration.md
213213
- name: Single sign-on
214214
items:
215-
- name: Linked
215+
- name: Enable single sign-on with SAML
216+
href: add-application-portal-setup-oidc-sso.md
217+
- name: Enable Linked based single sign-on
216218
href: configure-linked-sign-on.md
217-
- name: OpenID Connect
219+
- name: Enable OpenID Connect based single sign-on
218220
href: add-application-portal-setup-oidc-sso.md
219-
- name: Password
221+
- name: Enable Password based single sign-on
220222
href: configure-password-single-sign-on-non-gallery-applications.md
221223
- name: Troubleshoot
222224
items:

articles/active-directory/manage-apps/what-is-application-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,13 +61,13 @@ To [manage access](what-is-access-management.md) for an application, you want to
6161

6262
You can [manage user consent settings](configure-user-consent.md) to choose whether users can allow an application or service to access user profiles and organizational data. When applications are granted access, users can sign in to applications integrated with Azure AD, and the application can access your organization's data to deliver rich data-driven experiences.
6363

64-
Users often are unable to consent to the permissions an application is requesting. Configure the admin consent workflow to allow users to provide a justification and request an administrator's review and approval of an application. For training on how to configure admin consent workflow in your Azure AD tenant, see [Configure admin consent workflow](/training/modules/configure-admin-consent-workflow).
64+
Users often are unable to consent to the permissions an application is requesting. Configure the admin consent workflow to allow users to provide a justification and request an administrator's review and approval of an application. To learn how to configure admin consent workflow in your Azure AD tenant, see [Configure admin consent workflow](configure-admin-consent-workflow.md).
6565

6666
As an administrator, you can [grant tenant-wide admin consent](grant-admin-consent.md) to an application. Tenant-wide admin consent is necessary when an application requires permissions that regular users aren't allowed to grant, and allows organizations to implement their own review processes. Always carefully review the permissions the application is requesting before granting consent. When an application has been granted tenant-wide admin consent, all users are able to sign into the application unless it has been configured to require user assignment.
6767

6868
### Single sign-on
6969

70-
Consider implementing SSO in your application. You can manually configure most applications for SSO. The most popular options in Azure AD are [SAML-based SSO and OpenID Connect-based SSO](../develop/active-directory-v2-protocols.md). Before you start, make sure that you understand the requirements for SSO and how to [plan for deployment](plan-sso-deployment.md). For training related to configuring SAML-based SSO for an enterprise application in your Azure AD tenant, see [Enable single sign-on for an application by using Azure Active Directory](/training/modules/enable-single-sign-on).
70+
Consider implementing SSO in your application. You can manually configure most applications for SSO. The most popular options in Azure AD are [SAML-based SSO and OpenID Connect-based SSO](../develop/active-directory-v2-protocols.md). Before you start, make sure that you understand the requirements for SSO and how to [plan for deployment](plan-sso-deployment.md). For more information on how to configure SAML-based SSO for an enterprise application in your Azure AD tenant, see [Enable single sign-on for an application by using Azure Active Directory](add-application-portal-setup-sso.md).
7171

7272
### User, group, and owner assignment
7373

0 commit comments

Comments
 (0)