Skip to content

Commit 7376e69

Browse files
authored
Merge pull request #79284 from MicrosoftDocs/master
6/11 AM Publish
2 parents 000de1d + 63d7e7f commit 7376e69

File tree

70 files changed

+581
-507
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+581
-507
lines changed
Lines changed: 23 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set up sign-up and sign-in with a Microsoft account - Azure Active Directory B2C | Microsoft Docs
2+
title: Set up sign-up and sign-in with a Microsoft account - Azure Active Directory B2C
33
description: Provide sign-up and sign-in to customers with Microsoft accounts in your applications using Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 09/21/2018
11+
ms.date: 06/11/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -19,22 +19,28 @@ ms.subservice: B2C
1919

2020
To use a Microsoft account as an [identity provider](active-directory-b2c-reference-oidc.md) in Azure Active Directory (Azure AD) B2C, you need to create an application in your tenant that represents it. If you don’t already have a Microsoft account, you can get it at [https://www.live.com/](https://www.live.com/).
2121

22-
1. Sign in to the [Microsoft Application Registration Portal](https://apps.dev.microsoft.com/?referrer=https://azure.microsoft.com/documentation/articles&deeplink=/appList) with your Microsoft account credentials.
23-
2. In the upper-right corner, select **Add an app**.
24-
3. Enter a **Name** for your application. For example, *MSAapp1*.
25-
4. Select **Generate New Password** and make sure that you copy the password to use when you configure the identity provider. Also copy the **Application Id**.
26-
5. Select **Add platform**, and then and choose **Web**.
27-
4. Enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Redirect URLs**. Replace `your-tenant-name` with the name of your tenant.
28-
5. Select **Save**.
22+
1. Sign in to the [Azure portal](https://portal.azure.com/).
23+
1. Select **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
24+
1. Select **New registration**
25+
1. Enter a **Name** for your application. For example, *MSAapp1*.
26+
1. Under **Supported account types**, select **Accounts in any organizational directory and personal Microsoft accounts (e.g. Skype, Xbox, Outlook.com)**. This option targets the widest set of Microsoft identities.
27+
28+
For more information on the different account type selections, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
29+
1. Under **Redirect URI (optional)**, select **Web** and enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in the text box. Replace `your-tenant-name` with your Azure AD B2C tenant name.
30+
1. Select **Register**
31+
1. Record the **Application (client) ID** shown on the application Overview page. You need this when you configure the identity provider in the next section.
32+
1. Select **Certificates & secrets**
33+
1. Click **New client secret**
34+
1. Enter a **Description** for the secret, for example *Application password 1*, and then click **Add**.
35+
1. Record the application password shown in the **VALUE** column. You need this when you configure the identity provider in the next section.
2936

3037
## Configure a Microsoft account as an identity provider
3138

3239
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
33-
2. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
34-
3. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
35-
4. Select **Identity providers**, and then select **Add**.
36-
5. Provide a **Name**. For example, enter *MSA*.
37-
6. Select **Identity provider type**, select **Microsoft Account**, and click **OK**.
38-
7. Select **Set up this identity provider** and enter the Application Id that you recorded earlier as the **Client ID** and enter the password that you recorded as the **Client secret** of the Microsoft account application that you created earlier.
39-
8. Click **OK** and then click **Create** to save your Microsoft account configuration.
40-
40+
1. Make sure you're using the directory that contains your Azure AD B2C tenant by clicking the **Directory and subscription filter** in the top menu and choosing the directory that contains your tenant.
41+
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
42+
1. Select **Identity providers**, and then select **Add**.
43+
1. Provide a **Name**. For example, enter *MSA*.
44+
1. Select **Identity provider type**, select **Microsoft Account**, and click **OK**.
45+
1. Select **Set up this identity provider** and enter the Application (client) ID that you recorded earlier in the **Client ID** text box, and enter the client secret that you recorded in the **Client secret** text box.
46+
1. Click **OK** and then click **Create** to save your Microsoft account configuration.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ After the feature has been running in audit mode for a reasonable period, you ca
3333

3434
## Deployment requirements
3535

36-
* Azure Active Directory Premium P1 or P2 license. For more detailed information about Azure Active Directory licensing, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory/).
36+
* Licensing requirements for Azure AD password protection can be found in the article [Eliminate bad passwords in your organization](concept-password-ban-bad.md#license-requirements).
3737
* All domain controllers that get the DC Agent service for Azure AD password protection installed must run Windows Server 2012 or later. This requirement does not imply that the Active Directory domain or forest must also be at Windows Server 2012 domain or forest functional level. As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there is no minimum DFL or FFL required for either the DC agent or proxy software to run.
3838
* All machines that get the DC agent service installed must have .NET 4.5 installed.
3939
* All machines that get the proxy service for Azure AD password protection installed must run Windows Server 2012 R2 or later.
9.27 KB
Loading
86.5 KB
Loading
75.5 KB
Loading
10.1 KB
Loading
91.1 KB
Loading
Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,86 @@
1+
---
2+
title: 'Configure an One Click SSO to your application from the Azure AD app gallery | Microsoft Docs'
3+
description: Steps to configure One Click SSO to your application from the Azure AD app gallery.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: celested
9+
10+
ms.assetid: e0416991-4b5d-4b18-89bb-91b6070ed3ba
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: tutorial
17+
ms.date: 06/11/2019
18+
ms.author: jeedes
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# One Click SSO feature for Azure AD Gallery Applications
24+
25+
In this tutorial, you learn how to perform One Click SSO for all the SAML applications that provide UI for SSO configuration.
26+
27+
## Introduction to One Click SSO
28+
29+
One Click SSO feature is introduced to configure the Single Sign On for Azure AD gallery apps that support SAML protocol. On Azure AD SSO configuration page, we have provided this option to allow our customers to configure the Azure AD metadata on the application side automatically. The objective is to help customers setting up SSO quickly with minimal manual efforts.
30+
31+
## Advantages of the One Click SSO
32+
33+
- Quick SSO configuration of the gallery applications where customers need to do manual setup on application side.
34+
- More efficient and accurate way of configuration.
35+
- No partner communication or support needed for the setup as the application provides the UI for SAML configuration.
36+
37+
## Prerequisites
38+
39+
- Active subscription of the application with admin credentials that you want to configure with OneClick SSO.
40+
- **My Apps Secure Sign-in browser extension** from Microsoft installed in the browser. If you would like to know more about this extension, refer to this [link](https://docs.microsoft.com/azure/active-directory/user-help/my-apps-portal-end-user-access).
41+
42+
## One Click SSO feature step by step details
43+
44+
1. Add the application from the Azure AD App gallery.
45+
46+
2. Click on Single sign-on.
47+
48+
3. Click on Enable Single sign-on.
49+
50+
4. Populate the mandatory configuration values in Basic SAML Configuration section.
51+
52+
> [!NOTE]
53+
> If application needs configuration of custom claims, please configure them before performing OneClick SSO.
54+
55+
5. If One Click SSO feature is implemented for any gallery application, you see following screen. If the **My Apps Secure Sign-in browser extension** is not already installed, you need to click on **Install the extension** option.
56+
57+
![Install My Apps Secure Sign-in browser extension](./media/one-click-sso-tutorial/install-myappssecure-extension.png)
58+
59+
6. After adding the extension to the browser, click on **Setup Application Name** which will redirect you to the application admin portal. You need to sign-in as administrator to get into the application.
60+
61+
![Setup application name](./media/one-click-sso-tutorial/setup-sso.png)
62+
63+
7. The browser extension will now automatically configure the application for you. It first asks your confirmation if you want to proceed. Click **Yes**.
64+
65+
![Saving the auto populated data](./media/one-click-sso-tutorial/save-autopopulate.png)
66+
67+
> [!NOTE]
68+
> If any application needs extra nagivation or steps, you should see proper messages asking you to perform those steps.
69+
70+
8. Once the configuration is done, click **Ok** to save the changes.
71+
72+
![Save the auto populated data](./media/one-click-sso-tutorial/save-data.png)
73+
74+
9. A successful confirmation pop-up message is displayed and your SSO settings are successfully configured. You can then test the application.
75+
76+
![SSO Configured](./media/one-click-sso-tutorial/sso-configured.png)
77+
78+
10. Once the configuration is successfully complete, the application will be logged off and you are returned back to Azure portal.
79+
80+
11. You can click on the Test button to test the Single sign-on.
81+
82+
## Additional resources
83+
84+
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/saas-apps/tutorial-list)
85+
* [What is My Apps Secure Sign-in browser extension](https://docs.microsoft.com/azure/active-directory/user-help/my-apps-portal-end-user-access)
86+

articles/active-directory/manage-apps/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,10 @@
8383
href: plan-sso-deployment.md
8484
- name: End-user portals
8585
href: end-user-experiences.md
86+
- name: One Click SSO
87+
items:
88+
- name: What is One Click SSO
89+
href: one-click-sso-tutorial.md
8690
- name: How-to guides
8791
items:
8892
- name: Add a cloud app
723 Bytes
Loading

0 commit comments

Comments
 (0)