Skip to content

Commit 7ce09bf

Browse files
authored
Merge pull request #219519 from omondiatieno/end-user-experience-updates
update end user experience and freshness pass
2 parents 48436a1 + b9443e9 commit 7ce09bf

File tree

3 files changed

+35
-24
lines changed

3 files changed

+35
-24
lines changed

articles/active-directory/manage-apps/end-user-experiences.md

Lines changed: 28 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,67 +1,80 @@
11
---
22
title: End-user experiences for applications
3-
description: Azure Active Directory (Azure AD) provides several customizable ways to deploy applications to end users in your organization.
3+
description: Learn about the customizable ways to deploy applications to end users in your organization with Azure Active Directory (Azure AD)
44
services: active-directory
55
author: lnalepa
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 09/27/2019
11+
ms.date: 12/08/2022
1212
ms.author: lenalepa
1313
---
1414

1515
# End-user experiences for applications
1616

1717
Azure Active Directory (Azure AD) provides several customizable ways to deploy applications to end users in your organization:
1818

19-
* Azure AD My Apps
20-
* Microsoft 365 application launcher
21-
* Direct sign-on to federated apps
22-
* Deep links to federated, password-based, or existing apps
19+
- Azure AD My Apps
20+
- Microsoft 365 application launcher
21+
- Direct sign-on to federated apps
22+
- Deep links to federated, password-based, or existing apps
2323

2424
Which method(s) you choose to deploy in your organization is your discretion.
2525

2626
## Azure AD My Apps
2727

28-
[My Apps](https://myapps.microsoft.com) is a web-based portal that allows an end user with an organizational account in Azure Active Directory to view and launch applications to which they have been granted access by the Azure AD administrator. If you are an end user with [Azure Active Directory Premium](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing), you can also utilize self-service group management capabilities through My Apps.
28+
[My Apps](https://myapps.microsoft.com) is a web-based portal that allows an organization user in Azure AD to view and launch applications to which they have been granted access by the Azure AD administrator. If you're an end user with [Azure Active Directory Premium](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing), you can also utilize self-service group management capabilities through My Apps.
2929

3030
By default, all applications are listed together on a single page. But you can use collections to group together related applications and present them on a separate tab, making them easier to find. For example, you can use collections to create logical groupings of applications for specific job roles, tasks, projects, and so on. For information, see [Create collections on the My Apps portal](access-panel-collections.md).
3131

32-
My Apps is separate from the Azure portal and does not require users to have an Azure subscription or Microsoft 365 subscription.
32+
My Apps is separate from the Azure portal and doesn't require users to have an Azure subscription or Microsoft 365 subscription.
3333

3434
For more information on Azure AD My Apps, see the [introduction to My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
3535

3636
## Microsoft 365 application launcher
3737

38-
For organizations that have deployed Microsoft 365, applications assigned to users through Azure AD will also appear in the Office 365 portal at [https://portal.office.com/myapps](https://portal.office.com/myapps). This makes it easy and convenient for users in an organization to launch their apps without having to use a second portal, and is the recommended app launching solution for organizations using Microsoft 365.
38+
For organizations that have deployed Microsoft 365, applications assigned to users through Azure AD will also appear in the Office 365 portal at [https://portal.office.com/myapps](https://portal.office.com/myapps). It makes it convenient for users in an organization to launch their apps without using a second portal. Microsoft 365 application launcher is the recommended app launching solution for organizations using Microsoft 365.
3939

4040
For more information about the Office 365 application launcher, see [Have your app appear in the Office 365 app launcher](/previous-versions/office/office-365-api/).
4141

4242
## Direct sign-on to federated apps
4343

44-
Most federated applications that support SAML 2.0, WS-Federation, or OpenID connect also support the ability for users to start at the application, and then get signed in through Azure AD either by automatic redirection or by clicking on a link to sign in. This is known as service provider-initiated sign-on, and most federated applications in the Azure AD application gallery support this (see the documentation linked from the app’s single sign-on configuration wizard in the Azure portal for details).
44+
Most federated applications that support SAML 2.0, WS-Federation, or OpenID connect also support the ability for users to start at the application. The users then get signed in through Azure AD either by automatic redirection or by selecting a link to sign in. Direct sign-on is a service provider-initiated sign-on, and most federated applications in Azure AD application gallery support it. See the documentation linked from the app’s single sign-on configuration wizard in the Azure portal for details.
4545

4646
## Direct sign-on links
4747

4848
Azure AD also supports direct single sign-on links to individual applications that support password-based single sign-on, linked single sign-on, and any form of federated single sign-on.
4949

50-
These links are specifically crafted URLs that send a user through the Azure AD sign-in process for a specific application without requiring the user launch them from Azure AD My Apps or Microsoft 365. These **User access URLs** can be found under the properties of available enterprise applications. In the Azure portal, select **Azure Active Directory** > **Enterprise applications**. Select the application, and then select **Properties**.
50+
Direct sign-on links are crafted URLs that send a user through the Azure AD sign-in process for a specific application. The user won't need to launch the application from My Apps or Microsoft 365. These **User access URLs** can be found under the properties of available enterprise applications. In the Azure portal, select **Azure Active Directory** > **Enterprise applications**. Select the application, and then select **Properties**.
5151

5252
![Example of the User access URL in Twitter properties](media/end-user-experiences/direct-sign-on-link.png)
5353

54-
These links can be copied and pasted anywhere you want to provide a sign-in link to the selected application. This could be in an email, or in any custom web-based portal that you have set up for user application access. Here's an example of an Azure AD direct single sign-on URL for Twitter:
54+
Direct sign-on links can be copied and pasted anywhere you want to provide a sign-in link to the selected application. They can be placed in an email, or in any custom web-based portal that you've set up for user application access. The following URL is an example of an Azure AD direct single sign-on URL for Twitter:
5555

5656
`https://myapps.microsoft.com/signin/Twitter/230848d52c8745d4b05a60d29a40fced`
5757

58-
Similar to organization-specific URLs for My Apps, you can further customize this URL by adding one of the active or verified domains for your directory after the *myapps.microsoft.com* domain. This ensures any organizational branding is loaded immediately on the sign-in page without the user needing to enter their user ID first:
58+
Similar to organization-specific URLs for My Apps, you can further customize direct sign-on URL by adding one of the active or verified domains for your directory after the *myapps.microsoft.com* domain. Customizing direct sign-on URL ensures any organizational branding is loaded immediately on the sign-in page without the user needing to enter their user ID first:
5959

6060
`https://myapps.microsoft.com/contosobuild.com/signin/Twitter/230848d52c8745d4b05a60d29a40fced`
6161

62-
When an authorized user clicks on one of these application-specific links, they first see their organizational sign-in page (assuming they are not already signed in), and after sign-in are redirected to their app without stopping at My Apps first. If the user is missing pre-requisites to access the application, such as the password-based single sign browser extension, then the link will prompt the user to install the missing extension. The link URL also remains constant if the single sign-on configuration for the application changes.
62+
When an authorized user selects one of these application-specific links, they first see their organizational sign-in page (assuming they aren't already signed in). After sign-in, they're redirected to their app without stopping at My Apps first. If the user is missing pre-requisites to access the application, such as the password-based single sign browser extension, then the link will prompt the user to install the missing extension. The link URL also remains constant if the single sign-on configuration for the application changes.
6363

64-
These links use the same access control mechanisms as My Apps and Microsoft 365, and only those users or groups who have been assigned to the application in the Azure portal will be able to successfully authenticate. However, any user who is unauthorized will see a message explaining that they have not been granted access, and are given a link to load My Apps to view available applications for which they do have access.
64+
These links use the same access control mechanisms as My Apps and Microsoft 365. Only those users or groups who have been assigned to the application in the Azure portal will be able to successfully authenticate. However, any user who is unauthorized will see a message explaining that they haven't been granted access. The unauthorized user is given a link to load My Apps to view available applications that they do have access to.
65+
66+
## Manage preview settings
67+
68+
As an admin, you can choose to try out new app launcher features while they are in preview. Enabling a preview feature means that the feature is turned on for your organization and will be reflected in the My Apps portal and other app launchers for all your users.
69+
70+
To enable or disable previews for your app launchers:
71+
72+
- Sign in to the Azure portal as a global administrator for your directory.
73+
- Search for and select **Azure Active Directory**, then select **Enterprise applications**.
74+
- On the left menu, select **App launchers**, then select **Settings**.
75+
- Under **Preview settings**, toggle the checkboxes for the previews you want to enable or disable. To opt into a preview, toggle the associated checkbox to the checked state. To opt out of a preview, toggle the associated checkbox to the unchecked state.
76+
- Select **Save**. Wait a few minutes for the changes to take effect.
77+
Navigate to the My Apps portal and verify that the preview you enabled or disabled is reflected.
6578

6679
## Next steps
6780

articles/active-directory/manage-apps/manage-self-service-access.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 09/23/2021
11+
ms.date: 11/24/2022
1212
ms.author: jomondi
1313
ms.collection: M365-identity-device-management
1414
ms.reviewer: ergreenl
@@ -42,7 +42,7 @@ To enable self-service application access, you need:
4242

4343
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
4444
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
45-
- An Azure Active Directory Premium (P1 or P2) license is required for users to request to join a self-service app and for owners to approve or deny requests. Without an Azure Active Directory Premium license, users cannot add self-service apps.
45+
- An Azure Active Directory Premium (P1 or P2) license is required for users to request to join a self-service app and for owners to approve or deny requests. Without an Azure Active Directory Premium license, users can't add self-service apps.
4646

4747
## Enable self-service application access to allow users to find their own applications
4848

@@ -67,18 +67,16 @@ To enable self-service application access to an application, follow the steps be
6767
6868
1. **Optional:** To require business approval before users are allowed access, set **Require approval before granting access to this application?** to **Yes**.
6969

70-
1. **Optional: For applications using password single-sign on only,** to allow business approvers to specify the passwords that are sent to this application for approved users, set **Allow approvers to set user’s passwords for this application?** to **Yes**.
71-
72-
1. **Optional:** To specify the business approvers who are allowed to approve access to this application, select **Select approvers**, select up to 10 individual business approvers, and then select **Select**.
70+
1. **Optional:** Next to **Who is allowed to approve access to this application?** Select **Select approvers** to specify the business approvers who are allowed to approve access to this application. Select up to 10 individual business approvers, and then select **Select**.
7371

7472
>[!NOTE]
7573
>Groups are not supported. You can select up to 10 individual business approvers. If you specify multiple approvers, any single approver can approve an access request.
7674
77-
1. **Optional:** **For applications that expose roles**, to assign self-service approved users to a role, select **Select Role**, choose the role to which these users should be assigned, and then select **Select**.
75+
1. **Optional:** Next to **To which role should users be assigned in this application?**, select **Select Role** to assign self-service approved users to a role. Choose the role to which these users should be assigned, and then select **Select**. This option is for applications that expose roles.
7876

7977
1. Select the **Save** button at the top of the pane to finish.
8078

81-
Once you complete self-service application configuration, users can navigate to their My Apps portal and select **Request new apps** to find the apps that are enabled with self-service access. Business approvers also see a notification in their My Apps portal. You can enable an email notifying them when a user has requested access to an application that requires their approval.
79+
Once you complete self-service application configuration, users can navigate to their My Apps portal, and select **Request new apps** to find the apps that are enabled with self-service access. Business approvers also see a notification in their My Apps portal. You can enable an email notifying them when a user has requested access to an application that requires their approval.
8280

8381
## Next steps
8482

articles/active-directory/manage-apps/myapps-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 08/11/2022
11+
ms.date: 11/24/2022
1212
ms.author: saibandaru
1313
ms.custom: contperf-fy23q1
1414
#Customer intent: As an Azure AD administrator, I want to make applications available to users in the My Apps portal.
@@ -74,7 +74,7 @@ In the Azure portal, define the logo and name for the application to represent c
7474

7575
For more information, see [Add branding to your organization's sign-in page](../fundamentals/customize-branding.md).
7676

77-
## Access applications
77+
## Manage access to applications
7878

7979
Multiple factors affect how and whether an application can be accessed by users. Permissions that are assigned to the application can affect what can be done with it. Applications can be configured to allow self-service access, or access may be only granted by an administrator of the tenant.
8080

0 commit comments

Comments
 (0)