Skip to content

Commit 7e65cea

Browse files
authored
Merge pull request #45800 from githubarpyka/patch-1
Fixing the article after internal discussions
2 parents 88a89dd + d7fcf7a commit 7e65cea

File tree

1 file changed

+14
-1
lines changed

1 file changed

+14
-1
lines changed

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-password-vaulting.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ You should already have published and tested your app with Application Proxy. If
3030
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
3131
1. Select **Azure Active Directory** > **Enterprise applications** > **All applications**.
3232
1. From the list, select the app that you want to set up with SSO.
33+
1. Select **Application Proxy**.
34+
1. Change the **Pre Authentication type** to **Passthrough** and select **Save**. Later you can switch back to **Azure Active Directory** type again!
3335
1. Select **Single sign-on**.
3436

3537
![Select Single sign-on from the app's overview page](./media/application-proxy-configure-single-sign-on-password-vaulting/select-sso.png)
@@ -40,14 +42,25 @@ You should already have published and tested your app with Application Proxy. If
4042
![Choose password-based Sign-on and enter your URL](./media/application-proxy-configure-single-sign-on-password-vaulting/password-sso.png)
4143

4244
1. Select **Save**.
45+
1. Select **Application Proxy**.
46+
1. Change the **Pre Authentication type** to **Azure Active Directory** and select **Save**.
47+
1. Select **Users and Groups**.
48+
1. Assign users to the application with selecting **Add user**.
49+
1. If you want to predefine credentials for a user, check the box front of the user name and select **Update credentials**.
50+
1. Select **Azure Active Directory** > **App registrations** > **All applications**.
51+
1. From the list, select the app that you configured with Password SSO.
52+
1. Select **Branding**.
53+
1. Update the **Home page URL** with the **Sign on URL** from the Password SSO page and select **Save**.
54+
55+
4356

4457
<!-- Need to repro?
4558
7. The page should tell you that a sign-in form was successfully detected at the provided URL. If it doesn't, select **Configure [your app name] Password Single Sign-on Settings** and choose **Manually detect sign-in fields**. Follow the instructions to point out where the sign-in credentials go.
4659
-->
4760

4861
## Test your app
4962

50-
Go to external URL that you configured for remote access to your application. Sign in with your credentials for that app (or the credentials for a test account that you set up with access). Once you sign in successfully, you should be able to leave the app and come back without entering your credentials again.
63+
Go to the My Apps portal. Sign in with your credentials (or the credentials for a test account that you set up with access). Once you signed in successfully, click on the icon of the app. This might trigger the installation of the My Apps Secure Sign-in browser extension. If your user had predefined credentials the authentication to the app should happen automatically, otherwise you must specify the user name or password for the first time.
5164

5265
## Next steps
5366

0 commit comments

Comments
 (0)