You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-setup-oidc-azure-active-directory.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,7 @@ ms.topic: conceptual
11
11
ms.date: 08/08/2019
12
12
ms.author: marsma
13
13
ms.subservice: B2C
14
+
ms.custom: fasttrack-edit
14
15
---
15
16
16
17
# Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C
@@ -55,6 +56,8 @@ To enable sign-in for users from a specific Azure AD organization, you need to r
55
56
56
57
For example, `https://login.microsoftonline.com/contoso.onmicrosoft.com/.well-known/openid-configuration`.
57
58
59
+
**Do not** use the Azure AD v2.0 metadata endpoint, for example `https://login.microsoftonline.com/contoso.onmicrosoft.com/v2.0/.well-known/openid-configuration`. Doing so results in an error similar to `AADB2C: A claim with id 'UserId' was not found, which is required by ClaimsTransformation 'CreateAlternativeSecurityId' with id 'CreateAlternativeSecurityId' in policy 'B2C_1_SignUpOrIn' of tenant 'contoso.onmicrosoft.com'` when attempting to sign in.
60
+
58
61
1. For **Client ID**, enter the application ID that you previously recorded.
59
62
1. For **Client secret**, enter the client secret that you previously recorded.
60
63
1. Leave the default values for **Scope**, **Response type**, and **Response mode**.
title: Custom domains in Azure AD Application Proxy | Microsoft Docs
3
-
description: Manage custom domains in Azure AD Application Proxy so that the URL for the app is the same regardless of where your users access it.
3
+
description: Configure and manage custom domains in Azure AD Application Proxy.
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: msmimart
@@ -12,81 +12,132 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: conceptual
15
-
ms.date: 01/31/2018
15
+
ms.date: 10/16/2019
16
16
ms.author: mimart
17
17
ms.reviewer: harshja
18
18
ms.custom: it-pro
19
19
20
20
ms.collection: M365-identity-device-management
21
21
---
22
22
23
-
# Working with custom domains in Azure AD Application Proxy
23
+
# Configure custom domains with Azure AD Application Proxy
24
24
25
-
When you publish an application through Azure Active Directory Application Proxy, you create an external URL for your users to go to when they're working remotely. This URL gets the default domain *yourtenant.msappproxy.net*. For example, if you published an app named Expenses and your tenant is named Contoso, then the external URL would be `https://expenses-contoso.msappproxy.net`. If you want to use your own domain name, configure a custom domain for your application.
25
+
When you publish an application through Azure Active Directory Application Proxy, you create an external URL for your users. This URL gets the default domain *yourtenant.msappproxy.net*. For example, if you publish an app named *Expenses* in your tenant named *Contoso*, the external URL is *https:\//expenses-contoso.msappproxy.net*. If you want to use your own domain name instead of *msappproxy.net*, you can configure a custom domain for your application.
26
26
27
-
We recommend that you set up custom domains for your applications whenever possible. Some of the benefits of custom domains include:
27
+
## Benefits of custom domains
28
28
29
-
- Your users can get to the application with the same URL, whether they are working inside or outside of your network.
30
-
- If all of your applications have the same internal and external URLs, then links in one application that point to another continue to work even outside the corporate network.
31
-
- You control your branding, and create the URLs you want.
29
+
It's a good idea to set up custom domains for your apps whenever possible. Some reasons to use custom domains include:
32
30
31
+
- Links between apps work even outside the corporate network. Without a custom domain, if your app has hard-coded internal links to targets outside the Application Proxy, and the links aren't externally resolvable, they will break. When your internal and external URLs are the same, you avoid this problem. If you're not able to use custom domains, see [Redirect hardcoded links for apps published with Azure AD Application Proxy](../application-proxy-link-translation.md) for other ways to address this issue.
32
+
33
+
- Your users will have an easier experience, because they can get to the app with the same URL from inside or outside your network. They don’t need to learn different internal and external URLs, or track their current location.
33
34
34
-
## Configure a custom domain
35
+
- You can control your branding and create the URLs you want. A custom domain can help build your users' confidence, because users see and use a familiar name instead of *msappproxy.net*.
35
36
36
-
### Prerequisites
37
+
- Some configurations will only work with custom domains. For example, you need custom domains for apps that use Security Assertion Markup Language (SAML), such as when you’re using Active Directory Federation Services (AD FS) but are unable to use WS-Federation. For more information, see [Work with claims-aware apps in Application Proxy](application-proxy-configure-for-claims-aware-applications.md).
37
38
38
-
Before you configure a custom domain, make sure that you have the following requirements prepared:
39
-
- A [verified domain added to Azure Active Directory](../fundamentals/add-custom-domain.md).
40
-
- A custom certificate for the domain, in the form of a PFX file.
41
-
- An on-premises app [published through Application Proxy](application-proxy-add-on-premises-application.md).
39
+
If you're not able to make the internal and external URLs match, it's not as important to use custom domains, but you can still take advantage of the other benefits.
42
40
43
-
### Configure your custom domain
41
+
##DNS configuration options
44
42
45
-
When you have those three requirements ready, follow these steps to set up your custom domain:
43
+
There are several options for setting up your DNS configuration, depending on your requirements:
46
44
47
-
1. Sign in to the [Azure portal](https://portal.azure.com).
48
-
2. Navigate to **Azure Active Directory** > **Enterprise applications** > **All applications** and choose the app you want to manage.
49
-
3. Select **Application Proxy**.
50
-
4. In the External URL field, use the dropdown list to select your custom domain. If you don't see your domain in the list, then it hasn't been verified yet.
51
-
5. Select **Save**
52
-
5. The **Certificate** field that was disabled becomes enabled. Select this field.
45
+
### Same internal and external URL, different internal and external behavior
53
46
47
+
If you don't want your internal users to be directed through the Application Proxy, you can set up a *split-brain DNS*. A split DNS infrastructure directs internal hosts to an internal domain name server, and external hosts to an external domain name server, for name resolution.
If the internal and external URLs are different, you don't need to configure split-brain behavior, because user routing is determined by the URL. In this case, you change only the external DNS, and route the external URL to the Application Proxy endpoint.
54
+
55
+
When you select a custom domain for an external URL, an information bar shows the CNAME entry you need to add to the external DNS provider. You can always see this information by going to the app's **Application proxy** page.
56
+
57
+
## Set up and use custom domains
58
+
59
+
To configure an on-premises app to use a custom domain, you need a verified Azure Active Directory custom domain, a PFX certificate for the custom domain, and an on-premises app to configure.
60
+
61
+
### Create and verify a custom domain
62
+
63
+
To create and verify a custom domain:
64
+
65
+
1. In Azure Active Directory, select **Custom domain names** in the left navigation, and then select **Add custom domain**.
66
+
1. Enter your custom domain name and select **Add Domain**.
67
+
1. On the domain page, copy the TXT record information for your domain.
68
+
1. Go to your domain registrar and create a new TXT record for your domain, based on your copied DNS information.
69
+
1. After you register the domain, on the domain's page in Azure Active Directory, select **Verify**. Once the domain status is **Verified**, you can use the domain across all your Azure AD configurations, including Application Proxy.
70
+
71
+
For more detailed instructions, see [Add your custom domain name using the Azure Active Directory portal](../fundamentals/add-custom-domain.md).
72
+
73
+
### Configure an app to use a custom domain
74
+
75
+
To publish your app through Application Proxy with a custom domain:
76
+
77
+
1. For a new app, in Azure Active Directory, select **Enterprise applications** in the left navigation, select **New application**, and then select **On-premises application**.
78
+
79
+
For an app already in **Enterprise applications**, select it from the list, and then select **Application proxy** in the left navigation.
80
+
81
+
1. On the **Application proxy** page, in the **Internal Url** field, enter the internal URL for your app.
82
+
83
+
1. In the **External Url** field, drop down the list and select the custom domain you want to use.
1. If the domain already has a certificate, the **Certificate** field displays the certificate information. Otherwise, select the **Certificate** field.
90
+
54
91

92
+
93
+
1. On the **SSL certificate** page, browse to and select your PFX certificate file. Enter the password for the certificate, and select **Upload Certificate**. For more information about certificates, see the [Certificates for custom domains](#certificates-for-custom-domains) section.
> A custom domain only needs its certificate uploaded once. After that, the uploaded certificate is applied automatically when you use the custom domain for other apps.
99
+
100
+
1. If you added a certificate, on the **Application proxy** page, select **Save**.
101
+
102
+
1. In the information bar on the **Application proxy** page, note the CNAME entry you need to add to your DNS zone.
103
+
104
+

105
+
106
+
1. Follow the instructions at [Manage DNS records and record sets by using the Azure portal](../../dns/dns-operations-recordsets-portal.md) to add a DNS record that redirects the new external URL to the *msappproxy.net* domain.
107
+
108
+
1. To check that the DNS record is configured correctly, use the [nslookup](https://social.technet.microsoft.com/wiki/contents/articles/29184.nslookup-for-beginners.aspx) command to confirm that your external URL is reachable and the *msapproxy.net* domain appears as an alias.
55
109
56
-
If you already uploaded a certificate for this domain, the Certificate field displays the certificate information.
110
+
Your application is now set up to use the custom domain. Be sure to assign users to your application before you test or release it.
57
111
58
-
6. Upload the PFX certificate and enter the password for the certificate.
59
-
7. Select **Save** to save your changes.
60
-
8. Add a [DNS record](../../dns/dns-operations-recordsets-portal.md) that redirects the new external URL to the msappproxy.net domain.
61
-
9. Check that the DNS record is configured correctly by using the [nslookup](https://social.technet.microsoft.com/wiki/contents/articles/29184.nslookup-for-beginners.aspx) command to see if your external URL is reachable and the msapproxy.net domain shows up as an alias.
112
+
To change the domain for an app, select a different domain from the dropdown list in **External URL** on the app's **Application proxy** page. Upload a certificate for the updated domain, if necessary, and update the DNS record. If you don't see the custom domain you want in the dropdown list in **External URL**, it might not be verified.
62
113
63
-
>[!TIP]
64
-
>You only need to upload one certificate per custom domain. Once you upload a certificate, you can choose the custom domain when you publish a new app and not have to do additional configuration except for the DNS record.
114
+
For more detailed instructions for Application Proxy, see [Tutorial: Add an on-premises application for remote access through Application Proxy in Azure Active Directory](application-proxy-add-on-premises-application.md).
65
115
66
-
## Manage certificates
116
+
## Certificates for custom domains
67
117
68
-
### Certificate format
69
-
There is no restriction on the certificate signature methods. Elliptic Curve Cryptography (ECC), Subject Alternative Name (SAN), and other common certificate types are all supported.
118
+
A certificate creates the secure SSL connection for your custom domain.
70
119
71
-
You can use a wildcard certificate as long as the wildcard matches the desired external URL.
120
+
### Certificate formats
72
121
73
-
The certificate must include the private key.
122
+
You must use a PFX certificate, to ensure all required intermediate certificates are included. The certificate must include the private key.
74
123
75
-
Certificates issued by your own public key infrastructure (PKI) can be used if the certificate chain is installed on your client devices. Intune can be used to deploy these certificates to managed devices. For non-managed devices these certificates must be manually installed.
124
+
There's no restriction on the certificate signature methods. Elliptic Curve Cryptography (ECC), Subject Alternative Name (SAN), and other common certificate types are supported.
76
125
77
-
### Changing the domain
78
-
All verified domains appear in the External URL dropdown list for your application. To change the domain, just update that field for the application. If the domain you want isn't in the list, [add it as a verified domain](../fundamentals/add-custom-domain.md). If you select a domain that doesn't have an associated certificate yet, follow steps 5-7 to add the certificate. Then, make sure you update the DNS record to redirect from the new external URL.
126
+
You can use wildcard certificates as long as the wildcard matches the external URL. You must use wildcard certificates for [wildcard applications](application-proxy-wildcard.md). If you want to use the certificate to also access subdomains, you must add the subdomain wildcards as subject alternative names in the same certificate. For example, a certificate for *\*.adventure-works.com* won't work for *\*.apps.adventure-works.com* unless you add *\*.apps.adventure-works.com* as a subject alternative name.
127
+
128
+
You can use certificates issued by your own public key infrastructure (PKI) if the certificate chain is installed on your client devices. Intune can deploy these certificates to managed devices. For non-managed devices, you must manually install these certificates.
129
+
130
+
It's not a good idea to use a private root CA. The private root CA would also need to be pushed to client machines, which introduces many challenges.
79
131
80
132
### Certificate management
81
-
You can use the same certificate for multiple applications unless the applications share an external host.
82
133
83
-
You get a warning when a certificate expires, telling you to upload another certificate through the portal. If the certificate is revoked, your users may see a security warning when accessing the application. We don’t perform revocation checks for certificates. To update the certificate for a given application, navigate to the application and follow steps 5-7 for configuring custom domains on published applications to upload a new certificate. If the old certificate is not being used by other applications, it is deleted automatically.
134
+
All certificate management is through the individual application pages. Go to the application's **Application proxy** page to access the **Certificate** field.
84
135
85
-
Currently all certificate management is through individual application pages so you need to manage certificates in the context of the relevant applications.
136
+
You can use the same certificate for multiple applications. If an uploaded certificate works with another application, it will be applied automatically. You won't be prompted to upload it again when you add or configure the app.
137
+
138
+
When a certificate expires, you get a warning telling you to upload another certificate. If the certificate is revoked, your users may see a security warning when accessing the app. To update the certificate for an app, navigate to the **Application proxy** page for the app, select **Certificate**, and upload a new certificate. If the old certificate isn't being used by other apps, it's deleted automatically.
86
139
87
140
## Next steps
88
141
*[Enable single sign-on](application-proxy-configure-single-sign-on-with-kcd.md) to your published apps with Azure AD authentication.
89
-
*[Enable Conditional Access](https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/technical-reference#cloud-apps-assignments) to your published apps.
90
-
*[Add your custom domain name to Azure AD](../fundamentals/add-custom-domain.md)
91
-
142
+
*[Enable Conditional Access](../conditional-access/technical-reference.md#cloud-apps-assignments) to your published apps.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/azure-ad-custom-roles-activate.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,9 @@ author: curtand
7
7
manager: mtillman
8
8
9
9
ms.assetid:
10
-
ms.service: role-based-access-control
10
+
ms.service: active-directory
11
11
ms.devlang: na
12
-
ms.topic: overview
12
+
ms.topic: article
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: identity
15
15
ms.date: 08/06/2019
@@ -30,7 +30,7 @@ Privileged Identity Management in Azure Active Directory (Azure AD) now supports
30
30
31
31
## Activate a role
32
32
33
-
When you need to activate an Azure AD custom role, request activation by selecting the My roles navigation option in PIM.
33
+
When you need to activate an Azure AD custom role, request activation by selecting the My roles navigation option in Privileged Identity Management.
34
34
35
35
1. Sign in to [the Azure portal](https://portal.azure.com).
36
36
1. Open Azure AD [Privileged Identity Management](https://portal.azure.com/?Microsoft_AAD_IAM_enableCustomRoleManagement=true&Microsoft_AAD_IAM_enableCustomRoleAssignment=true&feature.rbacv2roles=true&feature.rbacv2=true&Microsoft_AAD_RegisteredApps=demo#blade/Microsoft_Azure_PIMCommon/CommonMenuBlade/quickStart).
This article tells you how to use Privileged Identity Management (PIM) to create just-in-time and time-bound assignment to custom roles created for managing applications in the Azure Active Directory (Azure AD) administrative experience.
27
27
28
28
- For more information about creating custom roles to delegate application management in Azure AD, see [Custom administrator roles in Azure Active Directory (preview)](../users-groups-roles/roles-custom-overview.md).
29
-
- If you haven't used Privileged Identity Management yet, get more information at [Start using PIM](pim-getting-started.md).
30
-
- For information about how to grant another administrator access to manage Privileged Identity Management, see [Grant access to other administrators to manage PIM](pim-how-to-give-access-to-pim.md).
29
+
- If you haven't used Privileged Identity Management yet, get more information at [Start using Privileged Identity Management](pim-getting-started.md).
30
+
- For information about how to grant another administrator access to manage Privileged Identity Management, see [Grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md).
31
31
32
32
> [!NOTE]
33
33
> Azure AD custom roles are not integrated with the built-in directory roles during preview. Once the capability is generally available, role management will take place in the built-in roles experience.
0 commit comments