You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This section describes how to configure enterprise application's SAML token encryption. Applications that have been set up from the **Enterprise applications** blade in the Azure portal, either from the Application Gallery or a Non-Gallery app. For applications registered through the **App registrations** experience, follow the [Configure registered application SAML token encryption](#configure-registered-application-saml-token-encryption) guidance.
44
+
This section describes how to configure enterprise application's SAML token encryption. Applications that have been set up from the **Enterprise applications** blade in the Microsoft Entra admin center, either from the Application Gallery or a Non-Gallery app. For applications registered through the **App registrations** experience, follow the [Configure registered application SAML token encryption](#configure-registered-application-saml-token-encryption) guidance.
38
45
39
46
To configure enterprise application's SAML token encryption, follow these steps:
40
47
@@ -48,59 +55,55 @@ To configure enterprise application's SAML token encryption, follow these steps:
48
55
49
56
1. Add the certificate to the application configuration in Azure AD.
50
57
51
-
### To configure token encryption in the Azure portal
52
-
53
-
You can add the public cert to your application configuration within the Azure portal.
58
+
### Configure token encryption in the Microsoft Entra admin center
54
59
55
-
1. Sign in to the [Azure portal](https://portal.azure.com).
56
-
57
-
1. Search for and select the **Azure Active Directory**.
58
-
59
-
1. Select **Enterprise applications** blade and then select the application that you wish to configure token encryption for.
60
+
You can add the public cert to your application configuration within the Microsoft Entra admin center.
60
61
62
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. Enter the name of the existing application in the search box, and then select the application from the search results.
61
65
1. On the application's page, select **Token encryption**.
62
66
63
-

67
+

64
68
65
69
> [!NOTE]
66
-
> The **Token encryption** option is only available for SAML applications that have been set up from the **Enterprise applications** blade in the Azure portal, either from the Application Gallery or a Non-Gallery app. For other applications, this menu option is disabled.
70
+
> The **Token encryption** option is only available for SAML applications that have been set up from the **Enterprise applications** blade in the Microsoft Entra admin center, either from the Application Gallery or a Non-Gallery app. For other applications, this menu option is disabled.
67
71
68
72
1. On the **Token encryption** page, select **Import Certificate** to import the .cer file that contains your public X.509 certificate.
69
73
70
-

74
+

71
75
72
76
1. Once the certificate is imported, and the private key is configured for use on the application side, activate encryption by selecting the **...** next to the thumbprint status, and then select **Activate token encryption** from the options in the dropdown menu.
73
77
74
78
1. Select **Yes** to confirm activation of the token encryption certificate.
75
79
76
80
1. Confirm that the SAML assertions emitted for the application are encrypted.
77
81
78
-
### To deactivate token encryption in the Azure portal
82
+
### To deactivate token encryption in the Microsoft Entra admin center
79
83
80
-
1. In the Azure portal, go to **Azure Active Directory > Enterprise applications**, and then select the application that has SAML token encryption enabled.
84
+
1. In the Microsoft Entra admin center, go to **Identity** > **Applications** > **Enterprise applications** > **All applications**, and then select the application that has SAML token encryption enabled.
81
85
82
86
1. On the application's page, select **Token encryption**, find the certificate, and then select the **...** option to show the dropdown menu.
This section describes how to configure registered application's SAML token encryption. Applications that have been set up from the **App registrations** blade in the Azure portal. For enterprise application, follow the [Configure enterprise application SAML token encryption](#configure-enterprise-application-saml-token-encryption) guidance.
92
+
This section describes how to configure registered application's SAML token encryption. Applications that have been set up from the **App registrations** blade in the Microsoft Entra admin center. For enterprise application, follow the [Configure enterprise application SAML token encryption](#configure-enterprise-application-saml-token-encryption) guidance.
89
93
90
94
Encryption certificates are stored on the application object in Azure AD with an `encrypt` usage tag. You can configure multiple encryption certificates and the one that's active for encrypting tokens is identified by the `tokenEncryptionKeyID` attribute.
91
95
92
-
You'll need the application's object ID to configure token encryption using Microsoft Graph API or PowerShell. You can find this value programmatically, or by going to the application's **Properties** page in the Azure portal and noting the **Object ID** value.
96
+
You'll need the application's object ID to configure token encryption using Microsoft Graph API or PowerShell. You can find this value programmatically, or by going to the application's **Properties** page in the Microsoft Entra admin center and noting the **Object ID** value.
93
97
94
98
When you configure a keyCredential using Graph, PowerShell, or in the application manifest, you should generate a GUID to use for the keyId.
95
99
96
-
To configure token encryption, follow these steps:
100
+
To configure token encryption for an application registration, follow these steps:
97
101
98
102
# [Portal](#tab/azure-portal)
99
103
100
-
1. From the Azure portal, go to **Azure Active Directory > App registrations**.
101
-
102
-
1. Select the **All apps** tab to show all apps, and then select the application that you want to configure.
103
-
104
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. Enter the name of the existing application in the search box, and then select the application from the search results.
104
107
1. In the application's page, select **Manifest** to edit the [application manifest](../develop/reference-app-manifest.md).
105
108
106
109
The following example shows an application manifest configured with two encryption certificates, and with the second selected as the active one using the tokenEncryptionKeyId.
@@ -174,7 +177,7 @@ To configure token encryption, follow these steps:
174
177
175
178
# [Azure AD PowerShell](#tab/azuread-powershell)
176
179
177
-
1. Use the latest Azure AD PowerShell module to connect to your tenant.
180
+
1. Use the latest Azure AD PowerShell module to connect to your tenant. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
178
181
179
182
1. Set the token encryption settings using the **[Set-AzureApplication](/powershell/module/azuread/set-azureadapplication?view=azureadps-2.0-preview&preserve-view=true)** command.
180
183
@@ -192,7 +195,7 @@ To configure token encryption, follow these steps:
1. Use the Microsoft Graph PowerShell module to connect to your tenant.
198
+
1. Use the Microsoft Graph PowerShell module to connect to your tenant. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
196
199
197
200
1. Set the token encryption settings using the **[Update-MgApplication](/powershell/module/microsoft.graph.applications/update-mgapplication?view=graph-powershell-1.0&preserve-view=true)** command.
0 commit comments