You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/howto-enforce-signed-saml-authentication.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,11 +50,9 @@ To configure SAML request signature verification, you need:
50
50
## Configure SAML Request Signature Verification
51
51
52
52
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. Enter the name of the existing application in the search box, and then select the application from the search results.
55
-
56
55
1. Navigate to **Single sign-on**.
57
-
58
56
1. In the **Single sign-on** screen, scroll to the subsection called **Verification certificates** under **SAML Certificates.**
59
57
60
58

Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/tutorial-manage-access-security.md
+13-14Lines changed: 13 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,9 +38,8 @@ Using the information in this tutorial, an administrator learns how to:
38
38
39
39
For the application that the administrator added to their tenant, they want to set it up so that all users in the organization can use it and not have to individually request consent to use it. To avoid the need for user consent, they can grant consent for the application on behalf of all users in the organization. For more information, see [Consent and permissions overview](./user-admin-consent-overview.md).
40
40
41
-
1. Sign in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites.
42
-
2. Search for and select **Azure Active Directory**.
43
-
3. Select **Enterprise applications**.
41
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
42
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
44
43
4. Select the application to which you want to grant tenant-wide admin consent.
45
44
5. Under **Security**, select **Permissions**.
46
45
6. Carefully review the permissions that the application requires. If you agree with the permissions the application requires, select **Grant admin consent**.
@@ -53,15 +52,15 @@ The administrator wants to make sure that only the people they assign to the app
53
52
54
53
It's easier for an administrator to manage access to the application by assigning all users of the application to a group. The administrator can then manage access at a group level.
55
54
56
-
1. In the left menu of the tenant overview, select **Groups**.
55
+
1. In the left menu of the tenant overview, select **Groups** > **All groups**.
57
56
1. Select **New group** at the top of the pane.
58
57
1. Enter *MFA-Test-Group* for the name of the group.
59
58
1. Select No members selected, and then choose the user account that you assigned to the application.
60
59
1. Select **Create**.
61
60
62
61
### Create a Conditional Access policy for the group
63
62
64
-
1. In the left menu of the tenant overview, select **Security**.
63
+
1. In the left menu of the tenant overview, select **Protection**.
65
64
1. Select **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
66
65
1. Enter a name for the policy, such as *MFA Pilot*.
67
66
1. Under **Assignments**, select **Users or workload identities**.
@@ -83,7 +82,7 @@ In this tutorial, the administrator can find the basic steps to configure the ap
83
82
### Test multi-factor authentication
84
83
85
84
1. Open a new browser window in InPrivate or incognito mode and browse to the URL of the application.
86
-
1. Sign in with the user account that you assigned to the application. You're required to register for and use Azure AD Multi-Factor Authentication. Follow the prompts to complete the process and verify you successfully sign in to the Azure portal.
85
+
1. Sign in with the user account that you assigned to the application. You're required to register for and use Azure AD Multi-Factor Authentication. Follow the prompts to complete the process and verify you successfully sign in to the Microsoft Entra admin center.
87
86
1. Close the browser window.
88
87
89
88
## Create a terms of use statement
@@ -104,7 +103,7 @@ Juan wants to make sure that certain terms and conditions are known to users bef
104
103
105
104
### Add the terms of use to the policy
106
105
107
-
1. In the left menu of the tenant overview, select **Security**.
106
+
1. In the left menu of the tenant overview, select **Protection**.
108
107
1. Select **Conditional Access**, and then **Policies**. From the list of policies, select the *MFA Pilot* policy.
109
108
1. Under **Access controls** and **Grant**, select the controls selected link.
110
109
1. Select *My TOU*.
@@ -120,10 +119,10 @@ The My Apps portal enables administrators and users to manage the applications u
120
119
121
120
By default, all applications are listed together on a single page. But you can use collections to group together related applications and present them on a separate tab, making them easier to find. For example, you can use collections to create logical groupings of applications for specific job roles, tasks, projects, and so on. In this section, you create a collection and assign it to users and groups.
122
121
123
-
1.Open the Azure portal.
124
-
1.Go to **Azure Active Directory**, and then select **Enterprise Applications**.
125
-
1. Under **Manage**, select **Collections**.
126
-
1. Select **New collection**. In the New collection page, enter a **Name** for the collection (it's recommended to not use "collection" in the name. Then enter a **Description**.
122
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
123
+
1.Browse to **Identity** > **Applications** > **Enterprise applications**.
124
+
1. Under **Manage**, select **App launchers** > **Collections**.
125
+
1. Select **New collection**. In the New collection page, enter a **Name** for the collection (it's recommended to not use "collection" in the name). Then enter a **Description**.
127
126
1. Select the **Applications** tab. Select **+ Add application**, and then in the Add applications page, select all the applications you want to add to the collection, or use the Search box to find applications.
128
127
1. When you're finished adding applications, select **Add**. The list of selected applications appears. You can use the arrows to change the order of applications in the list.
129
128
1. Select the **Owners** tab. Select **+ Add users and groups**, and then in the Add users and groups page, select the users or groups you want to assign ownership to. When you're finished selecting users and groups, choose **Select**.
@@ -150,14 +149,14 @@ You can keep the resources for future use, or if you're not going to continue to
150
149
### Delete the Conditional Access policy
151
150
152
151
1. Select **Enterprise applications**.
153
-
1. Under **Security**, select **Conditional Access**.
152
+
1. Under **Protection**, select **Conditional Access**.
154
153
1. Search for and select **MFA Pilot**.
155
154
1. Select **Delete** at the top of the pane.
156
155
157
156
### Delete the group
158
157
159
-
1. Select **Azure Active Directory**, and then select**Groups**.
160
-
1. From the **Groups - All groups** page, search for and select the **MFA-Test-Group** group.
158
+
1. Select **Identity** >**Groups**.
159
+
1. From the **All groups** page, search for and select the **MFA-Test-Group** group.
0 commit comments