Skip to content

Commit 895cfd0

Browse files
committed
troubleshoot SAML sso - UI updates
1 parent 2641dfd commit 895cfd0

File tree

1 file changed

+14
-22
lines changed

1 file changed

+14
-22
lines changed

articles/active-directory/manage-apps/troubleshoot-saml-based-sso.md

Lines changed: 14 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 07/11/2017
11+
ms.date: 09/07/2023
1212
ms.author: jomondi
1313
ms.reviewer: alamaral
1414
ms.custom: enterprise-apps
1515
---
1616

1717
# Troubleshoot SAML-based single sign-on
1818

19-
If you encounter a problem when configuring an application. Verify you have followed all the steps in the tutorial for the application. In the application’s configuration, you have inline documentation on how to configure the application. Also, you can access the [List of tutorials on how to integrate SaaS apps with Azure Active Directory](../saas-apps/tutorial-list.md) for a detail step-by-step guidance.
19+
If you encounter a problem when configuring an application, verify you have followed all the steps in the tutorial for the application. In the application’s configuration, you have inline documentation on how to configure the application. Also, you can access the [List of tutorials on how to integrate SaaS apps with Azure Active Directory](../saas-apps/tutorial-list.md) for a detail step-by-step guidance.
2020

2121
[!INCLUDE [portal updates](../includes/portal-update.md)]
2222

@@ -35,17 +35,13 @@ If you’re not able to configure the Identifier or the Reply URL, confirm the I
3535

3636
To know the patterns pre-configured for the application:
3737

38-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator** or **Co-admin.** Go to step 7. If you are already in the application configuration blade on Azure AD.
39-
2. Open the **Azure Active Directory Extension** by clicking **All services** at the top of the main left-hand navigation menu.
40-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
41-
4. click **Enterprise Applications** from the Azure Active Directory left-hand navigation menu.
42-
5. click **All Applications** to view a list of all your applications.
43-
- If you do not see the application you want show up here, use the **Filter** control at the top of the -**All Applications List** and set the **Show** option to **All Applications.**
44-
6. Select the application you want to configure single sign-on.
45-
7. Once the application loads, click the **Single sign-on** from the application’s left-hand navigation menu.
46-
8. Select **SAML-based Sign-on** from the **Mode** dropdown.
47-
9. Go to the **Identifier** or **Reply URL** textbox, under the **Domain and URLs section.**
48-
10. There are three ways to know the supported patterns for the application:
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator). Go to step 4. If you are already in the application configuration blade on Azure AD.
39+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
40+
1. Select the application you want to configure single sign-on.
41+
1. Once the application loads, select the **Single sign-on** from the application’s left-hand navigation menu.
42+
1. Select **SAML-based Sign-on** from the **Mode** dropdown.
43+
1. Go to the **Identifier** or **Reply URL** textbox, under the **Domain and URLs section.**
44+
1. There are three ways to know the supported patterns for the application:
4945
- In the textbox, you see the supported pattern(s) as a placeholder, for example: `https://contoso.com`.
5046
- if the pattern is not supported, you see a red exclamation mark when you try to enter the value in the textbox. If you hover your mouse over the red exclamation mark, you see the supported patterns.
5147
- In the tutorial for the application, you can also get information about the supported patterns. Under the **Configure Azure AD single sign-on** section. Go to the step for configured the values under the **Domain and URLs** section.
@@ -65,15 +61,11 @@ Azure AD select the format for the NameID attribute (User Identifier) based on t
6561

6662
To download the application metadata or certificate from Azure AD, follow these steps:
6763

68-
1. Open the [**Azure portal**](https://portal.azure.com/) and sign in as a **Global Administrator** or **Co-admin.**
69-
2. Open the **Azure Active Directory Extension** by clicking **All services** at the top of the main left-hand navigation menu.
70-
3. Type in **“Azure Active Directory**” in the filter search box and select the **Azure Active Directory** item.
71-
4. Select **Enterprise Applications** from the Azure Active Directory left-hand navigation menu.
72-
5. Select **All Applications** to view a list of all your applications.
73-
- If you do not see the application you want show up here, use the **Filter** control at the top of the **All Applications List** and set the **Show** option to **All Applications.**
74-
6. Select the application you have configured single sign-on.
75-
7. Once the application loads, click the **Single sign-on** from the application’s left-hand navigation menu.
76-
8. Go to **SAML Signing Certificate** section, then click **Download** column value. Depending on what the application requires configuring single sign-on, you see either the option to download the Metadata XML or the Certificate.
64+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
65+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
66+
1. Select the application you have configured single sign-on.
67+
1. Once the application loads, click the **Single sign-on** from the application’s left-hand navigation menu.
68+
1. Go to **SAML Signing Certificate** section, then click **Download** column value. Depending on what the application requires configuring single sign-on, you see either the option to download the Metadata XML or the Certificate.
7769

7870
Azure AD doesn’t provide a URL to get the metadata. The metadata can only be retrieved as a XML file.
7971

0 commit comments

Comments
 (0)