Skip to content

Commit 9239439

Browse files
authored
Update migrate-adfs-apps-to-azure.md
1 parent d162033 commit 9239439

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory/manage-apps/migrate-adfs-apps-to-azure.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ Migration requires assessing how the application is configured on-premises, and
180180
The following table describes some of the most common mapping of settings between an AD FS Relying Party Trust to Azure AD Enterprise Application:
181181

182182
* AD FS—Find the setting in the AD FS Relying Party Trust for the app. Right-click the relying party and select Properties.
183-
* Azure AD—The setting is configured within [Azure portal](https://portal.azure.com/) in each application's SSO properties.
183+
* Azure AD—The setting is configured within [Entra portal](https://entra.microsoft.com/#home) in each application's SSO properties.
184184

185185
| Configuration setting| AD FS| How to configure in Azure AD| SAML Token |
186186
| - | - | - | - |
@@ -197,7 +197,7 @@ The following table describes some of the most common mapping of settings betwee
197197
Configure your applications to point to Azure AD versus AD FS for SSO. Here, we're focusing on SaaS apps that use the SAML protocol. However, this concept extends to custom line-of-business apps as well.
198198

199199
> [!NOTE]
200-
> The configuration values for Azure AD follows the pattern where your Azure Tenant ID replaces {tenant-id} and the Application ID replaces {application-id}. You find this information in the [Azure portal](https://portal.azure.com/) under **Azure Active Directory > Properties**:
200+
> The configuration values for Azure AD follows the pattern where your Azure Tenant ID replaces {tenant-id} and the Application ID replaces {application-id}. You find this information in the [Entra portal](https://entra.microsoft.com/#home) under **Azure Active Directory > Properties**:
201201
202202
* Select Directory ID to see your Tenant ID.
203203
* Select Application ID to see your Application ID.
@@ -219,7 +219,7 @@ SaaS apps need to know where to send authentication requests and how to validate
219219
| - | - | - |
220220
| **IdP Sign-on URL** <p>Sign-on URL of the IdP from the app's perspective (where the user is redirected for login).| The AD FS sign-on URL is the AD FS federation service name followed by "/adfs/ls/." <p>For example: `https://fs.contoso.com/adfs/ls/`| Replace {tenant-id} with your tenant ID. <p> ‎For apps that use the SAML-P protocol: [https://login.microsoftonline.com/{tenant-id}/saml2](https://login.microsoftonline.com/{tenant-id}/saml2) <p>‎For apps that use the WS-Federation protocol: [https://login.microsoftonline.com/{tenant-id}/wsfed](https://login.microsoftonline.com/{tenant-id}/wsfed) |
221221
| **IdP sign-out URL**<p>Sign-out URL of the IdP from the app's perspective (where the user is redirected when they choose to sign out of the app).| The sign-out URL is either the same as the sign-on URL, or the same URL with "wa=wsignout1.0" appended. For example: `https://fs.contoso.com/adfs/ls/?wa=wsignout1.0`| Replace {tenant-id} with your tenant ID.<p>For apps that use the SAML-P protocol:<p>[https://login.microsoftonline.com/{tenant-id}/saml2](https://login.microsoftonline.com/{tenant-id}/saml2) <p> ‎For apps that use the WS-Federation protocol: [https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0](https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0) |
222-
| **Token signing certificate**<p>The IdP uses the private key of the certificate to sign issued tokens. It verifies that the token came from the same IdP that the app is configured to trust.| Find the AD FS token signing certificate in AD FS Management under **Certificates**.| Find it in the Azure portal in the application's **Single sign-on properties** under the header **SAML Signing Certificate**. There, you can download the certificate for upload to the app. <p>‎If the application has more than one certificate, you can find all certificates in the federation metadata XML file. |
222+
| **Token signing certificate**<p>The IdP uses the private key of the certificate to sign issued tokens. It verifies that the token came from the same IdP that the app is configured to trust.| Find the AD FS token signing certificate in AD FS Management under **Certificates**.| Find it in the Entra portal in the application's **Single sign-on properties** under the header **SAML Signing Certificate**. There, you can download the certificate for upload to the app. <p>‎If the application has more than one certificate, you can find all certificates in the federation metadata XML file. |
223223
| **Identifier/ "issuer"**<p>Identifier of the IdP from the app's perspective (sometimes called the "issuer ID").<p>‎In the SAML token, the value appears as the Issuer element.| The identifier for AD FS is usually the federation service identifier in AD FS Management under **Service > Edit Federation Service Properties**. For example: `http://fs.contoso.com/adfs/services/trust`| Replace {tenant-id} with your tenant ID.<p>https:\//sts.windows.net/{tenant-id}/ |
224224
| **IdP federation metadata**<p>Location of the IdP's publicly available federation metadata. (Some apps use federation metadata as an alternative to the administrator configuring URLs, identifier, and token signing certificate individually.)| Find the AD FS federation metadata URL in AD FS Management under **Service > Endpoints > Metadata > Type: Federation Metadata**. For example: `https://fs.contoso.com/FederationMetadata/2007-06/FederationMetadata.xml`| The corresponding value for Azure AD follows the pattern [https://login.microsoftonline.com/{TenantDomainName}/FederationMetadata/2007-06/FederationMetadata.xml](https://login.microsoftonline.com/{TenantDomainName}/FederationMetadata/2007-06/FederationMetadata.xml). Replace {TenantDomainName} with your tenant's name in the format "contoso.onmicrosoft.com." <p>For more information, see [Federation metadata](../azuread-dev/azure-ad-federation-metadata.md). |
225225

@@ -260,7 +260,7 @@ Explicit group authorization in AD FS:
260260

261261
To map this rule to Azure AD:
262262

263-
1. In the [Azure portal](https://portal.azure.com/), [create a user group](../fundamentals/active-directory-groups-create-azure-portal.md) that corresponds to the group of users from AD FS.
263+
1. In the [Entra portal](https://entra.microsoft.com/#home), [create a user group](../fundamentals/active-directory-groups-create-azure-portal.md) that corresponds to the group of users from AD FS.
264264
1. Assign app permissions to the group:
265265

266266
![Add Assignment ](media/migrate-adfs-apps-to-azure/allow-a-group-explicitly-2.png)
@@ -273,7 +273,7 @@ Explicit user authorization in AD FS:
273273

274274
To map this rule to Azure AD:
275275

276-
* In the [Azure portal](https://portal.azure.com/), add a user to the app through the Add Assignment tab of the app as shown below:
276+
* In the [Entra portal](https://entra.microsoft.com/#home), add a user to the app through the Add Assignment tab of the app as shown below:
277277

278278
![My SaaS apps in Azure ](media/migrate-adfs-apps-to-azure/authorize-a-specific-user-2.png)
279279

@@ -285,7 +285,7 @@ The following are examples of types of MFA rules in AD FS, and how you can map t
285285

286286
MFA rule settings in AD FS:
287287

288-
![Screenshot shows Conditions for Azure A D in the Azure portal.](media/migrate-adfs-apps-to-azure/mfa-settings-common-for-all-examples.png)
288+
![Screenshot shows Conditions for Azure AD in the Entra portal.](media/migrate-adfs-apps-to-azure/mfa-settings-common-for-all-examples.png)
289289

290290
#### Example 1: Enforce MFA based on users/groups
291291

@@ -334,7 +334,7 @@ Emit attributes as Claims rule in AD FS:
334334

335335
To map the rule to Azure AD:
336336

337-
1. In the [Azure portal](https://portal.azure.com/), select **Enterprise Applications** and then **Single sign-on** to view the SAML-based sign-on configuration:
337+
1. In the [Entra portal](https://entra.microsoft.com/#home), select **Enterprise Applications** and then **Single sign-on** to view the SAML-based sign-on configuration:
338338

339339
![Screenshot shows the Single sign-on page for your Enterprise Application.](media/migrate-adfs-apps-to-azure/map-emit-attributes-as-claims-rule-2.png)
340340

@@ -361,7 +361,7 @@ In this table, we've listed some useful Permit and Except options and how they m
361361
| From Devices with Specific Trust Level| Set this from the **Device State** control under Assignments -> Conditions| Use the **Exclude** option under Device State Condition and Include **All devices** |
362362
| With Specific Claims in the Request| This setting can't be migrated| This setting can't be migrated |
363363

364-
Here's an example of how to configure the Exclude option for trusted locations in the Azure portal:
364+
Here's an example of how to configure the Exclude option for trusted locations in the Entra portal:
365365

366366
![Screenshot of mapping access control policies](media/migrate-adfs-apps-to-azure/map-built-in-access-control-policies-3.png)
367367

@@ -383,14 +383,14 @@ Your existing external users can be set up in these two ways in AD FS:
383383

384384
* **External users with a local account within your organization**—You continue to use these accounts in the same way that your internal user accounts work. These external user accounts have a principle name within your organization, although the account's email may point externally. As you progress with your migration, you can take advantage of the benefits that [Azure AD B2B](../external-identities/what-is-b2b.md) offers by migrating these users to use their own corporate identity when such an identity is available. This streamlines the process of signing in for those users, as they're often signed in with their own corporate logon. Your organization's administration is easier as well, by not having to manage accounts for external users.
385385
* **Federated external Identities**—If you are currently federating with an external organization, you have a few approaches to take:
386-
* [Add Azure Active Directory B2B collaboration users in the Azure portal](../external-identities/add-users-administrator.md). You can proactively send B2B collaboration invitations from the Azure AD administrative portal to the partner organization for individual members to continue using the apps and assets they're used to.
386+
* [Add Azure Active Directory B2B collaboration users in the Entra portal](../external-identities/add-users-administrator.md). You can proactively send B2B collaboration invitations from the Azure AD administrative portal to the partner organization for individual members to continue using the apps and assets they're used to.
387387
* [Create a self-service B2B sign-up workflow](../external-identities/self-service-portal.md) that generates a request for individual users at your partner organization using the B2B invitation API.
388388

389389
No matter how your existing external users are configured, they likely have permissions that are associated with their account, either in group membership or specific permissions. Evaluate whether these permissions need to be migrated or cleaned up. Accounts within your organization that represent an external user need to be disabled once the user has been migrated to an external identity. The migration process should be discussed with your business partners, as there may be an interruption in their ability to connect to your resources.
390390

391391
## Migrate and test your apps
392392

393-
Follow the migration process detailed in this article. Then go to the [Azure portal](https://portal.azure.com/) to test if the migration was a success.
393+
Follow the migration process detailed in this article. Then go to the [Entra portal](https://entra.microsoft.com/#home) to test if the migration was a success.
394394

395395
Follow these instructions:
396396

0 commit comments

Comments
 (0)