You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-fed-group-claims.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,7 +104,7 @@ Groups assigned to the application will be included in the token. Other groups
104
104
105
105
To change the groups assigned to the application, select the application from the **Enterprise Applications** list and then click **Users and Groups** from the application’s left-hand navigation menu.
106
106
107
-
See the document [Methods for assigning users and groups to an app](../../active-directory/manage-apps/methods-for-assigning-users-and-groups.md#assign-groups) for details of managing group assignment to applications.
107
+
See the document [Assign a user or group to an enterprise app](../../active-directory/manage-apps/assign-user-or-group-access-portal.md) for details of managing group assignment to applications.
108
108
109
109
### Advanced options
110
110
@@ -219,6 +219,6 @@ To emit group names to be returned in netbiosDomain\samAccountName format as the
219
219
220
220
## Next steps
221
221
222
-
[Methods for assigning users and groups to an app](../../active-directory/manage-apps/methods-for-assigning-users-and-groups.md#assign-groups)
222
+
[Assign a user or group to an enterprise app](../../active-directory/manage-apps/assign-user-or-group-access-portal.md)
223
223
224
224
[Configure role claims](../../active-directory/develop/active-directory-enterprise-app-role-management.md)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/assign-user-or-group-access-portal.md
+61-30Lines changed: 61 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,54 +8,79 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 10/24/2019
11
+
ms.date: 02/21/2020
12
12
ms.author: mimart
13
13
ms.reviewer: luleon
14
14
ms.collection: M365-identity-device-management
15
15
---
16
16
17
17
# Assign a user or group to an enterprise app in Azure Active Directory
18
18
19
-
To assign a user or group to an enterprise app, you should have assigned any of these admin roles: global administrator, application administrator, cloud application administrator or be assigned as the owner of the enterprise app. For Microsoft Applications (such as Office 365 apps), use PowerShell to assign users to an enterprise app.
19
+
This article shows you how to assign users or groups to enterprise applications in Azure Active Directory (Azure AD), either from within the Azure portal or by using PowerShell. When you assign a user to an application, the application appears in the user's [My Apps access panel](https://myapps.microsoft.com/) for easy access. If the application exposes roles, you can also assign a specific role to the user.
20
+
21
+
For greater control, certain types of enterprise applications can be configured to [require user assignment](#configure-an-application-to-require-user-assignment).
22
+
23
+
To [assign a user or group to an enterprise app](#assign-users-or-groups-to-an-app-via-the-azure-portal), you'll need to sign in as a global administrator, application administrator, cloud application administrator, or the assigned owner of the enterprise app.
20
24
21
25
> [!NOTE]
22
-
> For licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
26
+
> Group-based assignment requires Azure Active Directory Premium P1 or P2 edition. Group-based assignment is supported for Security groups only. Nested group memberships and Office 365 groups are not currently supported. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
23
27
24
-
## Assign a user to an app - portal
28
+
## Configure an application to require user assignment
25
29
26
-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's a global admin for the directory.
27
-
1. Select **All services**, enter Azure Active Directory in the text box, and then select **Enter**.
28
-
1. Select **Enterprise applications**.
29
-
1. On the **Enterprise applications - All applications** pane, you see a list of the apps you can manage. Select an app.
30
-
1. On the ***appname*** pane (that is, the pane with the name of the selected app in the title), select **Users & Groups**.
31
-
1. On the ***appname*****- User and groups** pane, select **Add user**.
32
-
1. On the **Add Assignment** pane, select **Users and groups**.
30
+
With the following types of applications, you have the option of requiring users to be assigned to the application before they can access it:
33
31
34
-

32
+
- Applications configured for federated single sign-on (SSO) with SAML-based authentication
33
+
- Application Proxy applications that use Azure Active Directory Pre-Authentication
34
+
- Applications built on the Azure AD application platform that use OAuth 2.0 / OpenID Connect Authentication after a user or admin has consented to that application.
35
+
36
+
When user assignment is required, only those users you explicitly assign to the application will be able to sign in. They can access the app on their My Apps page or by using a direct link.
37
+
38
+
When assignment is *not required*, either because you've set this option to **No** or because the application uses another SSO mode, any user will be able to access the application if they have a direct link to the application or the **User Access URL** in the application’s **Properties** page.
39
+
40
+
This setting doesn't affect whether or not an application appears on the My Apps access panel. Applications appear on users' My Apps access panels once you've assigned a user or group to the application. For background, see [Managing access to apps](what-is-access-management.md).
41
+
42
+
43
+
To require user assignment for an application:
44
+
45
+
1. Sign in to the [Azure portal](https://portal.azure.com) with an administrator account or as an owner of the application.
46
+
47
+
2. Select **Azure Active Directory**. In the left navigation menu, select **Enterprise applications**.
35
48
36
-
1. On the **Users and groups** pane, select one or more users or groups from the list and then choose the **Select** button at the bottom of the pane.
37
-
1. On the **Add Assignment** pane, select **Role**. Then, on the **Select Role** pane, select a role to apply to the selected users or groups, then select **OK** at the bottom of the pane.
38
-
1. On the **Add Assignment** pane, select the **Assign** button at the bottom of the pane. The assigned users or groups have the permissions defined by the selected role for this enterprise app.
49
+
3. Select the application from the list. If you don't see the application, start typing its name in the search box. Or use the filter controls to select the application type, status, or visibility, and then select **Apply**.
39
50
40
-
## Allow all users to access an app - portal
51
+
4. In the left navigation menu, select **Properties**.
41
52
42
-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's a global admin for the directory.
43
-
1. Select **All services**, enter Azure Active Directory in the text box, and then select **Enter**.
44
-
1. Select **Enterprise applications**.
45
-
1. On the **Enterprise applications** pane, select **All applications**. This lists the apps you can manage.
46
-
1. On the **Enterprise applications - All applications** pane, select an app.
47
-
1. On the ***appname*** pane, select **Properties**.
48
-
1. On the ***appname* - Properties** pane, set the **User assignment required?** setting to **No**.
53
+
5. Make sure the **User assignment required?** toggle is set to **Yes**.
49
54
50
-
The **User assignment required?** option:
55
+
> [!NOTE]
56
+
> If the **User assignment required?** toggle isn't available, you can use PowerShell to set the appRoleAssignmentRequired property on the service principal.
57
+
58
+
6. Select the **Save** button at the top of the screen.
59
+
60
+
## Assign users or groups to an app via the Azure portal
61
+
62
+
1. Sign in to the [Azure portal](https://portal.azure.com) with a global administrator, application administrator, or cloud application administrator account, or as the assigned owner of the enterprise app.
63
+
2. Select **Azure Active Directory**. In the left navigation menu, select **Enterprise applications**.
64
+
3. Select the application from the list. If you don't see the application, start typing its name in the search box. Or use the filter controls to select the application type, status, or visibility, and then select **Apply**.
65
+
4. In the left navigation menu, select **Users and groups**.
66
+
> [!NOTE]
67
+
> If you want to assign users to Microsoft Applications such as Office 365 apps, some of the these apps use PowerShell.
68
+
5. Select the **Add user** button.
69
+
6. On the **Add Assignment** pane, select **Users and groups**.
70
+
7. Select the user or group you want to assign to the application, or start typing the name of the user or group in the search box. You can choose multiple users and groups, and your selections will appear under **Selected items**.
71
+
8. When finished, click **Select**.
51
72
52
-
- If this option is set to yes, then users must first be assigned to this application before being able to access it.
53
-
- If this option is set to no, then any users who navigate to the application deep-link URL or application URL directly will be granted access
54
-
- Doesn't affect whether or not an application appears on the application access panel. To show the application on the access panel, you need to assign an appropriate user or group to the application.
55
-
- Only functions with the cloud applications that are configured for SAML single sign-on, Application Proxy applications that use Azure Active Directory Pre-Authentication or applications built directly on the Azure AD application platform that use OAuth 2.0 / OpenID Connect Authentication after a user or admin has consented to that application. See [Single sign-on for applications](what-is-single-sign-on.md). See [Configure the way end-users consent to an application](configure-user-consent.md).
56
-
- This option has no effect when an application is configured for any of the other Single Sign-on modes.
73
+

74
+
75
+
9. On the **Users and groups** pane, select one or more users or groups from the list and then choose the **Select** button at the bottom of the pane.
76
+
10. If the application supports it, you can assign a role to the user or group. On the **Add Assignment** pane, choose **Select Role**. Then, on the **Select Role** pane, choose a role to apply to the selected users or groups, then select **OK** at the bottom of the pane.
77
+
78
+
> [!NOTE]
79
+
> If the application doesn't support role selection, the default access role is assigned. In this case, the application manages the level of access users have.
57
80
58
-
## Assign a user to an app - PowerShell
81
+
2. On the **Add Assignment** pane, select the **Assign** button at the bottom of the pane.
82
+
83
+
## Assign users or groups to an app via PowerShell
59
84
60
85
1. Open an elevated Windows PowerShell command prompt.
61
86
@@ -123,6 +148,12 @@ This example assigns the user Britta Simon to the [Microsoft Workplace Analytics
0 commit comments