You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/configure-linked-sign-on.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,18 +31,18 @@ Some common scenarios where linked-based SSO is valuable include:
31
31
## Prerequisites
32
32
33
33
To configure linked-based SSO in your Azure AD tenant, you need:
34
-
-An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
35
-
-One of the following roles: Global Administrator, Application Administrator, or owner of the service principal.
36
-
-An application that supports linked-based SSO.
34
+
-An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
35
+
-One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
36
+
-An application that supports linked-based SSO.
37
37
38
38
## Configure linked-based single sign-on
39
39
40
-
1. Sign in to the [Azure portal](https://portal.azure.com)with the appropriate role.
41
-
2. Select **Azure Active Directory** in Azure Services, and then select **Enterprise applications**.
42
-
3. Search for and select the application that you want to add linked SSO.
43
-
4. Select **Single sign-on** and then select **Linked**.
44
-
5. Enter the URL for the sign-in page of the application.
45
-
6. Select **Save**.
40
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
0 commit comments