You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/howto-enforce-signed-saml-authentication.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,45 +33,45 @@ If enabled Azure Active Directory will validate the requests against the public
33
33
34
34
1. Inside the Azure portal, navigate to **Azure Active Directory** from the Search bar or Azure Services.
35
35
36
-

36
+

37
37
38
38
2. Navigate to **Enterprise applications** from the left menu.
39
39
40
-

40
+

41
41
42
42
3. Select the application you wish to apply the changes.
43
43
44
44
4. Navigate to **Single sign-on.**
45
45
46
46
5. In the **Single sign-on** screen, there's a new subsection called **Verification certificates** under **SAML Certificates.**
47
47
48
-

48
+

49
49
50
50
6. Click on **Edit.**
51
51
52
52
7. In the new blade, you'll be able to enable the verification of signed requests and opt-in for weak algorithm verification in case your application still uses RSA-SHA1 to sign the authentication requests.
53
53
54
54
8. To enable the verification of signed requests, click **Enable verification certificates** and upload a verification public key that matches with the private key used to sign the request.
55
55
56
-

56
+

57
57
58
-

58
+

59
59
60
-

60
+

61
61
62
62
9. Once you have your verification certificate uploaded, click **Save.**
63
63
64
-

64
+

65
65
66
-

66
+

67
67
68
68
10. When the verification of signed requests is enabled, the test experience is disabled as the requests requires to be signed by the service provider.
69
69
70
-

70
+

71
71
72
72
11. If you want to see the current configuration of an enterprise application, you can navigate to the **Single Sign-on** screen and see the summary of your configuration under **SAML Certificates**. There you'll be able to see if the verification of signed requests is enabled and the count of Active and Expired verification certificates.
73
73
74
-

74
+

0 commit comments