You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/debug-saml-sso-issues.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: app-mgmt
11
11
ms.topic: troubleshooting
12
12
ms.workload: identity
13
-
ms.date: 02/18/2019
13
+
ms.date: 05/27/2022
14
14
---
15
15
16
16
# Debug SAML-based single sign-on to applications
@@ -19,7 +19,7 @@ Learn how to find and fix [single sign-on](what-is-single-sign-on.md) issues for
19
19
20
20
## Before you begin
21
21
22
-
We recommend installing the [My Apps Secure Sign-in Extension](https://support.microsoft.com/account-billing/troubleshoot-problems-with-the-my-apps-portal-d228da80-fcb7-479c-b960-a1e2535cbdff#im-having-trouble-installing-the-my-apps-secure-sign-in-extension). This browser extension makes it easy to gather the SAML request and SAML response information that you need to resolving issues with single sign-on. In case you cannot install the extension, this article shows you how to resolve issues both with and without the extension installed.
22
+
We recommend installing the [My Apps Secure Sign-in Extension](https://support.microsoft.com/account-billing/troubleshoot-problems-with-the-my-apps-portal-d228da80-fcb7-479c-b960-a1e2535cbdff#im-having-trouble-installing-the-my-apps-secure-sign-in-extension). This browser extension makes it easy to gather the SAML request and SAML response information that you need to resolve issues with single sign-on. In case you can't install the extension, this article shows you how to resolve issues both with and without the extension installed.
23
23
24
24
To download and install the My Apps Secure Sign-in Extension, use one of the following links.
25
25
@@ -38,7 +38,7 @@ To test SAML-based single sign-on between Azure AD and a target application:
38
38
39
39

40
40
41
-
If you are successfully signed in, the test has passed. In this case, Azure AD issued a SAML response token to the application. The application used the SAML token to successfully sign you in.
41
+
If you're successfully signed in, the test has passed. In this case, Azure AD issued a SAML response token to the application. The application used the SAML token to successfully sign you in.
42
42
43
43
If you have an error on the company sign-in page or the application's page, use one of the next sections to resolve the error.
44
44
@@ -55,7 +55,7 @@ To debug this error, you need the error message and the SAML request. The My App
55
55
1. When an error occurs, the extension redirects you back to the Azure AD **Test single sign-on** blade.
56
56
1. On the **Test single sign-on** blade, select **Download the SAML request**.
57
57
1. You should see specific resolution guidance based on the error and the values in the SAML request.
58
-
1. You will see a **Fix it** button to automatically update the configuration in Azure AD to resolve the issue. If you don't see this button, then the sign-in issue is not due to a misconfiguration on Azure AD.
58
+
1. You'll see a **Fix it** button to automatically update the configuration in Azure AD to resolve the issue. If you don't see this button, then the sign-in issue isn't due to a misconfiguration on Azure AD.
59
59
60
60
If no resolution is provided for the sign-in error, we suggest that you use the feedback textbox to inform us.
61
61
@@ -66,29 +66,29 @@ If no resolution is provided for the sign-in error, we suggest that you use the
66
66
- A statement identifying the root cause of the problem.
67
67
1. Go back to Azure AD and find the **Test single sign-on** blade.
68
68
1. In the text box above **Get resolution guidance**, paste the error message.
69
-
1.Click**Get resolution guidance** to display steps for resolving the issue. The guidance might require information from the SAML request or SAML response. If you're not using the My Apps Secure Sign-in Extension, you might need a tool such as [Fiddler](https://www.telerik.com/fiddler) to retrieve the SAML request and response.
70
-
1. Verify that the destination in the SAML request corresponds to the SAML Single Sign-On Service URL obtained from Azure AD.
71
-
1. Verify the issuer in the SAML request is the same identifier you have configured for the application in Azure AD. Azure AD uses the issuer to find an application in your directory.
69
+
1.Select**Get resolution guidance** to display steps for resolving the issue. The guidance might require information from the SAML request or SAML response. If you're not using the My Apps Secure Sign-in Extension, you might need a tool such as [Fiddler](https://www.telerik.com/fiddler) to retrieve the SAML request and response.
70
+
1. Verify that the destination in the SAML request corresponds to the SAML Single Sign-on Service URL obtained from Azure AD.
71
+
1. Verify the issuer in the SAML request is the same identifier you've configured for the application in Azure AD. Azure AD uses the issuer to find an application in your directory.
72
72
1. Verify AssertionConsumerServiceURL is where the application expects to receive the SAML token from Azure AD. You can configure this value in Azure AD, but it's not mandatory if it's part of the SAML request.
73
73
74
74
## Resolve a sign-in error on the application page
75
75
76
-
You might sign in successfully and then see an error on the application's page. This occurs when Azure AD issued a token to the application, but the application does not accept the response.
76
+
You might sign in successfully and then see an error on the application's page. This occurs when Azure AD issued a token to the application, but the application doesn't accept the response.
77
77
78
78
To resolve the error, follow these steps, or watch this [short video about how to use Azure AD to troubleshoot SAML SSO](https://www.youtube.com/watch?v=poQCJK0WPUk&list=PLLasX02E8BPBm1xNMRdvP6GtA6otQUqp0&index=8):
79
79
80
80
1. If the application is in the Azure AD Gallery, verify that you've followed all the steps for integrating the application with Azure AD. To find the integration instructions for your application, see the [list of SaaS application integration tutorials](../saas-apps/tutorial-list.md).
81
81
1. Retrieve the SAML response.
82
-
- If the My Apps Secure Sign-in extension is installed, from the **Test single sign-on** blade, click**download the SAML response**.
83
-
- If the extension is not installed, use a tool such as [Fiddler](https://www.telerik.com/fiddler) to retrieve the SAML response.
82
+
- If the My Apps Secure Sign-in extension is installed, from the **Test single sign-on** blade, select**download the SAML response**.
83
+
- If the extension isn't installed, use a tool such as [Fiddler](https://www.telerik.com/fiddler) to retrieve the SAML response.
84
84
1. Notice these elements in the SAML response token:
85
85
- User unique identifier of NameID value and format
86
86
- Claims issued in the token
87
87
- Certificate used to sign the token.
88
88
89
89
For more information on the SAML response, see [Single Sign-on SAML protocol](../develop/single-sign-on-saml-protocol.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json).
90
90
91
-
1. Now that you have reviewed the SAML response, see [Error on an application's page after signing in](application-sign-in-problem-application-error.md) for guidance on how to resolve the problem.
91
+
1. Now that you've reviewed the SAML response, see [Error on an application's page after signing in](application-sign-in-problem-application-error.md) for guidance on how to resolve the problem.
92
92
1. If you're still not able to sign in successfully, you can ask the application vendor what is missing from the SAML response.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/review-admin-consent-requests.md
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: app-mgmt
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 03/22/2021
12
+
ms.date: 05/27/2022
13
13
ms.author: ergreenl
14
14
ms.reviewer: ergreenl
15
15
@@ -18,7 +18,7 @@ ms.reviewer: ergreenl
18
18
---
19
19
# Review admin consent requests
20
20
21
-
In this article, you learn how to review and take action on admin consent requests. To review and act on consent requests, you must be designated as a reviewer. As a reviewer, you only see admin consent requests that were created after you were designated as a reviewer.
21
+
In this article, you learn how to review and take action on admin consent requests. To review and act on consent requests, you must be designated as a reviewer. As a reviewer, you can view all admin consent requests but you can only act on those requests that were created after you were designated as a reviewer.
22
22
23
23
## Prerequisites
24
24
@@ -36,12 +36,20 @@ To review the admin consent requests and take action:
36
36
1. In the filter search box, type and select **Azure Active Directory**.
37
37
1. From the navigation menu, select **Enterprise applications**.
38
38
1. Under **Activity**, select **Admin consent requests**.
39
-
1. Select the application that is being requested.
40
-
1. Review details about the request:
39
+
1. Select **My Pending** tab to view and act on the pending requests.
40
+
1. Select the application that is being requested from the list.
41
+
1. Review details about the request:
42
+
- To view the application details, select the **App details** tab.
41
43
- To see who is requesting access and why, select the **Requested by** tab.
42
44
- To see what permissions are being requested by the application, select **Review permissions and consent**.
43
45
46
+
:::image type="content" source="media/configure-admin-consent-workflow/review-consent-requests.png" alt-text="Screenshot of the admin consent requests in the portal.":::
47
+
44
48
1. Evaluate the request and take the appropriate action:
45
49
-**Approve the request**. To approve a request, grant admin consent to the application. Once a request is approved, all requestors are notified that they have been granted access. Approving a request allows all users in your tenant to access the application unless otherwise restricted with user assignment.
46
-
-**Deny the request**. To deny a request, you must provide a justification that will be provided to all requestors. Once a request is denied, all requestors are notified that they have been denied access to the application. Denying a request won't prevent users from requesting admin consent to the app again in the future.
50
+
-**Deny the request**. To deny a request, you must provide a justification that will be provided to all requestors. Once a request is denied, all requestors are notified that they have been denied access to the application. Denying a request won't prevent users from requesting admin consent to the application again in the future.
47
51
-**Block the request**. To block a request, you must provide a justification that will be provided to all requestors. Once a request is blocked, all requestors are notified they've been denied access to the application. Blocking a request creates a service principal object for the application in your tenant in a disabled state. Users won't be able to request admin consent to the application in the future.
52
+
53
+
## Next steps
54
+
-[Review permissions granted to apps](manage-application-permissions.md)
# Tutorial: Manage certificates for federated single sign-on
21
21
22
-
In this article, we cover common questions and information related to certificates that Azure Active Directory (Azure AD) creates to establish federated single sign-on (SSO) to your software as a service (SaaS) applications. Add applications from the Azure AD app gallery or by using a non-gallery application template. Configure the application by using the federated SSO option.
22
+
In this article, we cover common questions and information related to certificates that Azure Active Directory (Azure AD) creates to establish federated single sign-on (SSO) to your software as a service (SaaS) applications. Add applications from the Azure AD application gallery or by using a non-gallery application template. Configure the application by using the federated SSO option.
23
23
24
24
This tutorial is relevant only to apps that are configured to use Azure AD SSO through [Security Assertion Markup Language](https://wikipedia.org/wiki/Security_Assertion_Markup_Language) (SAML) federation.
25
25
26
+
Using the information in this tutorial, an administrator of the application learns how to:
27
+
28
+
> [!div class="checklist"]
29
+
> * Generate certificates for gallery and non-gallery applications
30
+
> * Customize the expiration dates for certificates
31
+
> * Add email notification address for certificate expiration dates
32
+
> * Renew certificates
33
+
34
+
## Prerequisites
35
+
36
+
- An Azure account with an active subscription. If you don't already have one, [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
37
+
- One of the following roles: Global Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
38
+
- An enterprise application that has been configured in your Azure AD tenant.
39
+
40
+
26
41
## Auto-generated certificate for gallery and non-gallery applications
27
42
28
43
When you add a new application from the gallery and configure a SAML-based sign-on (by selecting **Single sign-on** > **SAML** from the application overview page), Azure AD generates a certificate for the application that is valid for three years. To download the active certificate as a security certificate (**.cer**) file, return to that page (**SAML-based sign-on**) and select a download link in the **SAML Signing Certificate** heading. You can choose between the raw (binary) certificate or the Base64 (base 64-encoded text) certificate. For gallery applications, this section might also show a link to download the certificate as federation metadata XML (an **.xml** file), depending on the requirement of the application.
@@ -75,7 +90,7 @@ Next, download the new certificate in the correct format, upload it to the appli
75
90
1. When you want to roll over to the new certificate, go back to the **SAML Signing Certificate** page, and in the newly saved certificate row, select the ellipsis (**...**) and select **Make certificate active**. The status of the new certificate changes to **Active**, and the previously active certificate changes to a status of **Inactive**.
76
91
1. Continue following the application's SAML sign-on configuration instructions that you displayed earlier, so that you can upload the SAML signing certificate in the correct encoding format.
77
92
78
-
If your application doesn't have any validation for the certificate's expiration, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Ensure your application can validate the certificate's expiration date.
93
+
If your application doesn't have any validation for the certificate's expiration, and the certificate matches in both Azure Active Directory and your application, your application is still accessible despite having an expired certificate. Ensure your application can validate the certificate's expiration date.
79
94
80
95
## Add email notification addresses for certificate expiration
81
96
@@ -101,15 +116,14 @@ If a certificate is about to expire, you can renew it using a procedure that res
101
116
1. In the newly saved certificate row, select the ellipsis (**...**) and then select **Make certificate active**.
102
117
1. Skip the next two steps.
103
118
104
-
1. If the app can only handle one certificate at a time, pick a downtime interval to perform the next step. (Otherwise, if the application doesn’t automatically pick up the new certificate but can handle more than one signing certificate, you can perform the next step anytime.)
105
-
1. Before the old certificate expires, follow the instructions in the [Upload and activate a certificate](#upload-and-activate-a-certificate) section earlier. If your application certificate isn't updated after a new certificate is updated in Azure Active Directory, authentication on your app may fail.
119
+
1. If the application can only handle one certificate at a time, pick a downtime interval to perform the next step. (Otherwise, if the application doesn’t automatically pick up the new certificate but can handle more than one signing certificate, you can perform the next step anytime.)
120
+
1. Before the old certificate expires, follow the instructions in the [Upload and activate a certificate](#upload-and-activate-a-certificate) section earlier. If your application certificate isn't updated after a new certificate is updated in Azure Active Directory, authentication on your application may fail.
106
121
1. Sign in to the application to make sure that the certificate works correctly.
107
122
108
-
If your application doesn't validate the certificate expiration configured in Azure Active Directory, and the certificate matches in both Azure Active Directory and your application, your app is still accessible despite having an expired certificate. Ensure your application can validate certificate expiration.
123
+
If your application doesn't validate the certificate expiration configured in Azure Active Directory, and the certificate matches in both Azure Active Directory and your application, your application is still accessible despite having an expired certificate. Ensure your application can validate certificate expiration.
109
124
110
125
## Related articles
111
126
112
-
-[Tutorials for integrating SaaS applications with Azure Active Directory](../saas-apps/tutorial-list.md)
113
127
-[Application management with Azure Active Directory](what-is-application-management.md)
114
128
-[Single sign-on to applications in Azure Active Directory](what-is-single-sign-on.md)
115
129
-[Debug SAML-based single sign-on to applications in Azure Active Directory](./debug-saml-sso-issues.md)
0 commit comments