Skip to content

Commit ccbd777

Browse files
Merge pull request #231446 from Gargi-Sinha/patch-170
Update plan-sso-deployment.md
2 parents d961b1d + e73ee22 commit ccbd777

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/manage-apps/plan-sso-deployment.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 12/07/2022
11+
ms.date: 03/20/2023
1212
ms.author: jomondi
1313
ms.reviewer: alamaral
1414
ms.collection: M365-identity-device-management
@@ -21,10 +21,10 @@ ms.custom: has-adal-ref
2121
This article provides information that you can use to plan your [single sign-on (SSO)](what-is-single-sign-on.md) deployment in Azure Active Directory (Azure AD). When you plan your SSO deployment with your applications in Azure AD, you need to consider the following questions:
2222

2323
- What are the administrative roles required for managing the application?
24-
- Does the certificate need to be renewed?
24+
- Does the Security Assertion Markup Language (SAML) application certificate need to be renewed?
2525
- Who needs to be notified of changes related to the implementation of SSO?
2626
- What licenses are needed to ensure effective management of the application?
27-
- Are shared user accounts used to access the application?
27+
- Are shared and guest user accounts used to access the application?
2828
- Do I understand the options for SSO deployment?
2929

3030
## Administrative Roles
@@ -33,17 +33,17 @@ Always use the role with the fewest permissions available to accomplish the requ
3333

3434
| Persona | Roles | Azure AD role (if necessary) |
3535
| ------- | ----- | --------------------------- |
36-
| Help desk admin | Tier 1 support | None |
37-
| Identity admin | Configure and debug when issues involve Azure AD | Global Administrator |
36+
| Help desk admin | Tier 1 support view the sign-in logs to resolve issues. | None |
37+
| Identity admin | Configure and debug when issues involve Azure AD | Cloud Application Administrator |
3838
| Application admin | User attestation in application, configuration on users with permissions | None |
39-
| Infrastructure admins | Certificate rollover owner | Global Administrator |
39+
| Infrastructure admins | Certificate rollover owner | Cloud Application Administrator |
4040
| Business owner/stakeholder | User attestation in application, configuration on users with permissions | None |
4141

4242
To learn more about Azure AD administrative roles, see [Azure AD built-in roles](../users-groups-roles/directory-assign-admin-roles.md).
4343

4444
## Certificates
4545

46-
When you enable federated SSO for your application, Azure AD creates a certificate that is by default valid for three years. You can customize the expiration date for that certificate if needed. Ensure that you have processes in place to renew certificates prior to their expiration.
46+
When you enable federation on SAML application, Azure AD creates a certificate that is by default valid for three years. You can customize the expiration date for that certificate if needed. Ensure that you have processes in place to renew certificates prior to their expiration.
4747

4848
You change that certificate duration in the Azure portal. Make sure to document the expiration and know how you'll manage your certificate renewal. It’s important to identify the right roles and email distribution lists involved with managing the lifecycle of the signing certificate. The following roles are recommended:
4949

0 commit comments

Comments
 (0)