Skip to content

Commit cecea71

Browse files
committed
sso refresh
1 parent 218e21a commit cecea71

File tree

2 files changed

+23
-24
lines changed

2 files changed

+23
-24
lines changed

articles/active-directory/manage-apps/add-application-portal-setup-sso.md

Lines changed: 18 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
---
2-
title: 'Quickstart: Enable single sign-on for an enterprise application'
2+
title: Enable single sign-on for an enterprise application
33
description: Enable single sign-on for an enterprise application in Azure Active Directory.
44
services: active-directory
5-
author: davidmu1
5+
author: omondiatieno
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
9-
ms.topic: quickstart
9+
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 09/21/2021
12-
ms.author: davidmu
11+
ms.date: 09/29/2022
12+
ms.author: jomondi
1313
ms.reviewer: ergleenl
1414
ms.custom: contperf-fy22q2, mode-other
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to enable single sign-on for an enterprise application.
1616
---
1717

18-
# Quickstart: Enable single sign-on for an enterprise application
18+
# Enable single sign-on for an enterprise application
1919

20-
In this quickstart, you use the Azure Active Directory Admin Center to enable single sign-on (SSO) for an enterprise application that you added to your Azure Active Directory (Azure AD) tenant. After you configure SSO, your users can sign in by using their Azure AD credentials.
20+
In this article, you use the Azure Active Directory Admin Center to enable single sign-on (SSO) for an enterprise application that you added to your Azure Active Directory (Azure AD) tenant. After you configure SSO, your users can sign in by using their Azure AD credentials.
2121

22-
Azure AD has a gallery that contains thousands of pre-integrated applications that use SSO. This quickstart uses an enterprise application named **Azure AD SAML Toolkit** as an example, but the concepts apply for most pre-configured enterprise applications in the gallery.
22+
Azure AD has a gallery that contains thousands of pre-integrated applications that use SSO. This article uses an enterprise application named **Azure AD SAML Toolkit 1** as an example, but the concepts apply for most pre-configured enterprise applications in the gallery.
2323

24-
It is recommended that you use a non-production environment to test the steps in this quickstart.
24+
It is recommended that you use a non-production environment to test the steps in this article.
2525

2626
## Prerequisites
2727

@@ -39,7 +39,7 @@ To enable SSO for an application:
3939
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to use. For example, **Azure AD SAML Toolkit 1**.
4040
1. In the **Manage** section of the left menu, select **Single sign-on** to open the **Single sign-on** pane for editing.
4141
1. Select **SAML** to open the SSO configuration page. After the application is configured, users can sign in to it by using their credentials from the Azure AD tenant.
42-
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit** are listed in this quickstart.
42+
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the **configuration guide** link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit 1** are listed in this article.
4343

4444
:::image type="content" source="media/add-application-portal-setup-sso/saml-configuration.png" alt-text="Configure single sign-on for an enterprise application.":::
4545

@@ -55,7 +55,7 @@ To configure SSO in Azure AD:
5555
1. For **Reply URL (Assertion Consumer Service URL)**, enter `https://samltoolkit.azurewebsites.net/SAML/Consume`.
5656
1. For **Sign on URL**, enter `https://samltoolkit.azurewebsites.net/`.
5757
1. Select **Save**.
58-
1. In the **SAML Signing Certificate** section, select **Download** for **Certificate (Raw)** to download the SAML signing certificate and save it to be used later.
58+
1. In the **SAML Certificates** section, select **Download** for **Certificate (Raw)** to download the SAML signing certificate and save it to be used later.
5959

6060
## Configure single sign-on in the application
6161

@@ -70,15 +70,15 @@ To register a user account with the application:
7070

7171
:::image type="content" source="media/add-application-portal-setup-sso/toolkit-register.png" alt-text="Register a user account in the Azure AD SAML Toolkit application.":::
7272

73-
1. For **Email**, enter the email address of the user that will access the application. For example, in a previous quickstart, the user account was created that uses the address of `[email protected]`. Be sure to change `contoso.com` to the domain of your tenant.
73+
1. For **Email**, enter the email address of the user that will access the application. Ensure that the user account is already assigned to the application.
7474
1. Enter a **Password** and confirm it.
7575
1. Select **Register**.
7676

7777
### Configure SAML settings
7878

79-
To configure SAML setting for the application:
79+
To configure SAML settings for the application:
8080

81-
1. Signed in with the credentials of the user account that you created, select **SAML Configuration** at the upper-left corner of the page.
81+
1. Signed in with the credentials of the user account that you already assigned to the application, select **SAML Configuration** at the upper-left corner of the page.
8282
1. Select **Create** in the middle of the page.
8383
1. For **Login URL**, **Azure AD Identifier**, and **Logout URL**, enter the values that you recorded earlier.
8484
1. Select **Choose file** to upload the certificate that you previously downloaded.
@@ -102,15 +102,12 @@ You can test the single sign-on configuration from the **Set up single sign-on**
102102

103103
To test SSO:
104104

105-
1. In the **Test single sign-on with Azure AD SAML Toolkit 1** section, on the **Set up single sign-on** pane, select **Test**.
105+
1. In the **Test single sign-on with Azure AD SAML Toolkit 1** section, on the **Set up single sign-on with SAML** pane, select **Test**.
106106
1. Sign in to the application using the Azure AD credentials of the user account that you assigned to the application.
107107

108-
## Clean up resources
109-
110-
If you are planning to complete the next quickstart, keep the enterprise application that you created. Otherwise, you can consider deleting it to clean up your tenant.
111108

112109
## Next steps
113110

114-
Learn how to configure the properties of an enterprise application.
115-
> [!div class="nextstepaction"]
116-
> [Configure an application](add-application-portal-configure.md)
111+
- [Manage self service access](manage-self-service-access.md)
112+
- [Configure user consent](configure-user-consent?tabs=azure-portal)
113+
- [Grant tenant-wide admin consent](grant-admin-consent.md)

articles/active-directory/manage-apps/toc.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -212,11 +212,13 @@
212212
href: silverfort-azure-ad-integration.md
213213
- name: Single sign-on
214214
items:
215-
- name: Linked
215+
- name: Enable single sign-on with SAML
216+
href: add-application-portal-setup-oidc-sso.md
217+
- name: Enable Linked based single sign-on
216218
href: configure-linked-sign-on.md
217-
- name: OpenID Connect
219+
- name: Enable OpenID Connect based single sign-on
218220
href: add-application-portal-setup-oidc-sso.md
219-
- name: Password
221+
- name: Enable Password based single sign-on
220222
href: configure-password-single-sign-on-non-gallery-applications.md
221223
- name: Troubleshoot
222224
items:

0 commit comments

Comments
 (0)