You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/includes/web-app-client-credentials.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,4 +72,8 @@ Instead of a client secret, you can provide a client certificate. The following
72
72
}
73
73
```
74
74
75
-
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.
75
+
> [!WARNING]
76
+
>
77
+
> If you forget to change the `Scopes` to an array, when you try to use the `IDownstreamApi` the scopes will appear null, and `IDownstreamApi` will attempt an anonymous (unauthenticated) call to the downstream API, which will result in a `401/unauthenticated`.
78
+
79
+
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/saml-claims-customization.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -210,10 +210,14 @@ When the following conditions occur after **Add** or **Run test** is selected, a
210
210
211
211
## Add the UPN claim to SAML tokens
212
212
213
-
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md), so you can't add it in the **Attributes & Claims** section. As a workaround, you can add it as an [optional claim](./optional-claims.md) through **App registrations**in the Azure portal.
213
+
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). If you have custom signing key configured, you can add it in the **Attributes & Claims**section.
214
214
215
+
In case there is no custom signing key configured, please refer to [SAML Restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). You can add it as an [optional claim](./optional-claims.md) through **App registrations** in the Azure portal.
216
+
215
217
Open the application in **App registrations**, select **Token configuration**, and then select **Add optional claim**. Select the **SAML** token type, choose **upn** from the list, and then click **Add** to add the claim to the token.
216
218
219
+
Customization done in the **Attributes & Claims** section can overwrite the optional claims in the **App Registration**.
220
+
217
221
## Emit claims based on conditions
218
222
219
223
You can specify the source of a claim based on user type and the group to which the user belongs.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/add-application-portal-setup-oidc-sso.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,18 +26,18 @@ It is recommended that you use a non-production environment to test the steps in
26
26
27
27
To configure OIDC-based SSO, you need:
28
28
29
-
- An Azure account with an active subscription.[Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
-
- One of the following roles: Global Administrator, or owner of the service principal.
29
+
- An Azure AD user account. If you don't already have one, you can[Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
31
31
32
32
## Add the application
33
33
34
34
When you add an enterprise application that uses the OIDC standard for SSO, you select a setup button. When you select the button, you complete the sign-up process for the application.
35
35
36
36
To configure OIDC-based SSO for an application:
37
37
38
-
1. Sign in to the [Azure portal](https://portal.azure.com)and sign in using one of the roles listed in the prerequisites.
39
-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The**All applications** pane opens and displays a list of the applications in your Azure AD tenant.
40
-
1. In the **Enterprise applications** pane, select **New application**.
38
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. In the **All applications** pane, select **New application**.
41
41
1. The **Browse Azure AD Gallery** pane opens and displays tiles for cloud platforms, on-premises applications, and featured applications. Applications listed in the **Featured applications** section have icons indicating whether they support federated SSO and provisioning. Search for and select the application. In this example, **SmartSheet** is being used.
42
42
1. Select **Sign-up**. Sign in with the user account credentials from Azure Active Directory. If you already have a subscription to the application, then user details and tenant information is validated. If the application is not able to verify the user, then it redirects you to sign up for the application service.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/certificate-signing-options.md
+13-6Lines changed: 13 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,15 +41,22 @@ Azure AD supports two signing algorithms, or secure hash algorithms (SHAs), to s
41
41
42
42
***SHA-1**. This algorithm is older, and it's treated as less secure than SHA-256. If an application supports only this signing algorithm, you can select this option in the **Signing Algorithm** drop-down list. Azure AD then signs the SAML response with the SHA-1 algorithm.
43
43
44
+
## Prerequisites
45
+
46
+
To change an application's SAML certificate signing options and the certificate signing algorithm, you need:
47
+
48
+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
49
+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
## Change certificate signing options and signing algorithm
47
54
48
-
To change an application's SAML certificate signing options and the certificate signing algorithm, select the application in question:
55
+
To change an application's SAML certificate signing options and the certificate signing algorithm:
49
56
50
-
1.In the [Azure portal](https://portal.azure.com), sign in to your account.
51
-
1. Browse to **Azure Active Directory** > **Enterprise applications**. A list of the enterprise applications in your account appears.
52
-
1.Select an application. An overview page for the application appears. In this example, the Salesforce application is used.
57
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1.Enter the name of the existing application in the search box, and then select the application from the search results. In this example, you use the Salesforce application.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/debug-saml-sso-issues.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,8 +32,8 @@ To download and install the My Apps Secure Sign-in Extension, use one of the fol
32
32
33
33
To test SAML-based single sign-on between Azure AD and a target application:
34
34
35
-
1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator or other administrator that is authorized to manage applications.
36
-
1.In the left navigation pane, select**Azure Active Directory**, and then select **Enterprise applications**.
35
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
36
+
1.Browse to **Identity** > **Applications** >**Enterprise applications** > **All applications**.
37
37
1. From the list of enterprise applications, select the application for which you want to test single sign-on, and then from the options on the left, select **Single sign-on**.
38
38
1. To open the SAML-based single sign-on testing experience, go to **Test single sign-on** (step 5). If the **Test** button is greyed out, you need to fill out and save the required attributes first in the **Basic SAML Configuration** section.
39
39
1. In the **Test single sign-on** page, use your corporate credentials to sign in to the target application. You can sign in as the current user or as a different user. If you sign in as a different user, a prompt asks you to authenticate.
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator for your directory.
39
-
1. Search for and select **Azure Active Directory**.
40
-
1. Select **Enterprise applications**.
38
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. Search for the application you want to disable a user from signing in, and select the application.
42
41
1. Select **Properties**.
43
42
1. Select **No** for **Enabled for users to sign-in?**.
@@ -49,11 +48,11 @@ To disable user sign-in, you need:
49
48
50
49
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
51
50
52
-
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER.
51
+
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
76
75
77
-
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`).
76
+
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`). You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
100
99
101
-
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)with one of the roles listed in the prerequisite section.
100
+
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
102
101
103
102
You need to consent to the `Application.ReadWrite.All` permission.
You can access the Azure portal to view the permissions granted to an app. You can revoke permissions granted by admins for your entire organization, and you can get contextual PowerShell scripts to perform other actions.
44
+
You can access the Microsoft Entra admin center to view the permissions granted to an app. You can revoke permissions granted by admins for your entire organization, and you can get contextual PowerShell scripts to perform other actions.
45
45
46
-
To revoke an application's permissions that have been granted for the entire organization:
46
+
To review an application's permissions that have been granted for the entire organization or to a specific user or group:
47
47
48
-
1. Sign in to the [Azure portal](https://portal.azure.com)using one of the roles listed in the prerequisites section.
49
-
1.Select **Azure Active Directory**, and then select **Enterprise applications**.
48
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. Select the application that you want to restrict access to.
51
51
1. Select **Permissions**.
52
-
1. The permissions listed in the **Admin consent** tab apply to your entire organization. Choose the permission you would like to remove, select the **...** control for that permission, and then choose **Revoke permission**.
53
-
54
-
To review an application's permissions:
55
-
56
-
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the roles listed in the prerequisites section.
57
-
1. Select **Azure Active Directory**, and then select **Enterprise applications**.
58
-
1. Select the application that you want to restrict access to.
59
-
1. Select **Permissions**. In the command bar, select **Review permissions**.
60
-

61
-
1. Give a reason for why you want to review permissions for the application by selecting any of the options listed after the question, **Why do you want to review permissions for this application?**
62
-
63
-
Each option generates PowerShell scripts that enable you to control user access to the application and to review permissions granted to the application. For information about how to control user access to an application, see [How to remove a user's access to an application](methods-for-removing-user-access.md)
52
+
1. To view permissions that apply to your entire organization, select the **Admin consent** tab. To view permissions granted to a specific user or group, select the **User consent** tab.
53
+
1. To view the details of a given permission, select the permission from the list. The **Permission Details** pane opens.
54
+
1. To revoke a given permission, choose the permission you would like to revoke, select the **...** control for that permission, and then choose **Revoke permission**.
64
55
65
56
:::zone-end
66
57
67
58
:::zone pivot="aad-powershell"
68
59
69
60
## Review and revoke permissions
70
61
71
-
Use the following Azure AD PowerShell script to revoke all permissions granted to an application.
62
+
Use the following Azure AD PowerShell script to revoke all permissions granted to an application. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application.
111
+
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)with one of the roles listed in the prerequisite section.
165
+
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
To review the admin consent requests and take action:
35
35
36
-
1. Sign in to the [Azure portal](https://portal.azure.com) as one of the registered reviewers of the admin consent workflow.
37
-
1. Search for and select **Azure Active Directory**.
38
-
1. From the navigation menu, select **Enterprise applications**.
36
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator) who is a designated reviewer.
37
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
39
38
1. Under **Activity**, select **Admin consent requests**.
40
39
1. Select **My Pending** tab to view and act on the pending requests.
41
40
1. Select the application that is being requested from the list.
0 commit comments