You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Microsoft Office 365 SharePoint Online (includes OneDrive for Business and Project Online)
65
-
66
-
- Microsoft Power BI
67
52
53
+
- Azure Analysis Services
68
54
- Azure DevOps
55
+
- Azure SQL Database and Data Warehouse - [Learn more](https://docs.microsoft.com/azure/sql-database/sql-database-conditional-access)
56
+
- Dynamics CRM Online
57
+
- Microsoft Application Insights Analytics
58
+
- Microsoft Azure Information Protection - [Learn more](https://docs.microsoft.com/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)
59
+
- Microsoft Azure Management - [Learn more](https://docs.microsoft.com/azure/role-based-access-control/conditional-access-azure-management)
</p>ASP.NET Core 2.1 | [aspnetcore-webapp-openidconnect-v2](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2) | Same sample in the [aspnetcore2-2-signInAndCallGraph](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/aspnetcore2-2-signInAndCallGraph) branch
62
+
</p>ASP.NET Core 2.1 | [ASP.NET Core WebApp signs-in users tutorial](https://aka.ms/aspnetcore-webapp-sign-in) | Same sample in the [ASP.NET Core Web App calls Microsoft Graph](https://aka.ms/aspnetcore-webapp-call-msgraph) phase
63
63
</p> ASP.NET | [ASP.NET Quickstart](https://github.com/AzureAdQuickstarts/AppModelv2-WebApp-OpenIDConnect-DotNet) </p> [dotnet-webapp-openidconnect-v2](https://github.com/azure-samples/active-directory-dotnet-webapp-openidconnect-v2) | [dotnet-admin-restricted-scopes-v2](https://github.com/azure-samples/active-directory-dotnet-admin-restricted-scopes-v2) </p>[msgraph-training-aspnetmvcapp](https://github.com/microsoftgraph/msgraph-training-aspnetmvcapp)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-add-on-premises-application.md
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-mgmt
9
9
ms.workload: identity
10
10
ms.topic: tutorial
11
-
ms.date: 12/07/2018
11
+
ms.date: 03/12/2019
12
12
ms.author: celested
13
13
ms.reviewer: japere
14
14
ms.collection: M365-identity-device-management
@@ -35,17 +35,18 @@ To add an application to your tenant, you need:
35
35
* An application administrator account.
36
36
37
37
### Windows server
38
+
38
39
To use Application Proxy, you need a Windows server running Windows Server 2012 R2 or later. You'll install the Application Proxy connector on the server. This connector server needs to connect to the Application Proxy services in Azure, and the on-premises applications that you plan to publish.
39
40
40
41
For high availability in your production environment, we recommend having more than one Windows server. For this tutorial, one Windows server is sufficient.
41
42
42
-
**Recommendations for the connector server**
43
+
#### Recommendations for the connector server
43
44
44
45
1. Physically locate the connector server close to the application servers to optimize performance between the connector and the application. For more information, see [Network topology considerations](application-proxy-network-topology.md).
45
46
46
47
2. The connector server and the web applications servers should belong to the same Active Directory domain. Having the servers in the same domain is a requirement for using single sign-on (SSO) with Integrated Windows Authentication (IWA) and Kerberos Constrained Delegation (KCD). If the connector server and web application servers are in different Active Directory domains, you need to use resource-based delegation for single sign-on. For more information, see [KCD for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-with-kcd.md).
47
48
48
-
**Software requirements**
49
+
#### Software requirements
49
50
50
51
The Windows connector server needs to have TLS 1.2 enabled before you install the Application Proxy connector. Existing connectors with versions below 1.5.612.0 will continue to work on prior versions of TLS until further notice.
51
52
@@ -62,8 +63,8 @@ To enable TLS 1.2:
62
63
63
64
2. Restart the server
64
65
65
-
66
66
## Prepare your on-premises environment
67
+
67
68
To prepare your environment for Azure AD Application Proxy, you first need to enable communication to Azure data centers. If there's a firewall in the path, make sure it's open so the connector can make HTTPS (TCP) requests to the Application Proxy.
68
69
69
70
### Open ports
@@ -92,6 +93,7 @@ Allow access to the following URLs:
92
93
If your firewall or proxy allows DNS whitelisting, you can whitelist connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, you need to allow access to the [Azure DataCenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653). The IP ranges are updated each week.
93
94
94
95
## Install and register a connector
96
+
95
97
To use Application Proxy, you need to install a connector on each Windows server you choose to use with the Application Proxy service. The connector is an agent that manages the outbound connection from the on-premises application servers to Application Proxy in Azure AD. You can install a connector on servers that also have other authentication agents installed such as Azure AD Connect.
96
98
97
99
To install the connector:
@@ -117,12 +119,12 @@ For information about connectors, capacity planning, and how they stay up-to-dat
117
119
118
120
If you're using the Qlik Sense application, always install the latest connector. Qlik Sense uses WebSockets, which is only supported on connector versions 1.5.612.0 or later.
119
121
120
-
121
122
## Verify the connector installed and registered correctly
122
123
123
124
You can use the Azure portal or your Windows server to confirm that a new connector installed correctly.
124
125
125
126
### Verify - Azure portal
127
+
126
128
To confirm the connector installed and registered correctly:
127
129
128
130
1. Sign in to your tenant directory in the [Azure portal](https://portal.azure.com).
@@ -134,6 +136,7 @@ To confirm the connector installed and registered correctly:
134
136
For more help with installing a connector, see [Problems installing an Application Proxy Connector](application-proxy-connector-installation-problem.md).
135
137
136
138
### Verify - Windows server
139
+
137
140
To confirm the connector installed and registered correctly:
138
141
139
142
1. Open the Windows Services Manager by clicking the **Windows** key and entering *services.msc*.
@@ -160,7 +163,7 @@ Now that you've prepared your environment and installed a connector, you're read
160
163
161
164
4. In the **Add your own on-premises application** blade, provide the following information about your application:
162
165
163
-

166
+

164
167
165
168
| Field | Description |
166
169
| :---- | :---------- |
@@ -181,15 +184,14 @@ Now that you've prepared your environment and installed a connector, you're read
181
184
| **Translate URLs in Headers** | Keep this value as **Yes** unless your application required the original host header in the authentication request. |
182
185
| **Translate URLs in Application Body** | Keep this value as **No** unless you have hardcoded HTML links to other on-premises applications, and don't use custom domains. For more information, see [Link translation with Application Proxy](application-proxy-configure-hard-coded-link-translation.md).<br><br>Set this value to **Yes** if you plan to monitor this application with Microsoft Cloud App Security (MCAS). For more information, see [Configure real-time application access monitoring with Microsoft Cloud App Security and Azure Active Directory](application-proxy-integrate-with-microsoft-cloud-application-security.md) |
183
186
184
-
185
-
186
187
6. Select **Add**.
187
188
188
189
## Test the application
189
190
190
191
You're ready to test the application is added correctly. In the following steps, you'll add a user account to the application, and try signing in.
191
192
192
193
### Add a user for testing
194
+
193
195
Before adding a user to the application, verify the user account already has permissions to access the application from inside the corporate network.
194
196
195
197
To add a test user:
@@ -218,6 +220,7 @@ To test sign-on to the application:
218
220
For troubleshooting, see [Troubleshoot Application Proxy problems and error messages](application-proxy-troubleshoot.md).
219
221
220
222
## Next steps
223
+
221
224
In this tutorial, you prepared your on-premises environment to work with Application Proxy, and then installed and registered the Application Proxy connector. Next, you added an application to your Azure AD tenant. You verified that a user can sign on to the application by using an Azure AD account.
222
225
223
226
You did these things:
@@ -232,8 +235,3 @@ You're ready to configure the application for single sign-on. Use the following
232
235
233
236
> [!div class="nextstepaction"]
234
237
>[Configure single sign-on](what-is-single-sign-on.md#choosing-a-single-sign-on-method)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-config-sso-how-to.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,9 +13,9 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: conceptual
16
-
ms.date: 10/22/2018
16
+
ms.date: 03/12/2019
17
17
ms.author: celested
18
-
ms.reviewer: asteen
18
+
ms.reviewer: japere, asteen
19
19
20
20
ms.collection: M365-identity-device-management
21
21
---
@@ -40,11 +40,16 @@ Configure the specific type of single sign-on. The sign-on methods are classifie
40
40
41
41
-**Header-based Sign-On**: Header-based sign-on is enabled through a partnership and does require some additional configuration. For details on the partnership and step-by-step instructions for configuring single sign-on to an application that uses headers for authentication, see the [PingAccess for Azure AD documentation](application-proxy-configure-single-sign-on-with-ping-access.md).
42
42
43
-
Each of these options can be found by going to your application in “Enterprise Applications”, and opening the **Single Sign-On** page on the left menu. note that if your application was created in the old portal, you may not see all these options.
43
+
-**SAML single sign-on**: With SAML single sign-on, Azure AD authenticates to the application by using the user's Azure AD account. Azure AD communicates the sign-on information to the application through a connection protocol. With SAML-based single sign-on, you can map users to specific application roles based on rules you define in your SAML claims. For information about setting up SAML single sign-on, see [SAML for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-on-premises-apps.md).
44
+
45
+
Each of these options can be found by going to your application in “Enterprise Applications”, and opening the **Single Sign-On** page on the left menu. Note that if your application was created in the old portal, you may not see all these options.
44
46
45
47
On this page, you also see one additional Sign-On option: Linked Sign-On. This option is also supported by Application Proxy. However, this option does not add single sign-on to the application. That said the application may already have single sign-on implemented using another service such as Active Directory Federation Services.
46
48
47
49
This option allows an admin to create a link to an application that users first land on when accessing the application. For example, if there is an application that is configured to authenticate users using Active Directory Federation Services 2.0, an administrator can use the “Linked Sign-On” option to create a link to it on the access panel.
48
50
49
51
## Next steps
50
-
[Provide single sign-on to your apps with Application Proxy](application-proxy-configure-single-sign-on-with-kcd.md)
52
+
-[Password vaulting for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-password-vaulting.md)
53
+
-[Kerberos Constrained Delegation for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-with-kcd.md)
54
+
-[Header-based authentication for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-with-ping-access.md)
55
+
-[SAML for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-on-premises-apps.md).
title: SAML single sign-on for on-premises applications with Azure Active Directory Application Proxy (Preview) | Microsoft Docs
3
+
description: Learn how to provide single sign-on for on-premises applications published through Application Proxy that are secured with SAML authentication.
4
+
services: active-directory
5
+
documentationcenter: ''
6
+
author: CelesteDG
7
+
manager: mtillman
8
+
9
+
ms.service: active-directory
10
+
ms.subservice: app-mgmt
11
+
ms.workload: identity
12
+
ms.tgt_pltfrm: na
13
+
ms.devlang: na
14
+
ms.topic: conceptual
15
+
ms.date: 03/12/2019
16
+
ms.author: celested
17
+
ms.reviewer: japere
18
+
ms.custom: it-pro
19
+
ms.collection: M365-identity-device-management
20
+
---
21
+
22
+
# SAML single sign-on for on-premises applications with Application Proxy (Preview)
23
+
24
+
You can provide single sign-on (SSO) for on-premises applications published through Application Proxy that are secured with SAML authentication. With SAML single sign-on, Azure Active Directory (Azure AD) authenticates to the application by using the user's Azure AD account. Azure AD communicates the sign-on information to the application through a connection protocol. With SAML-based single sign-on, you can map users to specific application roles based on rules you define in your SAML claims.
25
+
26
+
The applications must be able to consume SAML tokens issued by **Azure Active Directory**.
27
+
This configuration does not apply to applications using an on-premises identity provider. For these scenarios we recommend reviewing [Resources for migrating applications to Azure AD](migration-resources.md).
28
+
29
+
SAML SSO with Application Proxy also works with the SAML token encryption feature. For more info, see [Configure Azure AD SAML token encryption](howto-saml-token-encryption.md).
30
+
31
+
## Publish the on-premises application with Application Proxy
32
+
33
+
Before you can provide SSO for on-premises applications, make sure you have enabled Application Proxy and you have a connector installed. See [Add an on-premises application for remote access through Application Proxy in Azure AD](application-proxy-add-on-premises-application.md) to learn how.
34
+
35
+
Keep the following in mind when you're going through the tutorial:
36
+
37
+
* Publish your application according to the instructions in the tutorial. Make sure to select **Azure Active Directory** as the **Pre Authentication** method for your application (step 4 in [Add an on-premises app to Azure AD](application-proxy-add-on-premises-application.md#add-an-on-premises-app-to-azure-ad
38
+
)).
39
+
* Copy the **External URL** for the application.
40
+
* As a best practice, use custom domains whenever possible for an optimized user experience. Learn more about [Working with custom domains in Azure AD Application Proxy](application-proxy-configure-custom-domain.md).
41
+
* Add at least one user to the application and make sure the test account has access to the on-premises application.
42
+
43
+
## Set up SAML SSO
44
+
45
+
1. In the Azure portal, select **Azure Active Directory > Enterprise applications** and select the application from the list.
46
+
1. From the app's **Overview** page, select **Single sign-on**.
47
+
1. Select **SAML** as the single sign-on method.
48
+
1. In the **Set up Single Sign-On with SAML** page, edit the **Basic SAML Configuration** data and follow the steps in [Enter basic SAML configuration](configure-single-sign-on-non-gallery-applications.md#saml-based-single-sign-on) to configure SAML-based authentication for the application.
49
+
50
+
* Make sure the **Reply URL** root matches or is a path under the **External URL** for the on-premises application that you added for remote access through Application Proxy in Azure AD.
> If the backend application expects the **Reply URL** to be the internal URL, you'll need to install the My Apps secure sign-in extension on users' devices. This extension will automatically redirect to the appropriate Application Proxy Service. To install the extension, see [My Apps secure sign-in extension](../user-help/active-directory-saas-access-panel-introduction.md#my-apps-secure-sign-in-extension).
56
+
57
+
## Test your app
58
+
59
+
When you've completed all these steps, your app should be up and running. To test the app:
60
+
61
+
1. Open a browser and navigate to the external URL that you created when you published the app.
62
+
1. Sign in with the test account that you assigned to the app.
63
+
64
+
## Next steps
65
+
66
+
-[How does Azure AD Application Proxy provide single sign-on?](application-proxy-single-sign-on.md)
0 commit comments