Skip to content

Commit d89b679

Browse files
authored
Merge pull request #69156 from MicrosoftDocs/master
Merge master to live 2:59 AM
2 parents 5fbca33 + a3cec04 commit d89b679

File tree

127 files changed

+674
-330
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

127 files changed

+674
-330
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"locale": "en-us",
99
"monikers": [],
1010
"moniker_ranges": [],
11-
"open_to_public_contributors": false,
11+
"open_to_public_contributors": true,
1212
"type_mapping": {
1313
"Conceptual": "Content",
1414
"ManagedReference": "Content",

articles/active-directory/conditional-access/technical-reference.md

Lines changed: 35 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 01/30/2019
16+
ms.date: 03/12/2019
1717
ms.author: markvi
1818
ms.reviewer: spunukol
1919

@@ -49,25 +49,43 @@ With conditional access policies, you control how your users access your [cloud
4949

5050
You can assign a conditional access policy to the following cloud apps from Microsoft:
5151

52-
- Azure Information Protection - [Learn more](/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)
53-
54-
- Azure RemoteApp
55-
56-
- Azure SQL Database - [Learn more](https://docs.microsoft.com/azure/sql-database/sql-database-conditional-access)
57-
58-
- Microsoft Dynamics 365
59-
60-
- Microsoft Office 365 Yammer
61-
62-
- Microsoft Office 365 Exchange Online
63-
64-
- Microsoft Office 365 SharePoint Online (includes OneDrive for Business and Project Online)
65-
66-
- Microsoft Power BI
6752

53+
- Azure Analysis Services
6854
- Azure DevOps
55+
- Azure SQL Database and Data Warehouse - [Learn more](https://docs.microsoft.com/azure/sql-database/sql-database-conditional-access)
56+
- Dynamics CRM Online
57+
- Microsoft Application Insights Analytics
58+
- Microsoft Azure Information Protection - [Learn more](https://docs.microsoft.com/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)
59+
- Microsoft Azure Management - [Learn more](https://docs.microsoft.com/azure/role-based-access-control/conditional-access-azure-management)
60+
- Microsoft Azure RemoteApp
61+
- Microsoft Azure Subscription Management
62+
- Microsoft Cloud App Security
63+
- Microsoft Commerce Tools Access Control Portal
64+
- Microsoft Commerce Tools Authentication Service
65+
- Microsoft Flow
66+
- Microsoft Forms
67+
- Microsoft Intune
68+
- Microsoft Intune Enrollment
69+
- Microsoft Planner
70+
- Microsoft Power BI
71+
- Microsoft PowerApps
72+
- Microsoft Search in Bing
73+
- Microsoft StaffHub
74+
- Microsoft Stream
75+
- Microsoft Teams
76+
- Office 365 Exchange Online
77+
- Office 365 SharePoint Online
78+
- Office 365 Yammer
79+
- Office Delve
80+
- Office Sway
81+
- Outlook Groups
82+
- Project Online
83+
- Skype for Business Online
84+
- Virtual Private Network (VPN)
85+
- Visual Studio App Center
86+
- Windows Defender ATP
87+
6988

70-
- Microsoft Teams
7189

7290

7391
### Other applications

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -286,7 +286,7 @@
286286
href: quickstart-v2-uwp.md
287287
- name: Windows Desktop .NET
288288
href: quickstart-v2-windows-desktop.md
289-
- name: .NET Core console (deamon)
289+
- name: .NET Core console (daemon)
290290
href: quickstart-v2-netcore-daemon.md
291291
- name: Service-to-service
292292
items:

articles/active-directory/develop/sample-v2-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The following samples illustrate web applications that sign in users. Some sampl
5959

6060
Platform | Only signs in users | Signs in users and calls Microsoft Graph
6161
-------- | ------------------- | ---------------------------------
62-
![ASP.NET Core](media/sample-v2-code/logo_NETcore.png)</p>ASP.NET Core 2.1 | [aspnetcore-webapp-openidconnect-v2](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2) | Same sample in the [aspnetcore2-2-signInAndCallGraph](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/aspnetcore2-2-signInAndCallGraph) branch
62+
![ASP.NET Core](media/sample-v2-code/logo_NETcore.png)</p>ASP.NET Core 2.1 | [ASP.NET Core WebApp signs-in users tutorial](https://aka.ms/aspnetcore-webapp-sign-in) | Same sample in the [ASP.NET Core Web App calls Microsoft Graph](https://aka.ms/aspnetcore-webapp-call-msgraph) phase
6363
![ASP.NET](media/sample-v2-code/logo_NETframework.png)</p> ASP.NET | [ASP.NET Quickstart](https://github.com/AzureAdQuickstarts/AppModelv2-WebApp-OpenIDConnect-DotNet) </p> [dotnet-webapp-openidconnect-v2](https://github.com/azure-samples/active-directory-dotnet-webapp-openidconnect-v2) | [dotnet-admin-restricted-scopes-v2](https://github.com/azure-samples/active-directory-dotnet-admin-restricted-scopes-v2) </p>[msgraph-training-aspnetmvcapp](https://github.com/microsoftgraph/msgraph-training-aspnetmvcapp)
6464
![Node.js](media/sample-v2-code/logo_nodejs.png) | | [Node.js Quickstart](https://github.com/azureadquickstarts/appmodelv2-webapp-openidconnect-nodejs)
6565
![Ruby](media/sample-v2-code/logo_ruby.png) | | [msgraph-training-rubyrailsapp](https://github.com/microsoftgraph/msgraph-training-rubyrailsapp)

articles/active-directory/manage-apps/application-proxy-add-on-premises-application.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 12/07/2018
11+
ms.date: 03/12/2019
1212
ms.author: celested
1313
ms.reviewer: japere
1414
ms.collection: M365-identity-device-management
@@ -35,17 +35,18 @@ To add an application to your tenant, you need:
3535
* An application administrator account.
3636

3737
### Windows server
38+
3839
To use Application Proxy, you need a Windows server running Windows Server 2012 R2 or later. You'll install the Application Proxy connector on the server. This connector server needs to connect to the Application Proxy services in Azure, and the on-premises applications that you plan to publish.
3940

4041
For high availability in your production environment, we recommend having more than one Windows server. For this tutorial, one Windows server is sufficient.
4142

42-
**Recommendations for the connector server**
43+
#### Recommendations for the connector server
4344

4445
1. Physically locate the connector server close to the application servers to optimize performance between the connector and the application. For more information, see [Network topology considerations](application-proxy-network-topology.md).
4546

4647
2. The connector server and the web applications servers should belong to the same Active Directory domain. Having the servers in the same domain is a requirement for using single sign-on (SSO) with Integrated Windows Authentication (IWA) and Kerberos Constrained Delegation (KCD). If the connector server and web application servers are in different Active Directory domains, you need to use resource-based delegation for single sign-on. For more information, see [KCD for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-with-kcd.md).
4748

48-
**Software requirements**
49+
#### Software requirements
4950

5051
The Windows connector server needs to have TLS 1.2 enabled before you install the Application Proxy connector. Existing connectors with versions below 1.5.612.0 will continue to work on prior versions of TLS until further notice.
5152

@@ -62,8 +63,8 @@ To enable TLS 1.2:
6263
6364
2. Restart the server
6465
65-
6666
## Prepare your on-premises environment
67+
6768
To prepare your environment for Azure AD Application Proxy, you first need to enable communication to Azure data centers. If there's a firewall in the path, make sure it's open so the connector can make HTTPS (TCP) requests to the Application Proxy.
6869
6970
### Open ports
@@ -92,6 +93,7 @@ Allow access to the following URLs:
9293
If your firewall or proxy allows DNS whitelisting, you can whitelist connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, you need to allow access to the [Azure DataCenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653). The IP ranges are updated each week.
9394
9495
## Install and register a connector
96+
9597
To use Application Proxy, you need to install a connector on each Windows server you choose to use with the Application Proxy service. The connector is an agent that manages the outbound connection from the on-premises application servers to Application Proxy in Azure AD. You can install a connector on servers that also have other authentication agents installed such as Azure AD Connect.
9698
9799
To install the connector:
@@ -117,12 +119,12 @@ For information about connectors, capacity planning, and how they stay up-to-dat
117119
118120
If you're using the Qlik Sense application, always install the latest connector. Qlik Sense uses WebSockets, which is only supported on connector versions 1.5.612.0 or later.
119121
120-
121122
## Verify the connector installed and registered correctly
122123
123124
You can use the Azure portal or your Windows server to confirm that a new connector installed correctly.
124125
125126
### Verify - Azure portal
127+
126128
To confirm the connector installed and registered correctly:
127129
128130
1. Sign in to your tenant directory in the [Azure portal](https://portal.azure.com).
@@ -134,6 +136,7 @@ To confirm the connector installed and registered correctly:
134136
For more help with installing a connector, see [Problems installing an Application Proxy Connector](application-proxy-connector-installation-problem.md).
135137
136138
### Verify - Windows server
139+
137140
To confirm the connector installed and registered correctly:
138141
139142
1. Open the Windows Services Manager by clicking the **Windows** key and entering *services.msc*.
@@ -160,7 +163,7 @@ Now that you've prepared your environment and installed a connector, you're read
160163
161164
4. In the **Add your own on-premises application** blade, provide the following information about your application:
162165
163-
![Configure your application](./media/application-proxy-publish-azure-portal/configure-app.png)
166+
![Configure your on-premises application](./media/application-proxy-add-on-premises-application/add-on-premises-app-with-application-proxy-updated.png)
164167
165168
| Field | Description |
166169
| :---- | :---------- |
@@ -181,15 +184,14 @@ Now that you've prepared your environment and installed a connector, you're read
181184
| **Translate URLs in Headers** | Keep this value as **Yes** unless your application required the original host header in the authentication request. |
182185
| **Translate URLs in Application Body** | Keep this value as **No** unless you have hardcoded HTML links to other on-premises applications, and don't use custom domains. For more information, see [Link translation with Application Proxy](application-proxy-configure-hard-coded-link-translation.md).<br><br>Set this value to **Yes** if you plan to monitor this application with Microsoft Cloud App Security (MCAS). For more information, see [Configure real-time application access monitoring with Microsoft Cloud App Security and Azure Active Directory](application-proxy-integrate-with-microsoft-cloud-application-security.md) |
183186
184-
185-
186187
6. Select **Add**.
187188
188189
## Test the application
189190
190191
You're ready to test the application is added correctly. In the following steps, you'll add a user account to the application, and try signing in.
191192
192193
### Add a user for testing
194+
193195
Before adding a user to the application, verify the user account already has permissions to access the application from inside the corporate network.
194196
195197
To add a test user:
@@ -218,6 +220,7 @@ To test sign-on to the application:
218220
For troubleshooting, see [Troubleshoot Application Proxy problems and error messages](application-proxy-troubleshoot.md).
219221
220222
## Next steps
223+
221224
In this tutorial, you prepared your on-premises environment to work with Application Proxy, and then installed and registered the Application Proxy connector. Next, you added an application to your Azure AD tenant. You verified that a user can sign on to the application by using an Azure AD account.
222225
223226
You did these things:
@@ -232,8 +235,3 @@ You're ready to configure the application for single sign-on. Use the following
232235
233236
> [!div class="nextstepaction"]
234237
>[Configure single sign-on](what-is-single-sign-on.md#choosing-a-single-sign-on-method)
235-
236-
237-
238-
239-

articles/active-directory/manage-apps/application-proxy-config-sso-how-to.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 10/22/2018
16+
ms.date: 03/12/2019
1717
ms.author: celested
18-
ms.reviewer: asteen
18+
ms.reviewer: japere, asteen
1919

2020
ms.collection: M365-identity-device-management
2121
---
@@ -40,11 +40,16 @@ Configure the specific type of single sign-on. The sign-on methods are classifie
4040

4141
- **Header-based Sign-On**: Header-based sign-on is enabled through a partnership and does require some additional configuration. For details on the partnership and step-by-step instructions for configuring single sign-on to an application that uses headers for authentication, see the [PingAccess for Azure AD documentation](application-proxy-configure-single-sign-on-with-ping-access.md).
4242

43-
Each of these options can be found by going to your application in “Enterprise Applications”, and opening the **Single Sign-On** page on the left menu. note that if your application was created in the old portal, you may not see all these options.
43+
- **SAML single sign-on**: With SAML single sign-on, Azure AD authenticates to the application by using the user's Azure AD account. Azure AD communicates the sign-on information to the application through a connection protocol. With SAML-based single sign-on, you can map users to specific application roles based on rules you define in your SAML claims. For information about setting up SAML single sign-on, see [SAML for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-on-premises-apps.md).
44+
45+
Each of these options can be found by going to your application in “Enterprise Applications”, and opening the **Single Sign-On** page on the left menu. Note that if your application was created in the old portal, you may not see all these options.
4446

4547
On this page, you also see one additional Sign-On option: Linked Sign-On. This option is also supported by Application Proxy. However, this option does not add single sign-on to the application. That said the application may already have single sign-on implemented using another service such as Active Directory Federation Services.
4648

4749
This option allows an admin to create a link to an application that users first land on when accessing the application. For example, if there is an application that is configured to authenticate users using Active Directory Federation Services 2.0, an administrator can use the “Linked Sign-On” option to create a link to it on the access panel.
4850

4951
## Next steps
50-
[Provide single sign-on to your apps with Application Proxy](application-proxy-configure-single-sign-on-with-kcd.md)
52+
- [Password vaulting for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-password-vaulting.md)
53+
- [Kerberos Constrained Delegation for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-with-kcd.md)
54+
- [Header-based authentication for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-with-ping-access.md)
55+
- [SAML for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-on-premises-apps.md).
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
title: SAML single sign-on for on-premises applications with Azure Active Directory Application Proxy (Preview) | Microsoft Docs
3+
description: Learn how to provide single sign-on for on-premises applications published through Application Proxy that are secured with SAML authentication.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: CelesteDG
7+
manager: mtillman
8+
9+
ms.service: active-directory
10+
ms.subservice: app-mgmt
11+
ms.workload: identity
12+
ms.tgt_pltfrm: na
13+
ms.devlang: na
14+
ms.topic: conceptual
15+
ms.date: 03/12/2019
16+
ms.author: celested
17+
ms.reviewer: japere
18+
ms.custom: it-pro
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# SAML single sign-on for on-premises applications with Application Proxy (Preview)
23+
24+
You can provide single sign-on (SSO) for on-premises applications published through Application Proxy that are secured with SAML authentication. With SAML single sign-on, Azure Active Directory (Azure AD) authenticates to the application by using the user's Azure AD account. Azure AD communicates the sign-on information to the application through a connection protocol. With SAML-based single sign-on, you can map users to specific application roles based on rules you define in your SAML claims.
25+
26+
The applications must be able to consume SAML tokens issued by **Azure Active Directory**.
27+
This configuration does not apply to applications using an on-premises identity provider. For these scenarios we recommend reviewing [Resources for migrating applications to Azure AD](migration-resources.md).
28+
29+
SAML SSO with Application Proxy also works with the SAML token encryption feature. For more info, see [Configure Azure AD SAML token encryption](howto-saml-token-encryption.md).
30+
31+
## Publish the on-premises application with Application Proxy
32+
33+
Before you can provide SSO for on-premises applications, make sure you have enabled Application Proxy and you have a connector installed. See [Add an on-premises application for remote access through Application Proxy in Azure AD](application-proxy-add-on-premises-application.md) to learn how.
34+
35+
Keep the following in mind when you're going through the tutorial:
36+
37+
* Publish your application according to the instructions in the tutorial. Make sure to select **Azure Active Directory** as the **Pre Authentication** method for your application (step 4 in [Add an on-premises app to Azure AD](application-proxy-add-on-premises-application.md#add-an-on-premises-app-to-azure-ad
38+
)).
39+
* Copy the **External URL** for the application.
40+
* As a best practice, use custom domains whenever possible for an optimized user experience. Learn more about [Working with custom domains in Azure AD Application Proxy](application-proxy-configure-custom-domain.md).
41+
* Add at least one user to the application and make sure the test account has access to the on-premises application.
42+
43+
## Set up SAML SSO
44+
45+
1. In the Azure portal, select **Azure Active Directory > Enterprise applications** and select the application from the list.
46+
1. From the app's **Overview** page, select **Single sign-on**.
47+
1. Select **SAML** as the single sign-on method.
48+
1. In the **Set up Single Sign-On with SAML** page, edit the **Basic SAML Configuration** data and follow the steps in [Enter basic SAML configuration](configure-single-sign-on-non-gallery-applications.md#saml-based-single-sign-on) to configure SAML-based authentication for the application.
49+
50+
* Make sure the **Reply URL** root matches or is a path under the **External URL** for the on-premises application that you added for remote access through Application Proxy in Azure AD.
51+
52+
![Enter basic SAML configuration data](./media/application-proxy-configure-single-sign-on-on-premises-apps/basic-saml-configuration.png)
53+
54+
> [!NOTE]
55+
> If the backend application expects the **Reply URL** to be the internal URL, you'll need to install the My Apps secure sign-in extension on users' devices. This extension will automatically redirect to the appropriate Application Proxy Service. To install the extension, see [My Apps secure sign-in extension](../user-help/active-directory-saas-access-panel-introduction.md#my-apps-secure-sign-in-extension).
56+
57+
## Test your app
58+
59+
When you've completed all these steps, your app should be up and running. To test the app:
60+
61+
1. Open a browser and navigate to the external URL that you created when you published the app.
62+
1. Sign in with the test account that you assigned to the app.
63+
64+
## Next steps
65+
66+
- [How does Azure AD Application Proxy provide single sign-on?](application-proxy-single-sign-on.md)
67+
- [Troubleshoot Application Proxy](application-proxy-troubleshoot.md)
Loading
Loading
Loading

0 commit comments

Comments
 (0)