Skip to content

Commit d957747

Browse files
[msid][content-health][freshness] msal-android-single-sign-on
1 parent a1aee1e commit d957747

File tree

1 file changed

+15
-12
lines changed

1 file changed

+15
-12
lines changed

articles/active-directory/develop/msal-android-single-sign-on.md

Lines changed: 15 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,6 @@ ms.devlang: java
1313
ms.topic: how-to
1414
ms.date: 10/15/2020
1515
ms.author: henrymbugua
16-
ms.reviewer: marsma
1716
---
1817

1918
# Enable cross-app SSO on Android using MSAL
@@ -28,8 +27,8 @@ In this how-to, you'll learn how to configure the SDKs used by your application
2827

2928
This how-to assumes you know how to:
3029

31-
- Provision your app using the Azure portal. For more information on this topic, see the instructions for creating an app in [the Android tutorial](./tutorial-v2-android.md#create-a-project)
32-
- Integrate your application with the [Microsoft Authentication Library for Android](https://github.com/AzureAD/microsoft-authentication-library-for-android).
30+
- Provision your app using the Azure portal. For more information about app provision, see the instructions for creating an app in [the Android tutorial](./tutorial-v2-android.md#create-a-project)
31+
- Integrate your application with the [MSAL for Android](https://github.com/AzureAD/microsoft-authentication-library-for-android)
3332

3433
## Methods for single sign-on
3534

@@ -39,13 +38,13 @@ There are two ways for applications using MSAL for Android to achieve SSO:
3938
* Through the [system browser](#sso-through-system-browser)
4039

4140

42-
It is recommended to use a broker application for benefits like device-wide SSO, account management, and conditional access. However, it requires your users to download additional applications.
41+
It's recommended to use a broker application for benefits like device-wide SSO, account management, and conditional access. However, it requires your users to download additional applications.
4342

4443
## SSO through brokered authentication
4544

46-
We recommend that you use one of Microsoft's authentication brokers to participate in device-wide single sign-on (SSO) and to meet organizational Conditional Access policies. Integrating with a broker provides the following benefits:
45+
We recommend that you use one of Microsoft's authentication brokers to participate in device-wide SSO and to meet organizational Conditional Access policies. Integrating with a broker provides the following benefits:
4746

48-
- Device single sign-on
47+
- Device SSO
4948
- Conditional Access for:
5049
- Intune App Protection
5150
- Device Registration (Workplace Join)
@@ -74,7 +73,7 @@ If a device doesn't already have a broker app installed, MSAL instructs the user
7473

7574
#### When a broker is installed
7675

77-
When a broker is installed on a device, all subsequent interactive token requests (calls to `acquireToken()`) are handled by the broker rather than locally by MSAL. Any SSO state previously available to MSAL is not available to the broker. As a result, the user will need to authenticate again, or select an account from the existing list of accounts known to the device.
76+
When a broker is installed on a device, all subsequent interactive token requests (calls to `acquireToken()`) are handled by the broker rather than locally by MSAL. Any SSO state previously available to MSAL isn't available to the broker. As a result, the user will need to authenticate again, or select an account from the existing list of accounts known to the device.
7877

7978
Installing a broker doesn't require the user to sign in again. Only when the user needs to resolve an `MsalUiRequiredException` will the next request go to the broker. `MsalUiRequiredException` can be thrown for several reasons, and needs to be resolved interactively. For example:
8079

@@ -86,7 +85,7 @@ Installing a broker doesn't require the user to sign in again. Only when the use
8685

8786
#### When a broker is uninstalled
8887

89-
If there is only one broker hosting app installed, and it is removed, then the user will need to sign in again. Uninstalling the active broker removes the account and associated tokens from the device.
88+
If there's only one broker hosting app installed, and it's removed, then the user will need to sign in again. Uninstalling the active broker removes the account and associated tokens from the device.
9089

9190
If Intune Company Portal is installed and is operating as the active broker, and Microsoft Authenticator is also installed, then if the Intune Company Portal (active broker) is uninstalled the user will need to sign in again. Once they sign in again, the Microsoft Authenticator app becomes the active broker.
9291

@@ -114,8 +113,12 @@ keytool -exportcert -alias androiddebugkey -keystore %HOMEPATH%\.android\debug.k
114113

115114
Once you've generated a signature hash with *keytool*, use the Azure portal to generate the redirect URI:
116115

117-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a> and select your Android app in **App registrations**.
118-
1. Select **Authentication** > **Add a platform** > **Android**.
116+
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
117+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="/azure/active-directory/develop/media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you registered your application.
118+
1. Search for and select **Azure Active Directory**.
119+
1. Under **Manage**, select **App registrations**.
120+
1. In **App registrations**, select your application.
121+
1. Under **Manage**, select **Authentication** > **Add a platform** > **Android**.
119122
1. In the **Configure your Android app** pane that opens, enter the **Signature hash** that you generated earlier and a **Package name**.
120123
1. Select the **Configure** button.
121124

@@ -157,7 +160,7 @@ You can remove the account from settings if you want to repeat the test.
157160

158161
## SSO through system browser
159162

160-
Android applications have the option to use the WebView, system browser, or Chrome Custom Tabs for authentication user experience. If the application is not using brokered authentication, it will need to use the system browser rather than the native webview in order to achieve SSO.
163+
Android applications have the option to use the WebView, system browser, or Chrome Custom Tabs for authentication user experience. If the application isn't using brokered authentication, it will need to use the system browser rather than the native webview in order to achieve SSO.
161164

162165
### Authorization agents
163166

@@ -173,7 +176,7 @@ By default, applications integrated with MSAL use the system browser's Custom Ta
173176

174177
If the application uses a `WebView` strategy without integrating Microsoft Authenticator or Company Portal support into their app, users won't have a single sign-on experience across the device or between native apps and web apps.
175178

176-
If the application uses MSAL with a broker like Microsoft Authenticator or Intune Company Portal, then users can have a SSO experience across applications if the they have an active sign-in with one of the apps.
179+
If the application uses MSAL with a broker like Microsoft Authenticator or Intune Company Portal, then users can have a SSO experience across applications if they have an active sign-in with one of the apps.
177180

178181
### WebView
179182

0 commit comments

Comments
 (0)