Skip to content

Commit dd644f4

Browse files
author
Ken Withee
committed
Updates admin center steps.
1 parent 8d3456c commit dd644f4

File tree

1 file changed

+13
-14
lines changed

1 file changed

+13
-14
lines changed

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 04/04/2022
11+
ms.date: 09/13/2023
1212
ms.author: kenwith
1313
ms.reviewer: ashishj
1414
---
@@ -153,10 +153,9 @@ To use Application Proxy, install a connector on each Windows server you're usin
153153
154154
To install the connector:
155155
156-
1. Sign in to the [Azure portal](https://portal.azure.com) as an application administrator of the directory that uses Application Proxy. For example, if the tenant domain is `contoso.com`, the admin should be `[email protected]` or any other admin alias on that domain.
156+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
157157
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
158-
1. In left navigation panel, select **Azure Active Directory**.
159-
1. Under **Manage**, select **Application proxy**.
158+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
160159
1. Select **Download connector service**.
161160
162161
![Download connector service to see the Terms of Service](./media/application-proxy-add-on-premises-application/application-proxy-download-connector-service.png)
@@ -187,8 +186,9 @@ You can use the Azure portal or your Windows server to confirm that a new connec
187186
188187
To confirm the connector installed and registered correctly:
189188
190-
1. Sign in to your tenant directory in the [Azure portal](https://portal.azure.com).
191-
1. In the left navigation panel, select **Azure Active Directory**, and then select **Application Proxy** under the **Manage** section. All of your connectors and connector groups appear on this page.
189+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
190+
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
191+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
192192
1. View a connector to verify its details. The connectors should be expanded by default. If the connector you want to view isn't expanded, expand the connector to view the details. An active green label indicates that your connector can connect to the service. However, even though the label is green, a network issue could still block the connector from receiving messages.
193193
194194
![Azure AD Application Proxy Connectors](./media/application-proxy-add-on-premises-application/app-proxy-connectors.png)
@@ -211,12 +211,11 @@ To confirm the connector installed and registered correctly:
211211
## Add an on-premises app to Azure AD
212212
213213
Now that you've prepared your environment and installed a connector, you're ready to add on-premises applications to Azure AD.
214-
215-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
216-
2. In the left navigation panel, select **Azure Active Directory**.
217-
3. Select **Enterprise applications**, and then select **New application**.
218-
4. Select **Add an on-premises application** button which appears about halfway down the page in the **On-premises applications** section. Alternatively, you can select **Create your own application** at the top of the page and then select **Configure Application Proxy for secure remote access to an on-premises application**.
219-
5. In the **Add your own on-premises application** section, provide the following information about your application:
214+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
215+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
216+
1. Select **New application**.
217+
1. Select **Add an on-premises application** button which appears about halfway down the page in the **On-premises applications** section. Alternatively, you can select **Create your own application** at the top of the page and then select **Configure Application Proxy for secure remote access to an on-premises application**.
218+
1. In the **Add your own on-premises application** section, provide the following information about your application:
220219
221220
| Field | Description |
222221
| :--------------------- | :----------------------------------------------------------- |
@@ -227,7 +226,7 @@ Now that you've prepared your environment and installed a connector, you're read
227226
| **Pre Authentication** | How Application Proxy verifies users before giving them access to your application.<br><br>**Azure Active Directory** - Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application. We recommend keeping this option as the default so that you can take advantage of Azure AD security features like Conditional Access and Multi-Factor Authentication. **Azure Active Directory** is required for monitoring the application with Microsoft Defender for Cloud Apps.<br><br>**Passthrough** - Users don't have to authenticate against Azure AD to access the application. You can still set up authentication requirements on the backend. |
228227
| **Connector Group** | Connectors process the remote access to your application, and connector groups help you organize connectors and apps by region, network, or purpose. If you don't have any connector groups created yet, your app is assigned to **Default**.<br><br>If your application uses WebSockets to connect, all connectors in the group must be version 1.5.612.0 or later. |
229228
230-
6. If necessary, configure **Additional settings**. For most applications, you should keep these settings in their default states.
229+
1. If necessary, configure **Additional settings**. For most applications, you should keep these settings in their default states.
231230
232231
| Field | Description |
233232
| :------------------------------ | :----------------------------------------------------------- |
@@ -238,7 +237,7 @@ Now that you've prepared your environment and installed a connector, you're read
238237
| **Translate URLs in Application Body** | Keep this unselected unless you have hardcoded HTML links to other on-premises applications and don't use custom domains. For more information, see [Link translation with Application Proxy](./application-proxy-configure-hard-coded-link-translation.md).<br><br>Select if you plan to monitor this application with Microsoft Defender for Cloud Apps. For more information, see [Configure real-time application access monitoring with Microsoft Defender for Cloud Apps and Azure Active Directory](./application-proxy-integrate-with-microsoft-cloud-application-security.md). |
239238
| **Validate Backend SSL Certificate** | Select to enable backend SSL certificate validation for the application. |
240239
241-
7. Select **Add**.
240+
1. Select **Add**.
242241
243242
## Test the application
244243

0 commit comments

Comments
 (0)