You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#customer intent: As an admin, I want to enable and create collections for My Apps portal in Azure AD so that I can create a simpler My Apps experience for users.
17
+
#customer intent: As an admin, I want to enable and create collections for My Apps portal in Microsoft Entra ID so that I can create a simpler My Apps experience for users.
18
18
---
19
19
20
20
# Create collections on the My Apps portal
21
21
22
-
Your users can use the My Apps portal to view and start the cloud-based applications they have access to. By default, all the applications a user can access are listed together on a single page. To better organize this page for your users, if you have an Azure AD Premium P1 or P2 license you can set up collections. With a collection, you can group together applications that are related (for example, by job role, task, or project) and display them on a separate tab. A collection essentially applies a filter to the applications a user can already access, so the user sees only those applications in the collection that have been assigned to them.
22
+
Your users can use the My Apps portal to view and start the cloud-based applications they have access to. By default, all the applications a user can access are listed together on a single page. To better organize this page for your users, if you have a Microsoft Entra ID P1 or P2 license you can set up collections. With a collection, you can group together applications that are related (for example, by job role, task, or project) and display them on a separate tab. A collection essentially applies a filter to the applications a user can already access, so the user sees only those applications in the collection that have been assigned to them.
23
23
24
24
> [!NOTE]
25
25
> This article covers how an admin can enable and create collections. For information for the end user about how to use the My Apps portal and collections, see [Access and use collections](https://support.microsoft.com/account-billing/organize-apps-using-collections-in-the-my-apps-portal-2dae6b8a-d8b0-4a16-9a5d-71ed4d6a6c1d).
@@ -35,7 +35,7 @@ To create collections on the My Apps portal, you need:
To create a collection, you must have an Azure AD Premium P1 or P2 license.
38
+
To create a collection, you must have a Microsoft Entra ID P1 or P2 license.
39
39
40
40
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
41
41
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
@@ -76,14 +76,14 @@ You can access audit logs in the [Microsoft Entra admin center](https://entra.mi
76
76
77
77
## Get support for My Account pages
78
78
79
-
From the My Apps page, a user can select **My account** > **View account** to open their account settings. On the Azure AD**My Account** page, users can manage their security info, devices, passwords, and more. They can also access their Office account settings.
79
+
From the My Apps page, a user can select **My account** > **View account** to open their account settings. On the Microsoft Entra ID**My Account** page, users can manage their security info, devices, passwords, and more. They can also access their Office account settings.
80
80
81
-
In case you need to submit a support request for an issue with the Azure AD account page or the Office account page, follow these steps so your request is routed properly:
81
+
In case you need to submit a support request for an issue with the Microsoft Entra account page or the Office account page, follow these steps so your request is routed properly:
82
82
83
-
- For issues with the **Azure AD "My Account"** page, open a support request from within the Microsoft Entra admin center. Go to **Microsoft Entra admin center** > **Identity** > **Learn & support** > **New support request**.
83
+
- For issues with the **Microsoft Entra ID "My Account"** page, open a support request from within the Microsoft Entra admin center. Go to **Microsoft Entra admin center** > **Identity** > **Learn & support** > **New support request**.
84
84
85
85
- For issues with the **Office "My account"** page, open a support request from within the Microsoft 365 admin center. Go to **Microsoft 365 admin center** > **Support**.
86
86
87
87
## Next steps
88
88
89
-
[End-user experiences for applications in Azure Active Directory](end-user-experiences.md)
89
+
[End-user experiences for applications in Microsoft Entra ID](end-user-experiences.md)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/add-application-portal-assign-users.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: 'Quickstart: Create and assign a user account'
3
-
description: Create a user account in your Azure Active Directory tenant and assign it to an application.
3
+
description: Create a user account in your Microsoft Entra tenant and assign it to an application.
4
4
services: active-directory
5
5
author: omondiatieno
6
6
manager: CelesteDG
@@ -12,34 +12,34 @@ ms.date: 03/23/2023
12
12
ms.author: jomondi
13
13
ms.reviewer: alamaral
14
14
ms.custom: mode-other, enterprise-apps
15
-
#Customer intent: As an administrator of an Azure AD tenant, I want to assign a user to an enterprise application.
15
+
#Customer intent: As an administrator of a Microsoft Entra tenant, I want to assign a user to an enterprise application.
16
16
---
17
17
18
18
# Quickstart: Create and assign a user account
19
19
20
-
In this quickstart, you use the Microsoft Entra admin center to create a user account in your Azure Active Directory (Azure AD) tenant. After you create the account, you can assign it to the enterprise application that you added to your tenant.
20
+
In this quickstart, you use the Microsoft Entra admin center to create a user account in your Microsoft Entra tenant. After you create the account, you can assign it to the enterprise application that you added to your tenant.
21
21
22
22
It's recommended that you use a nonproduction environment to test the steps in this quickstart.
23
23
24
24
## Prerequisites
25
25
26
26
To create a user account and assign it to an enterprise application, you need:
27
27
28
-
-An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28
+
-A Microsoft Entra user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29
29
- One of the following roles: Global Administrator, Cloud Application Administrator, or owner of the service principal. You'll need the User Administrator role to manage users.
30
30
- Completion of the steps in [Quickstart: Add an enterprise application](add-application-portal.md).
To create a user account in your Microsoft Entra tenant:
37
37
38
38
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
39
39
1. Browse to **Identity** > **Users** > **All users**
40
40
1. Select **New user** at the top of the pane and then, select **Create new user**.
41
41
42
-
:::image type="content" source="media/add-application-portal-assign-users/new-user.png" alt-text="Add a new user account to your Azure AD tenant.":::
42
+
:::image type="content" source="media/add-application-portal-assign-users/new-user.png" alt-text="Add a new user account to your Microsoft Entra tenant.":::
43
43
44
44
1. In the **User principal name** field, enter the username of the user account. For example, `[email protected]`. Be sure to change `contoso.com` to the name of your tenant domain.
45
45
1. In the **Display name** field, enter the name of the user of the account. For example, `contosouser1`.
@@ -51,10 +51,10 @@ To create a user account in your Azure AD tenant:
51
51
To assign a user account to an enterprise application:
52
52
53
53
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
54
-
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
54
+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**. For example, the application that you created in the previous quickstart named **Azure AD SAML toolkit 1**.
55
55
1. In the left pane, select **Users and groups**, and then select **Add user/group**.
56
56
57
-
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to an application in your Azure AD tenant.":::
57
+
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to an application in your Microsoft Entra tenant.":::
58
58
59
59
1. On the **Add Assignment** pane, select **None Selected** under **Users and groups**.
60
60
1. Search for and select the user that you want to assign to the application. For example, `[email protected]`.
#Customer intent: As an administrator of an Azure AD tenant, I want to configure the properties of an enterprise application.
17
+
#Customer intent: As an administrator of a Microsoft Entra tenant, I want to configure the properties of an enterprise application.
18
18
---
19
19
20
20
# Configure enterprise application properties
21
21
22
-
This article shows you where you can configure the properties of an enterprise application in your Azure Active Directory (Azure AD) tenant. For more information about the properties that you can configure, see [Properties of an enterprise application](application-properties.md).
22
+
This article shows you where you can configure the properties of an enterprise application in your Microsoft Entra tenant. For more information about the properties that you can configure, see [Properties of an enterprise application](application-properties.md).
23
23
24
24
## Prerequisites
25
25
26
26
To configure the properties of an enterprise application, you need:
27
27
28
-
-An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28
+
-A Microsoft Entra user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29
29
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
## Use Microsoft Graph to configure application properties
129
129
130
-
You can also configure other advanced properties of both app registrations and enterprise applications (service principals) through Microsoft Graph. These include properties such as permissions, and role assignments. For more information, see [Create and manage an Azure AD application using Microsoft Graph](/graph/tutorial-applications-basics#configure-other-basic-properties-for-your-app).
130
+
You can also configure other advanced properties of both app registrations and enterprise applications (service principals) through Microsoft Graph. These include properties such as permissions, and role assignments. For more information, see [Create and manage a Microsoft Entra application using Microsoft Graph](/graph/tutorial-applications-basics#configure-other-basic-properties-for-your-app).
131
131
132
132
## Next steps
133
133
134
134
Learn more about how to manage enterprise applications.
135
135
> [!div class="nextstepaction"]
136
-
> [What is application management in Azure Active Directory?](what-is-application-management.md)
136
+
> [What is application management in Microsoft Entra ID?](what-is-application-management.md)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/add-application-portal-setup-oidc-sso.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: 'Add an OpenID Connect-based single sign-on application'
3
-
description: Learn how to add OpenID Connect-based single sign-on application in Azure Active Directory.
3
+
description: Learn how to add OpenID Connect-based single sign-on application in Microsoft Entra ID.
4
4
services: active-directory
5
5
author: omondiatieno
6
6
manager: CelesteDG
@@ -16,7 +16,7 @@ ms.custom: enterprise-apps
16
16
17
17
# Add an OpenID Connect-based single sign-on application
18
18
19
-
Add an application that supports [OpenID Connect (OIDC)](../develop/v2-protocols.md) based single sign-on (SSO) to your Azure Active Directory (Azure AD) tenant.
19
+
Add an application that supports [OpenID Connect (OIDC)](../develop/v2-protocols.md) based single sign-on (SSO) to your Microsoft Entra tenant.
20
20
21
21
It is recommended that you use a non-production environment to test the steps in this page.
22
22
@@ -26,7 +26,7 @@ It is recommended that you use a non-production environment to test the steps in
26
26
27
27
To configure OIDC-based SSO, you need:
28
28
29
-
-An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29
+
-A Microsoft Entra user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
30
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
31
31
32
32
## Add the application
@@ -38,8 +38,8 @@ To configure OIDC-based SSO for an application:
38
38
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. In the **All applications** pane, select **New application**.
41
-
1. The **Browse Azure AD Gallery** pane opens and displays tiles for cloud platforms, on-premises applications, and featured applications. Applications listed in the **Featured applications** section have icons indicating whether they support federated SSO and provisioning. Search for and select the application. In this example, **SmartSheet** is being used.
42
-
1. Select **Sign-up**. Sign in with the user account credentials from Azure Active Directory. If you already have a subscription to the application, then user details and tenant information is validated. If the application is not able to verify the user, then it redirects you to sign up for the application service.
41
+
1. The **Browse Microsoft Entra Gallery** pane opens and displays tiles for cloud platforms, on-premises applications, and featured applications. Applications listed in the **Featured applications** section have icons indicating whether they support federated SSO and provisioning. Search for and select the application. In this example, **SmartSheet** is being used.
42
+
1. Select **Sign-up**. Sign in with the user account credentials from Microsoft Entra ID. If you already have a subscription to the application, then user details and tenant information is validated. If the application is not able to verify the user, then it redirects you to sign up for the application service.
43
43
44
44
:::image type="content" source="media/add-application-portal-setup-oidc-sso/oidc-sso-configuration.png" alt-text="Complete the consent screen for an application.":::
0 commit comments