Thank you for posting this in Microsoft Q&A.
As I understand you want to set up your organization in such a way that when users try to login to your application which is configured as service provider, users should be authenticated via Azure as an IDP.
And also, you have configured the same application as an identity provider by federating a domain. Now when users try to login to Office 365 apps, they get redirected to your IDP and authentication is success.
But when users try to login to your application that you have configured, they are redirected to your IDP post entering the email ID.
This is by design behavior. When you set up federation with any of identity providers, you are actually federating a domain.
Now whenever, user try to access any of the Azure services or access any application in Azure, they will be asked to provide there UPN/email ID. When user enters there UPN/email ID with federated domain as email suffix, by default they will be redirected to federated identity provider which is configured for that domain.
There is no option available for users with same domain suffix to use different identity providers for authentication within Azure while accessing different applications.
For example, in your case you have federated domain "abc.com" with "tx" identity provider. Now when user with email as ******@abc.com tries to access office 365 applications in Azure, they will be redirected to tx identity provider for authentication. And when they try to access any other enterprise application with same email ******@abc.com, they will still be redirected to tx identity provider for authentication.
Once domain is federated with tx identity provider, doesn't matter whatever application user tries to access with email suffix as abc.com, they will be routed to tx identity provider for authentication.
Let me know if you have any further questions on it.
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.