How to configure single sign-on to an Application Proxy application
Single sign-on (SSO) allows your users to access an application without authenticating multiple times. It allows the single authentication to occur in the cloud, against Azure Active Directory, and allows the service or Connector to impersonate the user to complete any additional authentication challenges from the application.
How to configure single-sign on
To configure SSO, first make sure that your application is configured for Pre-Authentication through Azure Active Directory. To do this configuration, go to Azure Active Directory -> Enterprise Applications -> All Applications -> Your application -> Application Proxy. On this page, you see the “Pre Authentication” field, and make sure that is set to “Azure Active Directory.
For more information on the Pre-Authentication methods, see step 4 of the app publishing document.
Configuring single sign-on modes for Application Proxy Applications
Configure the specific type of single sign-on. The sign-on methods are classified based on what type of authentication the backend application uses. App Proxy applications support three types of sign-on:
Password-based sign-on: Password-based sign-on can be used for any application that uses username and password fields to sign on. Configuration steps are in Configure password Single sign-on for an Azure AD gallery application.
Integrated Windows authentication: For applications using integrated Windows authentication (IWA), single sign-on is enabled through Kerberos Constrained Delegation (KCD). This method gives Application Proxy Connectors permission in Active Directory to impersonate users, and to send and receive tokens on their behalf. Details on configuring KCD can be found in the Single Sign-On with KCD documentation.
Header-based sign-on: Header-based sign-on is used to provide single sign-on capabilities using HTTP headers. To learn more, see Header-based single sign-on.
SAML single sign-on: With SAML single sign-on, Azure AD authenticates to the application by using the user's Azure AD account. Azure AD communicates the sign-on information to the application through a connection protocol. With SAML-based single sign-on, you can map users to specific application roles based on rules you define in your SAML claims. For information about setting up SAML single sign-on, see SAML for single sign-on with Application Proxy.
Each of these options can be found by going to your application in Enterprise Applications, and opening the Single Sign-On page on the left menu. Note that if your application was created in the old portal, you may not see all these options.
On this page, you also see one additional Sign-On option: Linked Sign-On. This option is also supported by Application Proxy. However, this option does not add single sign-on to the application. That said the application may already have single sign-on implemented using another service such as Active Directory Federation Services.
This option allows an admin to create a link to an application that users first land on when accessing the application. For example, if there is an application that is configured to authenticate users using Active Directory Federation Services 2.0, an administrator can use the “Linked Sign-On” option to create a link to it on My Apps.
Submit and view feedback for