Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies to:
External tenants (learn more)
In external tenants, you can register applications that use the OpenID Connect (OIDC) or Security Assertion Markup Language (SAML) protocol for authentication and single sign-on. The app registration process is designed specifically for OIDC apps. But you can use the Enterprise applications feature to create and register your SAML app. This process generates a unique application ID (client ID) and adds your app to the App registrations, where you can view and manage its properties.
This article describes how to register your own SAML application in your external tenant by creating a non-gallery app in Enterprise applications.
Prerequisites
- An Azure account that has an active subscription. Create an account for free.
- A Microsoft Entra external tenant.
- A sign-up and sign-in user flow.
Create and register a SAML app
Sign in to the Microsoft Entra admin center as at least an Application Administrator.
If you have access to multiple tenants, use the Settings icon
in the top menu and switch to your external tenant from the Directories menu.Go to Identity > Applications> Enterprise applications.
Select New application, and then select Create your own application.
On the Create your own application pane, enter a name for your app.
Select Integrate any other application you don't find in the gallery (Non-gallery).
Select Create.
The app Overview page opens. In the left menu under Manage, select Properties. Switch the Assignment required? toggle to No so that users can use self-service sign-up, and then select Save.
In the left menu under Manage, select Single sign-on.
Under Select a single sign-on method, select SAML.
On the SAML-based Sign-on page, do one of the following:
- Select Upload metadata file, browse to the file containing your metadata, and then select Add. Select Save.
- Or, use the Edit pencil option to update each section, and then select Save.
At the third section under SAML Certificates, note that there's no Download button next to Federation Metadata XML. This button appears only in workforce tenants, not in external tenants. To download the metadata file in an external tenant, copy the link and paste it into your browser.
Select Test, and then select the Test sign-in button to see if single sign-on is working. This test verifies that your current admin account can sign in using the
https://login.microsoftonline.comendpoint.
You can test external user sign-in with these steps:
- Create a sign-up and sign-in user flow if you haven't already.
- Add your SAML application to the user flow.
- Run your application.