SOLVED

Azure AD SSO

%3CLINGO-SUB%20id%3D%22lingo-sub-63770%22%20slang%3D%22en-US%22%3EAzure%20AD%20SSO%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-63770%22%20slang%3D%22en-US%22%3E%3CP%3EI%20am%20using%20ADFS%20with%20Office%20365%20and%20few%20other%20SaaS%20apps%20(ServiceNow%2C%20Concur%20and%2016%20other%20apps).%20we%20want%20to%20use%20Azure%20AD%20SSO%20for%20some%20apps.%20I%20have%20made%20to%20an%20application%20and%20configured%20Azure%20AD%20SSO%20and%26nbsp%3Bthe%20app%20works%20from%20My%20Apps%20in%20Azure%20portal.%20The%20app%20does%20not%20work%20when%20the%20application%20URL%20is%20used%2C%20I%20am%20routed%20to%20Azure%20and%20after%20I%20enter%20the%20credentials%20I%20am%20routed%20to%20ADFS.%20The%20relying%20party%20for%20the%20application%20is%20disabled%20in%20ADFS.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20should%20be%20able%20to%26nbsp%3Bswitch%20over%20some%20apps%20to%20Azure%20AD%20SSO%20right%3F%20Do%20I%20have%20to%20switch%20Office%20365%20to%20synchronized%20or%20pass%20through%20authentication%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-63770%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20AD%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-63852%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20SSO%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-63852%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3EThis%20was%20my%20experience%20with%20it%2C%20you%20need%20Windows%2010%201607%2B%20and%20a%20group%20policy%20set%20for%20Azure%20AD%20Computers%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.adamfowlerit.com%2F2017%2F04%2Fzero-click-single-sign-without-adfs%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.adamfowlerit.com%2F2017%2F04%2Fzero-click-single-sign-without-adfs%2F%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAnd%20as%20Loryan%20says%2C%20it's%20a%20global%20thing.%20You%20can't%20mix%20it%20up%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-63851%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20SSO%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-63851%22%20slang%3D%22en-US%22%3ETo%20use%20AD%20FS%20you%20have%20to%20set%20at%20least%20one%20of%20your%20domains%20to%20be%20federated.%20That%20means%20any%20authentication%20being%20done%20via%20Azure%20AD%20will%20use%20AD%20FS%20for%20the%20authentication%20point%20-%20regardless%20if%20it's%20a%20non-Office%20365%20service.%3CBR%20%2F%3ESo%20you%20can't%20have%20a%20mix%20of%20apps%2C%20with%20some%20using%20SSO%20and%20others%20not.%20You%20can%20only%20have%20it%20that%20some%20domains%20use%20AD%20FS%20and%20some%20don't.%3C%2FLINGO-BODY%3E
Highlighted
Occasional Contributor

I am using ADFS with Office 365 and few other SaaS apps (ServiceNow, Concur and 16 other apps). we want to use Azure AD SSO for some apps. I have made to an application and configured Azure AD SSO and the app works from My Apps in Azure portal. The app does not work when the application URL is used, I am routed to Azure and after I enter the credentials I am routed to ADFS. The relying party for the application is disabled in ADFS.

 

I should be able to switch over some apps to Azure AD SSO right? Do I have to switch Office 365 to synchronized or pass through authentication?

2 Replies
Highlighted
Best Response confirmed by Lavanya Murthy (Occasional Contributor)
Solution
To use AD FS you have to set at least one of your domains to be federated. That means any authentication being done via Azure AD will use AD FS for the authentication point - regardless if it's a non-Office 365 service.
So you can't have a mix of apps, with some using SSO and others not. You can only have it that some domains use AD FS and some don't.
Highlighted

Hi,

This was my experience with it, you need Windows 10 1607+ and a group policy set for Azure AD Computers https://www.adamfowlerit.com/2017/04/zero-click-single-sign-without-adfs/

 

And as Loryan says, it's a global thing. You can't mix it up :)