List your application in the Azure Active Directory application gallery

This article shows how to list an application in the Azure Active Directory (Azure AD) application gallery, implement single sign-on (SSO), and manage the listing.

  • Customers find the best possible single sign-on experience.
  • Configuration of the application is simple and minimal.
  • A quick search finds your application in the gallery.
  • Free, Basic, and Premium Azure AD customers can all use this integration.
  • Mutual customers get a step-by-step configuration tutorial.
  • Customers who use the System for Cross-domain Identity Management (SCIM) can use provisioning for the same app.

Prerequisites

  • For federated applications (Open ID and SAML/WS-Fed), the application must support the software-as-a-service (SaaS) model for getting listed in the Azure AD app gallery. The enterprise gallery applications must support multiple customer configurations and not any specific customer.
  • For Open ID Connect, the application must be multitenanted and the Azure AD consent framework must be properly implemented for the application. The user can send the sign-in request to a common endpoint so that any customer can provide consent to the application. You can control user access based on the tenant ID and the user's UPN received in the token.
  • For SAML 2.0/WS-Fed, your application must have the capability to do the SAML/WS-Fed SSO integration in SP or IDP mode. Make sure this capability is working correctly before you submit the request.
  • For password SSO, make sure that your application supports form authentication so that password vaulting can be done to get single sign-on to work as expected.
  • You need a permanent account for testing with at least two users registered.

Submit the request in the portal

After you've tested that your application integration works with Azure AD, submit your request for access in the Application Network portal. If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account, such as Outlook or Hotmail, to sign in.

If the following page appears after you sign in, contact the Azure AD SSO Integration Team. Provide the email account that you want to use for submitting the request. The Azure AD team will add the account in the Microsoft Application Network portal.

Access request message on SharePoint portal

After the account is added, you can sign in to the Microsoft Application Network portal.

If the following page appears after you sign in, provide a business justification for needing access in the text box. Then select Request Access.

Business justification box on SharePoint portal

Our team reviews the details and gives you access accordingly. After your request is approved, you can sign in to the portal and submit the request by selecting the Submit Request (ISV) tile on the home page.

Submit Request (ISV) tile on home page

Note

If you have any issues with access, contact the Azure AD SSO Integration Team.

Implement SSO by using the federation protocol

To list an application in the Azure AD app gallery, you first need to implement one of the following federation protocols supported by Azure AD. You also need to agree to the Azure AD application gallery terms and conditions. Read the terms and conditions of the Azure AD application gallery on this website.

  • OpenID Connect: To integrate your application with Azure AD by using the Open ID Connect protocol, follow the developers' instructions.

    Listing an OpenID Connect application in the gallery

    • If you want to add your application to list in the gallery by using OpenID Connect, select OpenID Connect & OAuth 2.0 as shown.
    • If you have any issues with access, contact the Azure AD SSO Integration Team.
  • SAML 2.0 or WS-Fed: If your app supports SAML 2.0, you can integrate it directly with an Azure AD tenant by following the instructions to add a custom application.

    Listing a SAML 2.0 or WS-Fed application in the gallery

    • If you want to add your application to list in the gallery by using SAML 2.0 or WS-Fed, select SAML 2.0/WS-Fed as shown.
    • If you have any issues with access, contact the Azure AD SSO Integration Team.

Implement SSO by using the password SSO

Create a web application that has an HTML sign-in page to configure password-based single sign-on. Password-based SSO, also referred to as password vaulting, enables you to manage user access and passwords to web applications that don't support identity federation. It's also useful for scenarios in which several users need to share a single account, such as to your organization's social media app accounts.

Listing a password SSO application in the gallery

  • If you want to add your application to list in the gallery by using password SSO, select Password SSO as shown.
  • If you have any issues with access, contact the Azure AD SSO Integration Team.

Request for user provisioning

Follow the process shown in the following image to request user provisioning.

Request for user provisioning

Update or remove an existing listing

To update or remove an existing application in the Azure AD app gallery, you first need to submit the request in the Application Network portal. If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account, such as Outlook or Hotmail, to sign in.

  • Select the appropriate option as shown in the following image.

    Listing a SAML application in the gallery

    • To update an existing application, select the appropriate option as per your requirement.
    • To remove an existing application from the Azure AD app gallery, select Remove my application listing from the gallery.
    • If you have any issues with access, contact the Azure AD SSO Integration Team.

List requests by customers

Customers can submit a request to list an application by selecting App requests by Customers > Submit new request.

Shows the customer-requested apps tile

Here's the flow of customer-requested applications.

Shows the customer-requested apps flow

Timelines

The timeline for the process of listing a SAML 2.0 or WS-Fed application in the gallery is 7 to 10 business days.

Timeline for listing a SAML application in the gallery

The timeline for the process of listing an OpenID Connect application in the gallery is 2 to 5 business days.

Timeline for listing an OpenID Connect application in the gallery

Escalations

For any escalations, send email to the Azure AD SSO Integration Team at SaaSApplicationIntegrations@service.microsoft.com, and we'll respond as soon as possible.