Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Microsoft Entra seamless single sign-on (Microsoft Entra seamless SSO) automatically signs users in when they are on their corporate devices connected to your corporate network. When enabled, users don't need to type in their passwords to sign in to Microsoft Entra ID, and usually, even type in their usernames. This feature provides your users easy access to your cloud-based applications without needing any additional on-premises components.
Seamless SSO can be combined with either the Password Hash Synchronization or Pass-through Authentication sign-in methods. Seamless SSO is not applicable to Active Directory Federation Services (ADFS).
For Windows 10, Windows Server 2016, and later versions, it’s recommended to use SSO via primary refresh token (PRT). For Windows 7 and Windows 8.1, it’s recommended to use Seamless SSO. Seamless SSO needs the user's device to be domain-joined, but it isn't used on Windows 10 Microsoft Entra joined devices or Microsoft Entra hybrid joined devices. SSO on Microsoft Entra joined, Microsoft Entra hybrid joined, and Microsoft Entra registered devices works based on the Primary Refresh Token (PRT)
SSO via PRT works once devices are registered with Microsoft Entra ID for Microsoft Entra hybrid joined, Microsoft Entra joined or personal registered devices via Add Work or School Account. For more information on how SSO works with Windows 10 using PRT, see: Primary Refresh Token (PRT) and Microsoft Entra ID
userPrincipalName
) or another attribute configured in Microsoft Entra Connect (Alternate ID
). Both use cases work because Seamless SSO uses the securityIdentifier
claim in the Kerberos ticket to look up the corresponding user object in Microsoft Entra ID.https://myapps.microsoft.com/contoso.com
) forwards a domain_hint
(OpenID Connect) or whr
(SAML) parameter - identifying your tenant, or login_hint
parameter - identifying the user, in its Microsoft Entra sign-in request, users are automatically signed in without them entering usernames or passwords.https://contoso.sharepoint.com
) sends sign-in requests to Microsoft Entra ID's endpoints set up as tenants - that is, https://login.microsoftonline.com/contoso.com/<..>
or https://login.microsoftonline.com/<tenant_ID>/<..>
- instead of Microsoft Entra ID's common endpoint - that is, https://login.microsoftonline.com/common/<...>
.OS\Browser | Internet Explorer | Microsoft Edge**** | Google Chrome | Mozilla Firefox | Safari |
---|---|---|---|---|---|
Windows 10 | Yes* | Yes | Yes | Yes*** | N/A |
Windows 8.1 | Yes* | Yes**** | Yes | Yes*** | N/A |
Windows 8 | Yes* | N/A | Yes | Yes*** | N/A |
Windows Server 2012 R2 or above | Yes** | N/A | Yes | Yes*** | N/A |
Mac OS X | N/A | N/A | Yes*** | Yes*** | Yes*** |
Note
Microsoft Edge legacy is no longer supported
*Requires Internet Explorer version 11 or later. (Beginning August 17, 2021, Microsoft 365 apps and services won't support Internet Explorer 11.)
**Requires Internet Explorer version 11 or later. Disable Enhanced Protected Mode.
***Requires additional configuration.
****Microsoft Edge based on Chromium
Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowTraining
Module
Using single sign-on (SSO) with Office Add-ins - Training
This module explains how to use single sign-on in Office Add-ins.
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance.