Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Microsoft Entra application proxy natively supports single sign-on (SSO) access to applications that use headers for authentication. You configure header values required by your application in Microsoft Entra ID. The header values are sent to the application via application proxy. Benefits to using native support for header-based authentication with application proxy include:
Simplify remote access to your on-premises apps - Application proxy simplifies your existing remote access architecture. You replace Virtual Private Network (VPN) access to these apps. You remove dependencies on on-premises identity solutions for authentication. You streamline the experience for users and they don't notice anything different when they use corporate applications. Users can work from anywhere on any device.
No extra software or changes to your apps - You use your existing private network connectors. No extra software is required.
Wide list of attributes and transformations available - All header values available are based on standard claims that are issued by Microsoft Entra ID. All attributes and transformations available for configuring claims for Security Assertion Markup Language (SAML) or OpenID Connect (OIDC) applications are also available as header values.
Enable application proxy and install a connector that has direct network access to your applications. To learn more, see Add an on-premises application for remote access through application proxy.
The table lists common capabilities required for header-based authentication applications.
Requirement | Description |
---|---|
Federated SSO | In preauthenticated mode, all applications are protected with Microsoft Entra authentication and users have single sign-on. |
Remote access | Application proxy provides remote access to the app. Users access the application from the internet on any web browser using the external Uniform Resource Locator (URL). Application proxy isn't intended for general corporate access. For general corporate access, see Microsoft Entra Private Access. |
Header-based integration | Application proxy handles SSO integration with Microsoft Entra ID and then passes identity or other application data as HTTP headers to the application. |
Application authorization | Common policies are specified based on the application being accessed, the user’s group membership, and other policies. In Microsoft Entra ID, policies are implemented using Conditional Access. Application authorization policies only apply to the initial authentication request. |
Step-up authentication | Policies are defined to force added authentication, for example, to gain access to sensitive resources. |
Fine grained authorization | Provides access control at the URL level. Added policies can be enforced based on the URL being accessed. The internal URL configured for the app defines the scope of the app that the policy is applied to. The policy configured for the most granular path is enforced. |
Note
This article describes the connection between header-based authentication applications and Microsoft Entra ID using application proxy and is the recommended pattern. As an alternative, there is an integration pattern that uses PingAccess with Microsoft Entra ID to enable header-based authentication. For more information, see Header-based authentication for single sign-on with application proxy and PingAccess.
Publish your application according to the instructions described in Publish applications with application proxy.
Select Microsoft Entra ID as the pre-authentication method.
Assign a test user by navigating to Users and groups and assigning the appropriate users and groups.
Open a browser and navigate to the External URL from the application proxy settings.
Verify that you can connect to the application. Even though you can connect, you can't access the app yet since the headers aren't configured.
Before you get started with single sign-on for header-based applications, install a private network connector. The connector must be able to access to the target applications. To learn more, see Tutorial: Microsoft Entra application proxy.
The application is now running and available. To test the app:
Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowTraining
Module
Implement and monitor the integration of enterprise apps for SSO - Training
Deploying and monitoring enterprise applications to Azure solutions can ensure security. Explore how to deploy on-premises and cloud based apps to users.
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance.