🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-300 Domain 3
Domain 3 — Module 2 of 6 33%
17 of 27 overall

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free
Domain 3: Plan and Implement Workload Identities Premium ⏱ ~14 min read

Enterprise Apps: SSO, App Proxy & Integration

Plan and implement enterprise application settings, single sign-on, Application Proxy for on-premises apps, and SaaS integration in Microsoft Entra ID.

What are enterprise applications?

☕ Simple explanation

Enterprise applications are like the approved apps on your company phone.

Your company has a managed app store. When IT approves Salesforce, Zoom, or ServiceNow, those apps appear in the store. Employees can launch them with one tap — no separate login needed. IT controls who gets which apps, what permissions those apps have, and can revoke access instantly.

In Entra ID, the “Enterprise applications” blade is that managed app store. Every SaaS app, on-premises app, or custom app that your organisation trusts shows up here as a service principal.

Enterprise applications in Entra ID represent the service principals (local instances) of applications your tenant trusts. Every time you integrate a SaaS app, consent to a third-party app, or publish an on-premises app via Application Proxy, a service principal appears in the Enterprise applications blade.

This blade is the central management point for: assigning users and groups, configuring single sign-on (SSO), setting up provisioning, reviewing permissions, and monitoring sign-in logs. It’s distinct from App registrations — enterprise apps are the consumer side (“this tenant uses the app”), while app registrations are the developer side (“this tenant owns the app code”).

Enterprise application settings

Tenant-level settings

These apply across all enterprise applications in your tenant:

SettingLocationWhat It Controls
User consent settingsEntra admin center → Enterprise apps → Consent and permissionsWhether users can consent to apps accessing company data
Admin consent workflowSame as above → Admin consent settingsEnables a request/approval flow for apps that need admin consent
User sign-in settingsEntra admin center → Enterprise apps → User settingsDefault visibility of apps in My Apps portal
Enterprise app restrictionsTenant settings → User settingsWhether non-admins can add enterprise apps

App-level settings

Each enterprise application has its own configuration:

SettingWhat It Controls
PropertiesName, logo, homepage URL, whether users can sign in, whether assignment is required
Users and groupsWho can access this specific application
Single sign-onSSO method — SAML, OIDC, password-based, linked, or disabled
ProvisioningAutomatic user/group sync to the SaaS app (SCIM)
Conditional AccessPolicies targeting this specific app
PermissionsAPI permissions the app has been granted
💡 Exam tip: Assignment required

The “Assignment required?” toggle on enterprise apps is critical for the exam. When set to Yes, only users and groups explicitly assigned can access the app. When No, all users in the tenant can access it. For security-sensitive apps, always set this to Yes and assign specific users or groups.

Roles for managing enterprise apps

Not every admin needs Global Administrator to manage apps. The principle of least privilege applies:

RoleWhat It Can Do
Application AdministratorFull management of all enterprise apps and app registrations (create, configure SSO, assign users, manage permissions, manage Application Proxy)
Cloud Application AdministratorSame as Application Administrator, except cannot manage Application Proxy connectors or settings
Application DeveloperCan only create app registrations — cannot manage enterprise apps
Global AdministratorEverything (but don’t use this for day-to-day app management)
FeatureApplication AdministratorCloud Application Administrator
Manage enterprise apps
Manage app registrations
Configure SSO
Assign users/groups to apps
Manage user/admin consent
Manage Application Proxy
Create/manage connector groups
When to useAny app management, especially with App ProxyCloud-only app management (no on-prem integration)
💡 Exam tip: Application Admin vs Cloud Application Admin

The exam loves to test the difference. Application Administrator can manage Application Proxy connectors and settings. Cloud Application Administrator cannot. If a question involves App Proxy, the answer is Application Administrator (or Global Admin). For everything else, either role works.

Single sign-on (SSO) methods

SSO lets users sign in once to Entra ID and access all their assigned apps without re-entering credentials.

SSO MethodHow It WorksBest For
SAMLToken-based, industry standard. Entra ID sends a SAML assertion to the app.Enterprise SaaS apps (Salesforce, ServiceNow, SAP)
OpenID Connect (OIDC)Modern token-based protocol built on OAuth 2.0Modern web apps, SPAs, APIs
Password-basedEntra ID stores and auto-fills username/passwordLegacy apps without SAML/OIDC support
LinkedJust a link in My Apps — no SSO, redirects to external URLQuick-access bookmarks
DisabledNo SSO configuredApps that handle their own auth
ℹ️ Scenario: Ravi integrates Salesforce SSO

💻 Ravi Patel at NovaTech Solutions needs to set up Salesforce for the sales team (40 users):

  1. Add Salesforce from the gallery: Entra admin center → Enterprise applications → New application → search “Salesforce” → Add
  2. Configure SAML SSO: Enterprise app → Single sign-on → Select SAML → Configure:
    • Identifier (Entity ID): https://novatech.my.salesforce.com
    • Reply URL (ACS): https://novatech.my.salesforce.com?so=...
    • Sign-on URL: https://novatech.my.salesforce.com
  3. Download the certificate from Entra ID and upload it to Salesforce’s SSO settings
  4. Assign users: Enterprise app → Users and groups → Add the “Sales Team” security group
  5. Set “Assignment required” to Yes — only the sales team can access it
  6. Test: Click “Test this application” in the SSO blade

Result: Sales team members click the Salesforce icon in My Apps and are signed in automatically via SAML. No separate Salesforce password to manage.

SaaS application integration

Entra ID has a gallery of thousands of pre-integrated SaaS apps. Gallery apps come with:

  • Pre-configured SSO settings (SAML or OIDC)
  • Provisioning connectors (SCIM-based automatic user sync)
  • Step-by-step configuration tutorials

Integration approaches:

ApproachWhen to Use
Gallery appApp is in the Entra ID gallery — fastest setup, pre-configured
Non-gallery appApp supports SAML/OIDC but isn’t in the gallery — manual configuration
Application ProxyOn-premises web app that can’t be moved to the cloud
Custom app (OIDC)You’re building your own app and want Entra ID as the identity provider
💡 Exam tip: Provisioning with SCIM

SCIM (System for Cross-domain Identity Management) is the protocol Entra ID uses to automatically create, update, and delete user accounts in SaaS apps. When the exam mentions “automatic provisioning” or “user lifecycle management for SaaS apps,” think SCIM. Not all gallery apps support provisioning — check the app’s documentation.

Application Proxy — bring on-premises apps to the cloud

Application Proxy lets users access on-premises web applications through Entra ID, with SSO and Conditional Access — without a VPN.

How Application Proxy works

User (anywhere)
    ↓ HTTPS request to external URL
Microsoft Entra Application Proxy Service (cloud)
    ↓ Relays request securely
Application Proxy Connector (on-premises)
    ↓ Forwards to internal URL
On-premises web app (intranet)

Key components:

ComponentWhere It LivesWhat It Does
Application Proxy serviceMicrosoft cloudReceives external requests, validates Entra ID tokens
ConnectorOn-premises server (Windows Server)Maintains outbound connection to the cloud service, forwards requests to the internal app
Connector groupLogical groupingGroups connectors for high availability and app segmentation
External URLhttps://app-name.msappproxy.net or custom domainThe URL users access from outside
Internal URLhttps://intranet.meridianhealth.localThe actual on-premises app URL

Key architecture points

  • Connectors make outbound connections only — no inbound firewall ports needed (ports 80 and 443 outbound)
  • Multiple connectors in a connector group provide high availability and load balancing
  • Supports Kerberos Constrained Delegation (KCD) for SSO to on-premises apps using Windows Integrated Authentication
  • Supports header-based authentication for legacy apps
  • Works with Conditional Access — you can require MFA, compliant devices, or specific locations
ℹ️ Scenario: Priya deploys App Proxy for the intranet

🔐 Priya Sharma at Meridian Health needs to give remote clinicians access to an on-premises intranet portal (https://portal.meridianhealth.local) without a VPN.

Setup steps:

  1. Install the connector: Priya installs the Application Proxy connector on a Windows Server 2019 machine in the Meridian data centre. The connector registers with Entra ID using her admin credentials.

  2. Create a connector group: She creates a “Healthcare Portal” connector group and adds two connectors for high availability.

  3. Publish the app:

    • Internal URL: https://portal.meridianhealth.local
    • External URL: https://portal-meridianhealth.msappproxy.net (she later maps this to https://portal.meridianhealth.com with a custom domain)
    • Pre-authentication: Microsoft Entra ID (so users must authenticate before reaching the app)
    • SSO method: Kerberos Constrained Delegation (the intranet uses Windows Integrated Auth)
  4. Assign users: Only the “Clinical Staff” group is assigned to the enterprise app.

  5. Apply Conditional Access: Priya creates a CA policy requiring MFA and a compliant device for this app.

Result: Remote clinicians open https://portal.meridianhealth.com, authenticate with Entra ID + MFA, and are seamlessly signed into the intranet portal. No VPN. No inbound firewall holes. Full audit trail.

💡 Exam tip: App Proxy connector requirements

The exam tests connector requirements:

  • Windows Server (2016 or later, 2019+ recommended)
  • Outbound HTTPS (443) to the Application Proxy service — no inbound ports
  • The connector server should not be a domain controller (recommended)
  • Connectors auto-update through the Application Proxy service
  • For KCD SSO, the connector server must be domain-joined and have delegation configured in AD

🎬 Video walkthrough

🎬 Video coming soon

Enterprise Apps & Application Proxy — SC-300 Module 17

Enterprise Apps & Application Proxy — SC-300 Module 17

~13 min

Flashcards

Question

What is the difference between an enterprise application and an app registration in Entra ID?

Click or press Enter to reveal answer

Answer

An app registration is the developer side — it defines the app's identity, permissions, and credentials. An enterprise application (service principal) is the consumer side — it represents the app in a specific tenant and controls who can access it, SSO settings, and provisioning.

Click to flip back

Question

What does the 'Assignment required' property do on an enterprise app?

Click or press Enter to reveal answer

Answer

When set to Yes, only users and groups explicitly assigned to the app can access it. When set to No, all users in the tenant can access the app. Best practice for security-sensitive apps is to set it to Yes.

Click to flip back

Question

What is the role of an Application Proxy connector?

Click or press Enter to reveal answer

Answer

A connector is a lightweight agent installed on a Windows Server in your on-premises environment. It maintains outbound HTTPS connections to the Entra Application Proxy cloud service and forwards authenticated requests to internal web applications. No inbound firewall ports are needed.

Click to flip back

Question

What is the difference between Application Administrator and Cloud Application Administrator?

Click or press Enter to reveal answer

Answer

Both can manage enterprise apps and app registrations. The key difference: Application Administrator can manage Application Proxy (connectors, published apps), while Cloud Application Administrator cannot. Choose Cloud Application Administrator when App Proxy isn't involved.

Click to flip back

Knowledge Check

Knowledge Check

Ravi needs to set up Salesforce SSO for 40 sales staff at NovaTech. He wants only the sales team to access it, with automatic user account creation in Salesforce when new team members join. What should Ravi configure?

Knowledge Check

Priya at Meridian Health needs to publish an on-premises intranet app for remote clinicians. The app uses Windows Integrated Authentication. She wants MFA before users reach the app and no inbound firewall changes. What should she implement?

Knowledge Check

Anika's client wants to delegate enterprise app management to a team lead without giving them Global Administrator. The client does NOT use Application Proxy. Which role should Anika assign?


Next up: Enterprise Apps: Users, Consent & Collections — how to assign users, manage consent workflows, and organise applications into collections.

← Previous

Workload Identities: Managed Identities & Service Principals

Next →

Enterprise Apps: Users, Consent & Collections

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.