Skip to content

Commit 053e5e7

Browse files
authored
Merge pull request #116660 from MicrosoftDocs/master
5/27 AM Publish
2 parents 65d6d6b + 8e7cd45 commit 053e5e7

File tree

80 files changed

+2205
-722
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+2205
-722
lines changed

articles/active-directory-domain-services/concepts-migration-benefits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Azure AD DS managed domains that use a Resource Manager deployment model help yo
4646

4747
## Next steps
4848

49-
To get started, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager[howto-migrate].
49+
To get started, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager][howto-migrate].
5050

5151
<!-- LINKS - INTERNAL -->
5252
[password-policy]: password-policy.md

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,11 @@ You also need a valid Azure AD Premium P1 or higher subscription license for eve
7676

7777
### Prerequisites
7878

79-
- Azure AD global administrator access to configure the Azure AD Connect provisioning agent.
79+
- Azure AD [hybrid identity administrator](../users-groups-roles/directory-assign-admin-roles.md#hybrid-identity-administrator) to configure the Azure AD Connect provisioning agent.
80+
- Azure AD [application administrator](../users-groups-roles/directory-assign-admin-roles.md#application-administrator) role to configure the provisioning app in the Azure portal
8081
- A test and production instance of the cloud HR app.
8182
- Administrator permissions in the cloud HR app to create a system integration user and make changes to test employee data for testing purposes.
82-
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the [Azure AD Connect provisioning agent](https://go.microsoft.com/fwlink/?linkid=847801).
83+
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the Azure AD Connect provisioning agent
8384
- [Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) for synchronizing users between Active Directory and Azure AD.
8485

8586
### Training resources
@@ -243,7 +244,7 @@ By default, the attribute in the cloud HR app that represents the unique employe
243244

244245
You can set multiple matching attributes and assign matching precedence. They're evaluated on matching precedence. As soon as a match is found, no further matching attributes are evaluated.
245246

246-
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#planning-workday-to-active-directory-user-attribute-mapping-and-transformations)) for a list of custom attributes to map.
247+
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration)) for a list of custom attributes to map.
247248

248249
### Determine user account status
249250

@@ -280,7 +281,7 @@ When you initiate the Joiners-Movers-Leavers process, gather the following requi
280281
| | What effective dates are considered for processing user termination? |
281282
| | How do employee and contingent worker conversions impact existing Active Directory accounts? |
282283

283-
Depending on your requirements, you can modify the mappings to meet your integration goals. For more information, see the specific cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#planning-workday-to-active-directory-user-attribute-mapping-and-transformations)) for a list of custom attributes to map.
284+
Depending on your requirements, you can modify the mappings to meet your integration goals. For more information, see the specific cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#part-4-configure-attribute-mappings)) for a list of custom attributes to map.
284285

285286
### Generate a unique attribute value
286287

@@ -360,7 +361,9 @@ The cloud HR user provisioning implementation might fail to work as desired in t
360361

361362
Choose the cloud HR app that aligns to your solution requirements.
362363

363-
**Workday**: To import worker profiles from Workday into Active Directory and Azure AD, see [Tutorial: Configure Workday for automatic user provisioning](../saas-apps/workday-inbound-tutorial.md#planning-your-deployment). Optionally, you can write back the email address and username to Workday.
364+
**Workday**: To import worker profiles from Workday into Active Directory and Azure AD, see [Tutorial: Configure Workday for automatic user provisioning](../saas-apps/workday-inbound-tutorial.md#planning-your-deployment). Optionally, you can write back the email address, username and phone number to Workday.
365+
366+
**SAP SuccessFactors**: To import worker profiles from SuccessFactors into Active Directory and Azure AD, see [Tutorial: Configure SAP SuccessFactors for automatic user provisioning](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md). Optionally, you can write back the email address and username to SuccessFactors.
364367

365368
## Manage your configuration
366369

articles/active-directory/app-provisioning/workday-attribute-reference.md

Lines changed: 43 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 05/21/2020
11+
ms.date: 05/25/2020
1212
ms.author: chmutali
1313
ms.reviewer: celested
1414
---
@@ -25,7 +25,7 @@ The table below captures the list of Workday attributes and corresponding XPATH
2525
:::image type="content" source="../saas-apps/media/workday-inbound-tutorial/workday-url-no-version-info.png" alt-text="Workday no version info":::
2626

2727

28-
| \# | Name | Workday API expression |
28+
| \# | Workday Attribute Name | Workday XPATH API expression |
2929
|----|---------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
3030
| 1 | Active | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Worker\_Status\_Data/wd:Active/text\(\) |
3131
| 2 | AddressLine2Data | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Position\_Data/wd:Business\_Site\_Summary\_Data/wd:Address\_Data/wd:Address\_Line\_Data\[@wd:Type='ADDRESS\_LINE\_2'\]/text\(\) |
@@ -120,7 +120,7 @@ If you are using WWS API v30.0 or above in the connection URL as shown below:
120120
To configure additional XPATHs, refer to the section [Tutorial: Managing your configuration](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration).
121121

122122

123-
| \# | Name | Workday XPATH API expression |
123+
| \# | Workday Attribute Name | Workday XPATH API expression |
124124
|----|---------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
125125
| 1 | Active | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Worker\_Status\_Data/wd:Active/text\(\) |
126126
| 2 | AddressLine2Data | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Worker\_Job\_Data\[@wd:Primary_Job=1]/wd:Position\_Data/wd:Business\_Site\_Summary\_Data/wd:Address\_Data/wd:Address\_Line\_Data\[@wd:Type='ADDRESS\_LINE\_2'\]/text\(\) |
@@ -203,4 +203,44 @@ To configure additional XPATHs, refer to the section [Tutorial: Managing your co
203203
| 79 | WorkerType | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Worker\_Job\_Data\[@wd:Primary_Job=1]/wd:Position\_Data/wd:Worker\_Type\_Reference/wd:ID\[@wd:type="Employee\_Type\_ID"\]/text\(\) |
204204
| 80 | WorkSpaceReference | wd:Worker/wd:Worker\_Data/wd:Employment\_Data/wd:Worker\_Job\_Data\[@wd:Primary_Job=1]/wd:Position\_Data/wd:Work\_Space\_\_Reference/@wd:Descriptor |
205205

206+
## Custom XPATH values
207+
The table below provides a list of other commonly used custom XPATH API expressions when provisioning workers from Workday to Active Directory or Azure AD. Please test the XPATH API expressions provided here with your version of Workday referring to the instructions captured in the section [Tutorial: Managing your configuration](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration).
208+
209+
To add more attributes to the XPATH table for the benefit of customers implementing this integration, please leave a comment below or directly [contribute](https://docs.microsoft.com/contribute) to the article.
210+
211+
> [!div class="mx-tdBreakAll"]
212+
> | \# | Workday Attribute Name | Workday API version | Workday XPATH API expression |
213+
> |----|-------------------------|---------------------|--------------------------------|
214+
> | 1 | Universal ID | v30.0+ | wd:Worker/wd:Worker_Data/wd:Universal_ID/text() |
215+
> | 2 | User Name | v30.0+ | wd:Worker/wd:Worker_Data/wd:User_Account_Data/wd:User_Name/text() |
216+
> | 3 | Management Level ID | v30.0+ | wd:Worker/wd:Worker_Data/wd:Employment_Data/wd:Worker_Job_Data[@wd:Primary_Job=1]/wd:Position_Data/wd:Job_Profile_Summary_Data/wd:Management_Level_Reference/wd:ID[@wd:type="Management_Level_ID"]/text() |
217+
> | 4 | Hire Rescinded | v30.0+ | wd:Worker/wd:Worker_Data/wd:Employment_Data/wd:Worker_Status_Data/wd:Hire_Rescinded/text() |
218+
> | 5 | Assigned Provisioning Group | v21.1+ | wd:Worker/wd:Worker_Data/wd:Account_Provisioning_Data/wd:Provisioning_Group_Assignment_Data[wd:Status='Assigned']/wd:Provisioning_Group/text() |
219+
220+
221+
## Supported XPATH functions
222+
Given below is the list of XPATH functions supported by [Microsoft .NET XPATH library](https://docs.microsoft.com/previous-versions/dotnet/netframework-4.0/ms256138(v=vs.100)) that you can use while creating your XPATH API expression.
223+
224+
* name
225+
* last
226+
* position
227+
* string
228+
* substring
229+
* concat
230+
* substring-after
231+
* starts-with
232+
* string-length
233+
* contains
234+
* translate
235+
* normalize-space
236+
* substring-before
237+
* boolean
238+
* true
239+
* not
240+
* false
241+
* number
242+
* ceiling
243+
* sum
244+
* round
245+
* floor
206246

articles/active-directory/cloud-provisioning/how-to-prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article provides guidance on how to choose and use Azure Active Directory (
2121
## Cloud provisioning agent requirements
2222
You need the following to use Azure AD Connect cloud provisioning:
2323

24-
- A global administrator account for your Azure AD tenant that is not a guest user.
24+
- A hybrid identity administrator account for your Azure AD tenant that is not a guest user.
2525
- An on-premises server for the provisioning agent with Windows 2012 R2 or later.
2626
- On-premises firewall configurations.
2727

@@ -32,7 +32,7 @@ The rest of the document provides step-by-step instructions for these prerequisi
3232

3333
### In the Azure Active Directory admin center
3434

35-
1. Create a cloud-only global administrator account on your Azure AD tenant. This way, you can manage the configuration of your tenant if your on-premises services fail or become unavailable. Learn about how to [add a cloud-only global administrator account](../active-directory-users-create-azure-portal.md). Finishing this step is critical to ensure that you don't get locked out of your tenant.
35+
1. Create a cloud-only hybrid identity administrator account on your Azure AD tenant. This way, you can manage the configuration of your tenant if your on-premises services fail or become unavailable. Learn about how to [add a cloud-only hybrid identity administrator account](../active-directory-users-create-azure-portal.md). Finishing this step is critical to ensure that you don't get locked out of your tenant.
3636
1. Add one or more [custom domain names](../active-directory-domains-add-azure-portal.md) to your Azure AD tenant. Your users can sign in with one of these domain names.
3737

3838
### In your directory in Active Directory

articles/active-directory/hybrid/how-to-connect-pta-security-deep-dive.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
14-
ms.date: 04/15/2019
14+
ms.date: 05/27/2020
1515
ms.subservice: hybrid
1616
ms.author: billmath
1717

@@ -71,6 +71,9 @@ Only global administrators can install an Authentication Agent (by using Azure A
7171
- The Authentication Agent application itself. This application runs with [NetworkService](https://msdn.microsoft.com/library/windows/desktop/ms684272.aspx) privileges.
7272
- The Updater application that's used to auto-update the Authentication Agent. This application runs with [LocalSystem](https://msdn.microsoft.com/library/windows/desktop/ms684190.aspx) privileges.
7373

74+
>[!IMPORTANT]
75+
>From a security standpoint, administrators should treat the server running the PTA agent as if it were a domain controller. The PTA agent servers should be hardened along the same lines as outlined in [Securing Domain Controllers Against Attack](https://docs.microsoft.com/windows-server/identity/ad-ds/plan/security-best-practices/securing-domain-controllers-against-attack)
76+
7477
### Authentication Agent registration
7578

7679
After you install the Authentication Agent, it needs to register itself with Azure AD. Azure AD assigns each Authentication Agent a unique, digital-identity certificate that it can use for secure communication with Azure AD.
48.7 KB
Loading
84.8 KB
Loading
-8.28 KB
Loading
34.5 KB
Loading
27 KB
Loading

0 commit comments

Comments
 (0)