You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/plan-cloud-hr-provision.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,10 +76,11 @@ You also need a valid Azure AD Premium P1 or higher subscription license for eve
76
76
77
77
### Prerequisites
78
78
79
-
- Azure AD global administrator access to configure the Azure AD Connect provisioning agent.
79
+
- Azure AD [hybrid identity administrator](../users-groups-roles/directory-assign-admin-roles.md#hybrid-identity-administrator) to configure the Azure AD Connect provisioning agent.
80
+
- Azure AD [application administrator](../users-groups-roles/directory-assign-admin-roles.md#application-administrator) role to configure the provisioning app in the Azure portal
80
81
- A test and production instance of the cloud HR app.
81
82
- Administrator permissions in the cloud HR app to create a system integration user and make changes to test employee data for testing purposes.
82
-
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the [Azure AD Connect provisioning agent](https://go.microsoft.com/fwlink/?linkid=847801).
83
+
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the Azure AD Connect provisioning agent
83
84
-[Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) for synchronizing users between Active Directory and Azure AD.
84
85
85
86
### Training resources
@@ -243,7 +244,7 @@ By default, the attribute in the cloud HR app that represents the unique employe
243
244
244
245
You can set multiple matching attributes and assign matching precedence. They're evaluated on matching precedence. As soon as a match is found, no further matching attributes are evaluated.
245
246
246
-
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#planning-workday-to-active-directory-user-attribute-mapping-and-transformations)) for a list of custom attributes to map.
247
+
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration)) for a list of custom attributes to map.
247
248
248
249
### Determine user account status
249
250
@@ -280,7 +281,7 @@ When you initiate the Joiners-Movers-Leavers process, gather the following requi
280
281
|| What effective dates are considered for processing user termination? |
281
282
|| How do employee and contingent worker conversions impact existing Active Directory accounts? |
282
283
283
-
Depending on your requirements, you can modify the mappings to meet your integration goals. For more information, see the specific cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#planning-workday-to-active-directory-user-attribute-mapping-and-transformations)) for a list of custom attributes to map.
284
+
Depending on your requirements, you can modify the mappings to meet your integration goals. For more information, see the specific cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#part-4-configure-attribute-mappings)) for a list of custom attributes to map.
284
285
285
286
### Generate a unique attribute value
286
287
@@ -360,7 +361,9 @@ The cloud HR user provisioning implementation might fail to work as desired in t
360
361
361
362
Choose the cloud HR app that aligns to your solution requirements.
362
363
363
-
**Workday**: To import worker profiles from Workday into Active Directory and Azure AD, see [Tutorial: Configure Workday for automatic user provisioning](../saas-apps/workday-inbound-tutorial.md#planning-your-deployment). Optionally, you can write back the email address and username to Workday.
364
+
**Workday**: To import worker profiles from Workday into Active Directory and Azure AD, see [Tutorial: Configure Workday for automatic user provisioning](../saas-apps/workday-inbound-tutorial.md#planning-your-deployment). Optionally, you can write back the email address, username and phone number to Workday.
365
+
366
+
**SAP SuccessFactors**: To import worker profiles from SuccessFactors into Active Directory and Azure AD, see [Tutorial: Configure SAP SuccessFactors for automatic user provisioning](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md). Optionally, you can write back the email address and username to SuccessFactors.
@@ -120,7 +120,7 @@ If you are using WWS API v30.0 or above in the connection URL as shown below:
120
120
To configure additional XPATHs, refer to the section [Tutorial: Managing your configuration](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration).
121
121
122
122
123
-
|\#| Name | Workday XPATH API expression |
123
+
|\#|Workday Attribute Name | Workday XPATH API expression |
The table below provides a list of other commonly used custom XPATH API expressions when provisioning workers from Workday to Active Directory or Azure AD. Please test the XPATH API expressions provided here with your version of Workday referring to the instructions captured in the section [Tutorial: Managing your configuration](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration).
208
+
209
+
To add more attributes to the XPATH table for the benefit of customers implementing this integration, please leave a comment below or directly [contribute](https://docs.microsoft.com/contribute) to the article.
210
+
211
+
> [!div class="mx-tdBreakAll"]
212
+
> |\#| Workday Attribute Name | Workday API version | Workday XPATH API expression |
Given below is the list of XPATH functions supported by [Microsoft .NET XPATH library](https://docs.microsoft.com/previous-versions/dotnet/netframework-4.0/ms256138(v=vs.100)) that you can use while creating your XPATH API expression.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-provisioning/how-to-prerequisites.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ This article provides guidance on how to choose and use Azure Active Directory (
21
21
## Cloud provisioning agent requirements
22
22
You need the following to use Azure AD Connect cloud provisioning:
23
23
24
-
- A global administrator account for your Azure AD tenant that is not a guest user.
24
+
- A hybrid identity administrator account for your Azure AD tenant that is not a guest user.
25
25
- An on-premises server for the provisioning agent with Windows 2012 R2 or later.
26
26
- On-premises firewall configurations.
27
27
@@ -32,7 +32,7 @@ The rest of the document provides step-by-step instructions for these prerequisi
32
32
33
33
### In the Azure Active Directory admin center
34
34
35
-
1. Create a cloud-only global administrator account on your Azure AD tenant. This way, you can manage the configuration of your tenant if your on-premises services fail or become unavailable. Learn about how to [add a cloud-only global administrator account](../active-directory-users-create-azure-portal.md). Finishing this step is critical to ensure that you don't get locked out of your tenant.
35
+
1. Create a cloud-only hybrid identity administrator account on your Azure AD tenant. This way, you can manage the configuration of your tenant if your on-premises services fail or become unavailable. Learn about how to [add a cloud-only hybrid identity administrator account](../active-directory-users-create-azure-portal.md). Finishing this step is critical to ensure that you don't get locked out of your tenant.
36
36
1. Add one or more [custom domain names](../active-directory-domains-add-azure-portal.md) to your Azure AD tenant. Your users can sign in with one of these domain names.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-pta-security-deep-dive.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.workload: identity
11
11
ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
-
ms.date: 04/15/2019
14
+
ms.date: 05/27/2020
15
15
ms.subservice: hybrid
16
16
ms.author: billmath
17
17
@@ -71,6 +71,9 @@ Only global administrators can install an Authentication Agent (by using Azure A
71
71
- The Authentication Agent application itself. This application runs with [NetworkService](https://msdn.microsoft.com/library/windows/desktop/ms684272.aspx) privileges.
72
72
- The Updater application that's used to auto-update the Authentication Agent. This application runs with [LocalSystem](https://msdn.microsoft.com/library/windows/desktop/ms684190.aspx) privileges.
73
73
74
+
>[!IMPORTANT]
75
+
>From a security standpoint, administrators should treat the server running the PTA agent as if it were a domain controller. The PTA agent servers should be hardened along the same lines as outlined in [Securing Domain Controllers Against Attack](https://docs.microsoft.com/windows-server/identity/ad-ds/plan/security-best-practices/securing-domain-controllers-against-attack)
76
+
74
77
### Authentication Agent registration
75
78
76
79
After you install the Authentication Agent, it needs to register itself with Azure AD. Azure AD assigns each Authentication Agent a unique, digital-identity certificate that it can use for secure communication with Azure AD.
0 commit comments