Skip to content

Commit 088ae51

Browse files
committed
Entra ID step changes
1 parent 4f50983 commit 088ae51

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 07/18/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -180,12 +180,12 @@ To illustrate the procedure, let's use the CSV file `Samples/csv-with-2-records.
180180

181181
This section explains how to send the generated bulk request payload to your inbound provisioning API endpoint.
182182

183-
1. Log in to your Microsoft Entra admin center as *Application Administrator* or *Global Administrator*.
184-
1. Copy the `ServicePrincipalId` associated with your provisioning app from **Provisioning App** > **Properties** > **Object ID**.
183+
1. Log in to your [Microsoft Entra admin center](https://entra.micsrosoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
184+
1. Browse to **Provisioning App** > **Properties** > **Object ID** and copy the `ServicePrincipalId` associated with your provisioning app.
185185

186186
:::image type="content" border="true" source="./media/inbound-provisioning-api-powershell/object-id.png" alt-text="Screenshot of the Object ID." lightbox="./media/inbound-provisioning-api-powershell/object-id.png":::
187187

188-
1. As user with *Global Administrator* role, run the following command by providing the correct values for `ServicePrincipalId` and `TenantId`. It will prompt you for authentication if an authenticated session doesn't already exist for this tenant. Provide your consent to permissions prompted during authentication.
188+
1. As user with Global Administrator role, run the following command by providing the correct values for `ServicePrincipalId` and `TenantId`. It will prompt you for authentication if an authenticated session doesn't already exist for this tenant. Provide your consent to permissions prompted during authentication.
189189

190190
```powershell
191191
.\CSV2SCIM.ps1 -Path '..\Samples\csv-with-2-records.csv' -AttributeMapping $AttributeMapping -ServicePrincipalId <servicePrincipalId> -TenantId "contoso.onmicrosoft.com"
@@ -204,7 +204,7 @@ This section explains how to send the generated bulk request payload to your inb
204204
$ThumbPrint = $ClientCertificate.ThumbPrint
205205
```
206206
The generated certificate is stored **Current User\Personal\Certificates**. You can view it using the **Control Panel** -> **Manage user certificates** option.
207-
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as *Application Administrator*.
207+
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as Application Administrator.
208208
1. Open [the service principal you configured](inbound-provisioning-api-grant-access.md#configure-a-service-principal) under **App Registrations**.
209209
1. Copy the **Object ID** from the **Overview** blade. Use the value to replace the string `<AppObjectId>`. Copy the **Application (client) Id**. We will use it later and it is referenced as `<AppClientId>`.
210210
1. Run the following command to upload your certificate to the registered service principal.

0 commit comments

Comments
 (0)