Skip to content

Commit 0b9fd07

Browse files
authored
Merge pull request #234078 from MicrosoftDocs/main
4/11/2023 AM Publish
2 parents a89e738 + 34f9f8b commit 0b9fd07

File tree

84 files changed

+1485
-504
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+1485
-504
lines changed

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 04/04/2022
11+
ms.date: 04/11/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
1515

1616
# Plan an automatic user provisioning deployment in Azure Active Directory
1717

18-
Many organizations rely on software as a service (SaaS) applications such as ServiceNow, Zscaler, and Slack for end-user productivity. Historically IT staff have relied on manual provisioning methods such as uploading CSV files, or using custom scripts to securely manage user identities in each SaaS application. These processes are error prone, insecure, and hard to manage.
18+
Many organizations rely on software as a service (SaaS) applications such as ServiceNow, Zscaler, and Slack for end-user productivity. Historically IT staff has relied on manual provisioning methods such as uploading CSV files, or using custom scripts to securely manage user identities in each SaaS application. These processes are error prone, insecure, and hard to manage.
1919

2020
Azure Active Directory (Azure AD) automatic user provisioning simplifies this process by securely automating the creation, maintenance, and removal of user identities in SaaS applications based on business rules. This automation allows you to effectively scale your identity management systems on both cloud-only and hybrid environments as you expand their dependency on cloud-based solutions.
2121

@@ -33,7 +33,7 @@ The key benefits of enabling automatic user provisioning are:
3333

3434
* **Manage risk**. You can increase security by automating changes based on employee status or group memberships that define roles and/or access.
3535

36-
* **Address compliance and governance**. Azure AD supports native audit logs for every user provisioning request. Requests are executed in both the source and target systems. This enables you to track who has access to applications from a single screen.
36+
* **Address compliance and governance**. Azure AD supports native audit logs for every user provisioning request. Requests are executed in both the source and target systems. Audit logs let you track who has access to applications from a single screen.
3737

3838
* **Reduce cost**. Automatic user provisioning reduces costs by avoiding inefficiencies and human error associated with manual provisioning. It reduces the need for custom-developed user provisioning solutions, scripts, and audit logs.
3939

@@ -43,7 +43,7 @@ Azure AD provides self-service integration of any application using templates pr
4343

4444
#### Application licensing
4545

46-
You'll need the appropriate licenses for the application(s) you want to automatically provision. Discuss with the application owners whether the users assigned to the application have the proper licenses for their application roles. If Azure AD manages automatic provisioning based on roles, the roles assigned in Azure AD must align to application licenses. Incorrect licenses owned in the application may lead to errors during the provisioning/updating of a user.
46+
You need the appropriate licenses for the application(s) you want to automatically provision. Discuss with the application owners whether the users assigned to the application have the proper licenses for their application roles. If Azure AD manages automatic provisioning based on roles, the roles assigned in Azure AD must align to application licenses. Incorrect licenses owned in the application may lead to errors during the provisioning/updating of a user.
4747

4848
### Terms
4949

@@ -106,7 +106,7 @@ In this example, user creation occurs in Azure AD and the Azure AD provisioning
106106

107107
#### Automatic user provisioning for cloud HR applications
108108

109-
In this example, the users and or groups are created in a cloud HR application like such as Workday and SuccessFactors. The Azure AD provisioning service and Azure AD Connect provisioning agent provisions the user data from the cloud HR app tenant into AD. Once the accounts are updated in AD, it is synced with Azure AD through Azure AD Connect, and the email addresses and username attributes can be written back to the cloud HR app tenant.
109+
In this example, the users and or groups are created in a cloud HR application like such as Workday and SuccessFactors. The Azure AD provisioning service and Azure AD Connect provisioning agent provisions the user data from the cloud HR app tenant into AD. Once the accounts are updated in AD, it's synced with Azure AD through Azure AD Connect, and the email addresses and username attributes can be written back to the cloud HR app tenant.
110110

111111
![Picture 2](./media/plan-auto-user-provisioning/workdayprovisioning.png)
112112

@@ -132,7 +132,7 @@ Communication is critical to the success of any new service. Proactively communi
132132

133133
### Plan a pilot
134134

135-
We recommend that the initial configuration of automatic user provisioning be in a test environment with a small subset of users before scaling it to all users in production. See [best practices](../fundamentals/active-directory-deployment-plans.md#best-practices-for-a-pilot) for running a pilot.
135+
We recommend that the initial configuration of automatic user provisioning is in a test environment with a small subset of users before scaling it to all users in production. See [best practices](../fundamentals/active-directory-deployment-plans.md#best-practices-for-a-pilot) for running a pilot.
136136

137137
#### Best practices for a pilot  
138138

@@ -251,7 +251,7 @@ Choose the steps that align to your solution requirements.
251251

252252
When the Azure AD provisioning service runs for the first time, the initial cycle against the source system and target systems creates a snapshot of all user objects for each target system.
253253

254-
When enabling automatic provisioning for an application, the initial cycle can take anywhere from 20 minutes to several hours. The duration depends on the size of the Azure AD directory and the number of users in scope for provisioning.
254+
When you enable automatic provisioning for an application, the initial cycle takes anywhere from 20 minutes to several hours. The duration depends on the size of the Azure AD directory and the number of users in scope for provisioning.
255255

256256
The provisioning service stores the state of both systems after the initial cycle, improving performance of subsequent incremental cycles.
257257

articles/active-directory/develop/tutorial-v2-javascript-spa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -185,11 +185,11 @@ In the next steps, you'll create a new folder for the JavaScript SPA and set up
185185

186186
<!-- msal.js with a fallback to backup CDN -->
187187
<script src="https://alcdn.msauth.net/browser/2.30.0/js/msal-browser.js"
188-
integrity="sha384-L8LyrNcolaRZ4U+N06atid1fo+kBo8hdlduw0yx+gXuACcdZjjquuGZTA5uMmUdS"
188+
integrity="sha384-o4ufwq3oKqc7IoCcR08YtZXmgOljhTggRwxP2CLbSqeXGtitAxwYaUln/05nJjit"
189189
crossorigin="anonymous"></script>
190190

191191
<!-- adding Bootstrap 4 for UI components -->
192-
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css" integrity="sha384-o4ufwq3oKqc7IoCcR08YtZXmgOljhTggRwxP2CLbSqeXGtitAxwYaUln/05nJjit" crossorigin="anonymous">
192+
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css" integrity="sha384-Vkoo8x4CGsO3+Hhxv8T/Q5PaXtkKtu6ug5TOeNV6gBiFeWPGFN9MuhOf23Q9Ifjh" crossorigin="anonymous">
193193
</head>
194194
<body>
195195
<nav class="navbar navbar-expand-lg navbar-dark bg-primary">
@@ -585,4 +585,4 @@ The Microsoft Graph API requires the `User.Read` scope to read a user's profile.
585585
Delve deeper into SPA development on the Microsoft identity platform in the first part of a scenario series:
586586

587587
> [!div class="nextstepaction"]
588-
> [Scenario: Single-page application](scenario-spa-overview.md)
588+
> [Scenario: Single-page application](scenario-spa-overview.md)

articles/aks/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -361,9 +361,9 @@
361361
href: workload-identity-deploy-cluster.md
362362
- name: Modernize your app with workload identity
363363
href: workload-identity-migrate-from-pod-identity.md
364-
- name: Use Azure AD pod identity
364+
- name: Use Azure AD pod identity (preview)
365365
href: use-azure-ad-pod-identity.md
366-
- name: Use Pod Sandboxing
366+
- name: Use Pod Sandboxing (preview)
367367
href: use-pod-sandboxing.md
368368
- name: Secure pod traffic with network policies
369369
href: use-network-policies.md

articles/automation/extension-based-hybrid-runbook-worker-install.md

Lines changed: 87 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides information about deploying the extension-bas
44
services: automation
55
ms.subservice: process-automation
66
ms.custom: devx-track-azurepowershell, devx-track-azurecli
7-
ms.date: 04/05/2023
7+
ms.date: 04/10/2023
88
ms.topic: how-to
99
#Customer intent: As a developer, I want to learn about extension so that I can efficiently deploy Hybrid Runbook Workers.
1010
---
@@ -295,7 +295,17 @@ New-AzConnectedMachineExtension -ResourceGroupName <VMResourceGroupName> -Locati
295295

296296
#### [Bicep template](#tab/bicep-template)
297297

298-
You can use the Bicep template to create a new Hybrid Worker group, create a new Azure Windows VM and add it to an existing Hybrid Worker Group. Learn more about [Bicep](../azure-resource-manager/bicep/overview.md)
298+
You can use the Bicep template to create a new Hybrid Worker group, create a new Azure Windows VM and add it to an existing Hybrid Worker Group. Learn more about [Bicep](../azure-resource-manager/bicep/overview.md).
299+
300+
Follow the steps mentioned below as an example:
301+
302+
1. Create a Hybrid Worker Group.
303+
1. Create either an Azure VM or Arc-enabled server. Alternatively, you can also use an existing Azure VM or Arc-enabled server.
304+
1. Connect the Azure VM or Arc-enabled server to the above created Hybrid Worker Group.
305+
1. Generate a new GUID and pass it as the name of the Hybrid Worker.
306+
1. Enable System-assigned managed identity on the VM.
307+
1. Install Hybrid Worker Extension on the VM.
308+
1. To confirm if the extension has been successfully installed on the VM, in **Azure portal**, go to the VM > **Extensions** tab and check the status of the Hybrid Worker extension installed on the VM.
299309

300310
```Bicep
301311
param automationAccount string
@@ -524,6 +534,17 @@ output output1 string = automationAccount_resource.properties.automationHybridSe
524534

525535
You can use an Azure Resource Manager (ARM) template to create a new Azure Windows VM and connect it to an existing Automation account and Hybrid Worker Group. To learn more about ARM templates, see [What are ARM templates?](../azure-resource-manager/templates/overview.md)
526536

537+
Follow the steps mentioned below as an example:
538+
539+
1. Create a Hybrid Worker Group.
540+
1. Create either an Azure VM or Arc-enabled server. Alternatively, you can also use an existing Azure VM or Arc-enabled server.
541+
1. Connect the Azure VM or Arc-enabled server to the above created Hybrid Worker Group.
542+
1. Generate a new GUID and pass it as the name of the Hybrid Worker.
543+
1. Enable System-assigned managed identity on the VM.
544+
1. Install Hybrid Worker Extension on the VM.
545+
1. To confirm if the extension has been successfully installed on the VM, in **Azure portal**, go to the VM > **Extensions** tab and check the status of the Hybrid Worker extension installed on the VM.
546+
547+
527548
**Review the template**
528549

529550
```json
@@ -953,6 +974,28 @@ To install and use Hybrid Worker extension using REST API, follow these steps. T
953974
954975
#### [Azure CLI](#tab/cli)
955976
977+
You can use Azure CLI to create a new Hybrid Worker group, create a new Azure VM, add it to an existing Hybrid Worker Group and install the Hybrid Worker extension. Learn more about [Azure CLI](https://learn.microsoft.com/cli/azure/what-is-azure-cli).
978+
979+
Follow the steps mentioned below as an example:
980+
981+
1. Create a Hybrid Worker Group.
982+
```azurecli-interactive
983+
az automation hrwg create --automation-account-name accountName --resource-group groupName --name hybridrunbookworkergroupName
984+
```
985+
1. Create an Azure VM or Arc-enabled server and add it to the above created Hybrid Worker Group. Use the below command to add an existing Azure VM or Arc-enabled Server to the Hybrid Worker Group. Generate a new GUID and pass it as `hybridRunbookWorkerGroupName`. To fetch `vmResourceId`, go to the **Properties** tab of the VM on Azure portal.
986+
987+
```azurecli-interactive
988+
az automation hrwg hrw create --automation-account-name accountName --resource-group groupName --hybrid-runbook-worker-group-name hybridRunbookWorkerGroupName --hybrid-runbook-worker-id
989+
```
990+
1. Follow the steps [here](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md#enable-system-assigned-managed-identity-on-an-existing-vm) to enable the System-assigned managed identity on the VM.
991+
1. Install Hybrid Worker Extension on the VM
992+
993+
```azurecli-interactive
994+
az vm extension set --name HybridWorkerExtension --publisher Microsoft.Azure.Automation.HybridWorker --version 1.1 --vm-name <vmname> -g <resourceGroupName> \
995+
--settings '{"AutomationAccountURL" = "<registration-url>";}' --enable-auto-upgrade true
996+
```
997+
1. To confirm if the extension has been successfully installed on the VM, in **Azure portal**, go to the VM > **Extensions** tab and check the status of the Hybrid Worker extension installed on the VM.
998+
956999
**Manage Hybrid Worker Extension**
9571000

9581001
- To create, delete, and manage extension-based Hybrid Runbook Worker groups, see [az automation hrwg | Microsoft Docs](/cli/azure/automation/hrwg)
@@ -963,6 +1006,48 @@ After creating new Hybrid Runbook Worker, you must install the extension on the
9631006

9641007
#### [PowerShell](#tab/ps)
9651008

1009+
You can use PowerShell cmdlets to create a new Hybrid Worker group, create a new Azure VM, add it to an existing Hybrid Worker Group and install the Hybrid Worker extension.
1010+
1011+
Follow the steps mentioned below as an example:
1012+
1013+
1. Create a Hybrid Worker Group.
1014+
1015+
```powershell-interactive
1016+
New-AzAutomationHybridRunbookWorkerGroup -AutomationAccountName "Contoso17" -Name "RunbookWorkerGroupName" -ResourceGroupName "ResourceGroup01"
1017+
```
1018+
1. Create an Azure VM or Arc-enabled server and add it to the above created Hybrid Worker Group. Use the below command to add an existing Azure VM or Arc-enabled Server to the Hybrid Worker Group. Generate a new GUID and pass it as `hybridRunbookWorkerGroupName`. To fetch `vmResourceId`, go to the **Properties** tab of the VM on Azure portal.
1019+
1020+
```azurepowershell
1021+
New-AzAutomationHybridRunbookWorker -AutomationAccountName "Contoso17" -Name "RunbookWorkerName" -HybridRunbookWorkerGroupName "RunbookWorkerGroupName" -VmResourceId "VmResourceId" -ResourceGroupName "ResourceGroup01"
1022+
```
1023+
1. Follow the steps [here](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md#enable-system-assigned-managed-identity-on-an-existing-vm) to enable the System-assigned managed identity on the VM.
1024+
1025+
1. Install Hybrid Worker Extension on the VM.
1026+
1027+
**Hybrid Worker extension settings**
1028+
1029+
```powershell-interactive
1030+
$settings = @{
1031+
"AutomationAccountURL" = "<registrationurl>";
1032+
};
1033+
```
1034+
1035+
**Azure VMs**
1036+
1037+
```powershell
1038+
Set-AzVMExtension -ResourceGroupName <VMResourceGroupName> -Location <VMLocation> -VMName <VMName> -Name "HybridWorkerExtension" -Publisher "Microsoft.Azure.Automation.HybridWorker" -ExtensionType HybridWorkerForWindows -TypeHandlerVersion 1.1 -Settings $settings -EnableAutomaticUpgrade $true/$false
1039+
```
1040+
**Azure Arc-enabled VMs**
1041+
1042+
```powershell
1043+
New-AzConnectedMachineExtension -ResourceGroupName <VMResourceGroupName> -Location <VMLocation> -MachineName <VMName> -Name "HybridWorkerExtension" -Publisher "Microsoft.Azure.Automation.HybridWorker" -ExtensionType HybridWorkerForWindows -TypeHandlerVersion 1.1 -Setting $settings -NoWait -EnableAutomaticUpgrade
1044+
```
1045+
1046+
1. To confirm if the extension has been successfully installed on the VM, In **Azure portal**, go to the VM > **Extensions** tab and check the status of Hybrid Worker extension installed on the VM.
1047+
1048+
1049+
**Manage Hybrid Worker Extension**
1050+
9661051
You can use the following PowerShell cmdlets to manage Hybrid Runbook Worker and Hybrid Runbook Worker groups:
9671052

9681053
| PowerShell cmdlet | Description |
Loading
Loading

0 commit comments

Comments
 (0)