Skip to content

Commit 146e0d9

Browse files
authored
Merge pull request #178931 from v-missam/asana
asana & gov cloud-1
2 parents 654d828 + d955bb6 commit 146e0d9

21 files changed

+183
-55
lines changed

articles/active-directory/saas-apps/15five-provisioning-tutorial.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
3838
* [A 15Five tenant](https://www.15five.com/pricing/).
3939
* A user account in 15Five with Admin permissions.
4040

41+
> [!NOTE]
42+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
43+
4144
## Step 1. Plan your provisioning deployment
4245
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
4346
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).

articles/active-directory/saas-apps/4me-provisioning-tutorial.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
3030
* [A 4me tenant](https://www.4me.com/trial/)
3131
* A user account in 4me with Admin permissions.
3232

33+
> [!NOTE]
34+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
35+
3336
## Add 4me from the gallery
3437

3538
Before configuring 4me for automatic user provisioning with Azure AD, you need to add 4me from the Azure AD application gallery to your list of managed SaaS applications.

articles/active-directory/saas-apps/8x8-provisioning-tutorial.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
3434
* An 8x8 user account with administrator permission in [Admin Console](https://vo-cm.8x8.com).
3535
* [Single Sign-On with Azure AD](./8x8virtualoffice-tutorial.md) has already been configured.
3636

37+
> [!NOTE]
38+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
39+
3740
## Step 1. Plan your provisioning deployment
3841
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
3942
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
Lines changed: 106 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,36 @@
11
---
2-
title: 'Tutorial: User provisioning for Asana - Azure AD'
3-
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to Asana.
2+
title: 'Tutorial: Configure Asana for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Asana.
44
services: active-directory
5-
author: ArvindHarinder1
6-
manager: CelesteDG
5+
author: twimmers
6+
writer: twimmers
7+
manager: beatrizd
8+
9+
ms.assetid: 274810a2-bd74-4500-95f1-c720abf23541
710
ms.service: active-directory
811
ms.subservice: saas-app-tutorial
912
ms.workload: identity
1013
ms.topic: tutorial
1114
ms.date: 03/27/2019
12-
ms.author: arvinh
13-
ms.reviewer: celested
15+
ms.author: thwimmer
1416
---
1517

1618
# Tutorial: Configure Asana for automatic user provisioning
1719

18-
The objective of this tutorial is to show you the steps you need to perform in Asana and Azure Active Directory (Azure AD) to automatically provision and de-provision user accounts from Azure AD to Asana.
20+
This tutorial describes the steps you need to do in both Asana and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Asana](https://www.asana.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
21+
22+
23+
## Capabilities Supported
24+
> [!div class="checklist"]
25+
> * Create users in Asana.
26+
> * Remove users in Asana when they do not require access anymore.
27+
> * Keep user attributes synchronized between Azure AD and Asana.
28+
> * Provision groups and group memberships in Asana.
29+
> * [Single sign-on](asana-tutorial.md) to Asana(recommended).
1930
2031
## Prerequisites
2132

22-
The scenario outlined in this tutorial assumes that you already have the following items:
33+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
2334

2435
* An Azure AD tenant
2536
* An Asana tenant with an [Enterprise](https://www.asana.com/pricing) plan or better enabled
@@ -28,69 +39,123 @@ The scenario outlined in this tutorial assumes that you already have the followi
2839
> [!NOTE]
2940
> Azure AD provisioning integration relies on the [Asana API](https://asana.com/developers/api-reference/users), which is available to Asana.
3041
31-
## Assign users to Asana
42+
## Step 1. Plan your provisioning deployment
43+
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
44+
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
45+
1. Determine what data to [map between Azure AD and Asana](../app-provisioning/customize-application-attributes.md).
46+
47+
## Step 2. Configure Asana to support provisioning with Azure AD
48+
> [!TIP]
49+
> To enable SAML-based single sign-on for Asana, follow the instructions provided in the Azure portal. Single sign-on can be configured independently of automatic provisioning, although these two features complement each other.
50+
51+
### Generate Secret Token in Asana
52+
53+
* Sign in to [Asana](https://app.asana.com/) by using your admin account.
54+
* Select the profile photo from the top bar, and select your current organization-name settings.
55+
* Go to the **Service Accounts** tab.
56+
* Select **Add Service Account**.
57+
* Update **Name** and **About** and the profile photo as needed. Copy the token in **Token**, and select it in Save Changes.
3258

33-
Azure AD uses a concept called *assignments* to determine which users should receive access to selected apps. In the context of automatic user account provisioning, only the users assigned to an application in Azure AD are synchronized.
59+
## Step 3. Add Asana from the Azure AD application gallery
3460

35-
Before you configure and enable the provisioning service, you must decide which users in Azure AD need access to your Asana app. Then you can assign these users to your Asana app by following the instructions here:
61+
Add Asana from the Azure AD application gallery to start managing provisioning to Asana. If you have previously setup Asana for SSO, you can use the same application. However it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
3662

37-
[Assign a user to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md)
63+
## Step 4. Define who will be in scope for provisioning
3864

39-
### Important tips for assigning users to Asana
65+
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
4066

41-
We recommend that you assign a single Azure AD user to Asana to test the provisioning configuration. Additional users can be assigned later.
67+
* When assigning users and groups to Asana, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add more roles.
4268

43-
## Configure user provisioning to Asana
69+
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
4470

45-
This section guides you through connecting your Azure AD to Asana user account provisioning API. You also configure the provisioning service to create, update, and disable assigned user accounts in Asana based on user assignments in Azure AD.
4671

47-
> [!TIP]
48-
> To enable SAML-based single sign-on for Asana, follow the instructions provided in the [Azure portal](https://portal.azure.com). Single sign-on can be configured independently of automatic provisioning, although these two features complement each other.
72+
## Step 5. Configure automatic user provisioning to Asana
4973

50-
### To configure automatic user account provisioning to Asana in Azure AD
74+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and groups in Asana based on user and/or group assignments in Azure AD.
5175

52-
1. In the [Azure portal](https://portal.azure.com), browse to the **Azure Active Directory** > **Enterprise Apps** > **All applications** section.
76+
### To configure automatic user provisioning for Asana in Azure AD:
5377

54-
1. If you already configured Asana for single sign-on, search for your instance of Asana by using the search field. Otherwise, select **Add** and search for **Asana** in the application gallery. Select **Asana** from the search results, and add it to your list of applications.
78+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
5579

56-
1. Select your instance of Asana, and then select the **Provisioning** tab.
80+
![Enterprise applications blade](common/enterprise-applications.png)
5781

58-
1. Set **Provisioning Mode** to **Automatic**.
82+
1. In the applications list, select **Asana**.
5983

60-
![Asana Provisioning](./media/asana-provisioning-tutorial/asanaazureprovisioning.png)
84+
![The Asana link in the Applications list](common/all-applications.png)
6185

62-
1. Under the **Admin Credentials** section, follow these instructions to generate the token and enter it in **Secret Token**:
86+
1. Select the **Provisioning** tab.
6387

64-
a. Sign in to [Asana](https://app.asana.com) by using your admin account.
88+
![Provisioning tab](common/provisioning.png)
6589

66-
b. Select the profile photo from the top bar, and select your current organization-name settings.
90+
1. Set the **Provisioning Mode** to **Automatic**.
6791

68-
c. Go to the **Service Accounts** tab.
92+
![Provisioning tab automatic](common/provisioning-automatic.png)
6993

70-
d. Select **Add Service Account**.
94+
1. In the **Admin Credentials** section, input your Asana Tenant URL and Secret Token provided by Asana. Click **Test Connection** to ensure Azure AD can connect to Asana. If the connection fails, contact Asana to check your account setup.
7195

72-
e. Update **Name** and **About** and the profile photo as needed. Copy the token in **Token**, and select it in **Save Changes**.
96+
![Token](common/provisioning-testconnection-tenanturltoken.png)
7397

74-
1. In the Azure portal, select **Test Connection** to ensure that Azure AD can connect to your Asana app. If the connection fails, ensure that your Asana account has admin permissions, and try the **Test Connection** step again.
98+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
7599

76-
1. Enter the email address of a person or group that you want to receive provisioning error notifications in **Notification Email**. Select the check box underneath.
100+
![Notification Email](common/provisioning-notification-email.png)
77101

78102
1. Select **Save**.
79103

80-
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Asana**.
104+
1. In the **Mappings** section, select **Synchronize Azure Active Directory Users to Asana**.
81105

82-
1. In the **Attribute Mappings** section, review the user attributes to be synchronized from Azure AD to Asana. The attributes selected as **Matching** properties are used to match the user accounts in Asana for update operations. Select **Save** to commit any changes. For more information, see [Customize user provision attribute mappings](../app-provisioning/customize-application-attributes.md).
106+
1. Review the user attributes that are synchronized from Azure AD to Asana in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Asana for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the Asana API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
83107

84-
1. To enable the Azure AD provisioning service for Asana, in the **Settings** section, change **Provisioning Status** to **On**.
108+
|Attribute|Type|Supported for filtering|Required by Asana|
109+
|---|---|---|---|
110+
|userName|String|✓|✓|
111+
|active|Boolean|||
112+
|name.formatted|String|||
113+
|preferredLanguage|String|||
114+
|title|String|||
115+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department|String|||
85116

86-
1. Select **Save**.
87117

88-
Now the initial synchronization starts for any users assigned to Asana in the **Users** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the service is running. Use the **Synchronization Details** section to monitor progress and follow links to provisioning activity logs. The audit logs describe all actions performed by the provisioning service on your Asana app.
118+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Asana**.
119+
120+
1. Review the group attributes that are synchronized from Azure AD to Asana in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Asana for update operations. Select the **Save** button to commit any changes.
121+
122+
|Attribute|Type|Supported for filtering|Required by Asana|
123+
|---|---|---|---|
124+
|displayName|String|✓|✓
125+
|members|Reference|||
126+
127+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
128+
129+
1. To enable the Azure AD provisioning service for Asana, change the **Provisioning Status** to **On** in the **Settings** section.
89130

90-
For more information on how to read the Azure AD provisioning logs, see [Report on automatic user account provisioning](../app-provisioning/check-status-user-account-provisioning.md).
131+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
91132

92-
## Additional resources
133+
1. Define the users and groups that you would like to provision to Asana by choosing the appropriate values in **Scope** in the **Settings** section.
93134

94-
* [Manage user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
135+
![Provisioning Scope](common/provisioning-scope.png)
136+
137+
1. When you're ready to provision, click **Save**.
138+
139+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
140+
141+
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to execute than next cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
142+
143+
## Step 6. Monitor your deployment
144+
Once you've configured provisioning, use the following resources to monitor your deployment:
145+
146+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
147+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion
148+
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
149+
150+
## Change log
151+
152+
* 11/06/2021 - Dropped support for **externalId, name.givenName and name.familyName**. Added support for **preferredLanguage , title and urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department**. And enabled **Group Provisioning**.
153+
154+
## More resources
155+
156+
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
95157
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
96-
* [Configure single sign-on](asana-tutorial.md)
158+
159+
## Next steps
160+
161+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

articles/active-directory/saas-apps/atlassian-cloud-provisioning-tutorial.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
3535
* [An Atlassian Cloud tenant](https://www.atlassian.com/licensing/cloud)
3636
* A user account in Atlassian Cloud with Admin permissions.
3737

38+
> [!NOTE]
39+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
40+
3841
## Step 1. Plan your provisioning deployment
3942
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
4043
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).

articles/active-directory/saas-apps/blink-provisioning-tutorial.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
3030
* [A Blink tenant](https://joinblink.com/pricing)
3131
* A user account in Blink with Admin permissions.
3232

33+
> [!NOTE]
34+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
35+
3336
## Assigning users to Blink
3437

3538
Azure Active Directory uses a concept called *assignments* to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users and/or group members that have been assigned to an application in Azure AD are synchronized.

articles/active-directory/saas-apps/cisco-webex-provisioning-tutorial.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
3030
* [A Cisco Webex tenant](https://www.webex.com/pricing/index.html).
3131
* A user account in Cisco Webex with Admin permissions.
3232

33+
> [!NOTE]
34+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
35+
3336
## Adding Cisco Webex from the gallery
3437

3538
Before configuring Cisco Webex for automatic user provisioning with Azure AD, you need to add Cisco Webex from the Azure AD application gallery to your list of managed SaaS applications.

0 commit comments

Comments
 (0)