Skip to content

Commit 1be6b74

Browse files
committed
updating
1 parent 8034045 commit 1be6b74

File tree

1 file changed

+28
-28
lines changed

1 file changed

+28
-28
lines changed

includes/active-directory-app-provisioning-ldap.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -103,20 +103,20 @@ In order to enable SSL to work, you need to grant the NETWORK SERVICE read permi
103103
Now that we have configured the certificate and granted the network service account permissions, test the connectivity to verify that it is working.
104104
1. Open Server Manager and select AD LDS on the left
105105
2. Right-click your instance of AD LDS and select ldp.exe from the pop-up.
106-
![Ldp tool location](media/active-directory-app-provisioning-ldap/ldp-1.png)</br>
106+
[![Ldp tool location](media/active-directory-app-provisioning-ldap/ldp-1.png)](media/active-directory-app-provisioning-ldap/ldp-1.png#lightbox)</br>
107107
3. At the top of ldp.exe, select **Connection** and **Connect**.
108108
4. Enter the following information and click **OK**.
109109
- Server: APP3
110110
- Port: 636
111111
- Place a check in the SSL box
112-
![Ldp connection configuration](media/active-directory-app-provisioning-ldap/ldp-2.png)</br>
112+
[![Ldp connection configuration](media/active-directory-app-provisioning-ldap/ldp-2.png)</br>
113113
5. You should see a response similar to the screenshot below.
114-
![Ldp connection configuration success](media/active-directory-app-provisioning-ldap/ldp-3.png)</br>
114+
![Ldp connection configuration success](media/active-directory-app-provisioning-ldap/ldp-3.png)](media/active-directory-app-provisioning-ldap/ldp-3.png#lightbox)</br>
115115
6. At the top, under **Connection** select **Bind**.
116116
7. Leave the defaults and click **OK**.
117-
![Ldp bind](media/active-directory-app-provisioning-ldap/ldp-4.png)</br>
117+
[![Ldp bind](media/active-directory-app-provisioning-ldap/ldp-4.png)](media/active-directory-app-provisioning-ldap/ldp-4.png#lightbox)</br>
118118
8. You should now, successfully bind to the instance.
119-
![ldp bind success](media/active-directory-app-provisioning-ldap/ldp-5.png)</br>
119+
[![ldp bind success](media/active-directory-app-provisioning-ldap/ldp-5.png)](media/active-directory-app-provisioning-ldap/ldp-5.png#lightbox)</br>
120120

121121

122122

@@ -131,22 +131,22 @@ Now that we have configured the certificate and granted the network service acco
131131
7. Under **On-Premises Connectivity**, download the agent installer.
132132
8. Run the Azure AD Connect provisioning installer **AADConnectProvisioningAgentSetup.msi**.
133133
9. On the **Microsoft Azure AD Connect Provisioning Agent Package** screen, accept the licensing terms, and select **Install**.
134-
![Microsoft Azure AD Connect Provisioning Agent Package screen.](media/active-directory-app-provisioning-sql/install-1.png)</br>
134+
[![Microsoft Azure AD Connect Provisioning Agent Package screen.](media/active-directory-app-provisioning-sql/install-1.png)](media/active-directory-app-provisioning-sql/install-1.png#lightbox)</br>
135135
10. After this operation finishes, the configuration wizard starts. Select **Next**.
136-
![Screenshot that shows the Welcome screen.](media/active-directory-app-provisioning-sql/install-2.png)</br>
136+
[![Screenshot that shows the Welcome screen.](media/active-directory-app-provisioning-sql/install-2.png)](media/active-directory-app-provisioning-sql/install-2.png#lightbox)</br>
137137
11. On the **Select Extension** screen, select **On-premises application provisioning (Azure AD to application)**. Select **Next**.
138-
![Screenshot that shows Select extension.](media/active-directory-app-provisioning-sql/install-3.png)</br>
138+
[![Screenshot that shows Select extension.](media/active-directory-app-provisioning-sql/install-3.png)](media/active-directory-app-provisioning-sql/install-3.png#lightbox)</br>
139139
12. Use your global administrator account to sign in to Azure AD.
140-
![Screenshot that shows Azure sign-in.](media/active-directory-app-provisioning-sql/install-4.png)</br>
140+
[![Screenshot that shows Azure sign-in.](media/active-directory-app-provisioning-sql/install-4.png)](media/active-directory-app-provisioning-sql/install-4.png#lightbox)</br>
141141
13. On the **Agent configuration** screen, select **Confirm**.
142-
![Screenshot that shows Confirm installation.](media/active-directory-app-provisioning-sql/install-5.png)</br>
142+
[![Screenshot that shows Confirm installation.](media/active-directory-app-provisioning-sql/install-5.png)](media/active-directory-app-provisioning-sql/install-5.png#lightbox)</br>
143143
14. After the installation is complete, you should see a message at the bottom of the wizard. Select **Exit**.
144-
![Screenshot that shows finishing.](media/active-directory-app-provisioning-sql/install-6.png)</br>
144+
[![Screenshot that shows finishing.](media/active-directory-app-provisioning-sql/install-6.png)](media/active-directory-app-provisioning-sql/install-6.png#lightbox)</br>
145145
15. Go to back to the Azure portal under the **On-premises ECMA app** application, and back to **Edit Provisioning**.
146146
16. On the **Provisioning** page, change the mode to **Automatic**.
147-
![Screenshot that shows changing the mode to Automatic.](.\media\active-directory-app-provisioning-sql\configure-7.png)</br>
147+
[![Screenshot that shows changing the mode to Automatic.](.\media\active-directory-app-provisioning-sql\configure-7.png)](.\media\active-directory-app-provisioning-sql\configure-7.png#lightbox)</br>
148148
17. On the **On-Premises Connectivity** section, select the agent that you just deployed and select **Assign Agent(s)**.
149-
![Screenshot that shows restarting an agent.](.\media\active-directory-app-provisioning-ldap\assign-1.png)</br>
149+
[![Screenshot that shows restarting an agent.](.\media\active-directory-app-provisioning-ldap\assign-1.png)](.\media\active-directory-app-provisioning-ldap\assign-1.png#lightbox)</br>
150150
>[!NOTE]
151151
>After you add the agent, wait 10 minutes for the registration to complete. The connectivity test won't work until the registration completes.
152152
>
@@ -155,16 +155,16 @@ Now that we have configured the certificate and granted the network service acco
155155
## Configure the Azure AD ECMA Connector Host certificate
156156
1. On the desktop, select the ECMA shortcut.
157157
2. After the ECMA Connector Host Configuration starts, leave the default port **8585** and select **Generate** to generate a certificate. The autogenerated certificate will be self-signed as part of the trusted root. The SAN matches the host name.
158-
![Screenshot that shows configuring your settings.](.\media\active-directory-app-provisioning-sql\configure-1.png)
158+
[![Screenshot that shows configuring your settings.](.\media\active-directory-app-provisioning-sql\configure-1.png)](.\media\active-directory-app-provisioning-sql\configure-1.png#lightbox)
159159
3. Select **Save**.
160160

161161

162162
## Configure a generic LDAP connector
163163
1. Select the ECMA Connector Host shortcut on the desktop.
164164
2. Select **New Connector**.
165-
![Screenshot that shows choosing New Connector.](.\media\active-directory-app-provisioning-sql\sql-3.png)</br>
165+
[![Screenshot that shows choosing New Connector.](.\media\active-directory-app-provisioning-sql\sql-3.png)](.\media\active-directory-app-provisioning-sql\sql-3.png#lightbox)</br>
166166
3. On the **Properties** page, fill in the boxes with the values specified in the table that follows the image and select **Next**.
167-
![Screenshot that shows entering properties.](.\media\active-directory-app-provisioning-ldap\create-1.png)
167+
[![Screenshot that shows entering properties.](.\media\active-directory-app-provisioning-ldap\create-1.png)](.\media\active-directory-app-provisioning-ldap\create-1.png#lightbox)
168168

169169
|Property|Value|
170170
|-----|-----|
@@ -173,7 +173,7 @@ Now that we have configured the certificate and granted the network service acco
173173
|Secret Token|Enter your own key here. It should be 12 characters minimum.|
174174
|Extension DLL|For a generic LDAP connector, select **Microsoft.IAM.Connector.GenericLdap.dll**.|
175175
4. On the **Connectivity** page, fill in the boxes with the values specified in the table that follows the image and select **Next**.
176-
![Screenshot that shows the Connectivity page.](.\media\active-directory-app-provisioning-ldap\create-2.png)</br>
176+
[![Screenshot that shows the Connectivity page.](.\media\active-directory-app-provisioning-ldap\create-2.png)](.\media\active-directory-app-provisioning-ldap\create-2.png#lightbox)</br>
177177

178178
|Property|Value|
179179
|-----|-----|
@@ -190,7 +190,7 @@ Now that we have configured the certificate and granted the network service acco
190190
5. On the **Global** page, select **Next**.
191191
6. On the **Partitions** page, keep the default and select **Next**.
192192
7. On the **Run Profiles** page, keep the **Export** checkbox selected. Select the **Full import** checkbox and select **Next**.
193-
![Screenshot that shows the Run Profiles page.](.\media\active-directory-app-provisioning-ldap\create-3.png)</br>
193+
[![Screenshot that shows the Run Profiles page.](.\media\active-directory-app-provisioning-ldap\create-3.png)](.\media\active-directory-app-provisioning-ldap\create-3.png#lightbox)</br>
194194

195195
|Property|Description|
196196
|-----|-----|
@@ -204,7 +204,7 @@ Now that we have configured the certificate and granted the network service acco
204204
- **Anchor**: This attribute should be unique in the target system. The Azure AD provisioning service will query the ECMA host by using this attribute after the initial cycle. This anchor value should be the same as the anchor value in schema 3.
205205
- **Query Attribute**: Used by the ECMA host to query the in-memory cache. This attribute should be unique.
206206
- **DN**: The distinguishedName of the target object.
207-
![Screenshot that shows the Object Types page.](.\media\active-directory-app-provisioning-ldap\create-4.png)</br>
207+
[![Screenshot that shows the Object Types page.](.\media\active-directory-app-provisioning-ldap\create-4.png)](.\media\active-directory-app-provisioning-ldap\create-4.png#lightbox)</br>
208208

209209
|Property|Description|
210210
|-----|-----|
@@ -214,7 +214,7 @@ Now that we have configured the certificate and granted the network service acco
214214
|DN|dn|
215215
|Autogenerated|unchecked|
216216
15. The ECMA host discovers the attributes supported by the target system. You can choose which of those attributes you want to expose to Azure AD. These attributes can then be configured in the Azure portal for provisioning.On the **Select Attributes** page, add all the attributes in the dropdown list, and select **Next**.
217-
![Screenshot that shows the Select Attributes page.](.\media\active-directory-app-provisioning-ldap\create-5.png)</br>
217+
[![Screenshot that shows the Select Attributes page.](.\media\active-directory-app-provisioning-ldap\create-5.png)](.\media\active-directory-app-provisioning-ldap\create-5.png#lightbox)</br>
218218
The **Attribute** dropdown list shows any attribute that was discovered in the target system and *wasn't* chosen on the previous **Select Attributes** page.
219219

220220
16. On the **Deprovisioning** page, under **Disable flow**, select **Delete**. The attributes selected on the previous page won't be available to select on the Deprovisioning page. Select **Finish**.
@@ -223,7 +223,7 @@ Now that we have configured the certificate and granted the network service acco
223223
1. On the server the running the Azure AD ECMA Connector Host, select **Start**.
224224
2. Enter **run** and enter **services.msc** in the box.
225225
3. In the **Services** list, ensure that **Microsoft ECMA2Host** is present and running. If not, select **Start**.
226-
![Screenshot that shows the service is running.](.\media\active-directory-app-provisioning-sql\configure-2.png)
226+
[![Screenshot that shows the service is running.](.\media\active-directory-app-provisioning-sql\configure-2.png)](.\media\active-directory-app-provisioning-sql\configure-2.png#lightbox)
227227

228228

229229

@@ -239,23 +239,23 @@ Now that we have configured the certificate and granted the network service acco
239239

240240
5. Enter the **Secret Token** value that you defined when you created the connector.
241241
6. Select **Test Connection**, and wait one minute.
242-
![Screenshot that shows assigning an agent.](.\media\active-directory-app-provisioning-ldap\test-1.png)
242+
[![Screenshot that shows assigning an agent.](.\media\active-directory-app-provisioning-ldap\test-1.png)](.\media\active-directory-app-provisioning-ldap\test-1.png#lightbox)
243243
7. After the connection test is successful, select **Save**.</br>
244-
![Screenshot that shows testing an agent.](.\media\active-directory-app-provisioning-sql\configure-9.png)
244+
[![Screenshot that shows testing an agent.](.\media\active-directory-app-provisioning-sql\configure-9.png)](.\media\active-directory-app-provisioning-sql\configure-9.png#lightbox)
245245
## Assign users to an application
246246
Now that you have the Azure AD ECMA Connector Host talking with Azure AD, you can move on to configuring who's in scope for provisioning.
247247

248248
1. In the Azure portal, select **Enterprise applications**.
249249
2. Select the **On-premises provisioning** application.
250250
3. On the left, under **Manage**, select **Users and groups**.
251251
4. Select **Add user/group**.
252-
![Screenshot that shows adding a user.](.\media\active-directory-app-provisioning-sql\app-2.png)
252+
[![Screenshot that shows adding a user.](.\media\active-directory-app-provisioning-sql\app-2.png)](.\media\active-directory-app-provisioning-sql\app-2.png#lightbox)
253253
5. Under **Users**, select **None Selected**.
254-
![Screenshot that shows None Selected.](.\media\active-directory-app-provisioning-sql\app-3.png)
254+
[![Screenshot that shows None Selected.](.\media\active-directory-app-provisioning-sql\app-3.png)](.\media\active-directory-app-provisioning-sql\app-3.png#lightbox)
255255
6. Select users from the right and select the **Select** button.</br>
256-
![Screenshot that shows Select users.](.\media\active-directory-app-provisioning-sql\app-4.png)
256+
[![Screenshot that shows Select users.](.\media\active-directory-app-provisioning-sql\app-4.png)](.\media\active-directory-app-provisioning-sql\app-4.png#lightbox)
257257
7. Now select **Assign**.
258-
![Screenshot that shows Assign users.](.\media\active-directory-app-provisioning-sql\app-5.png)
258+
[![Screenshot that shows Assign users.](.\media\active-directory-app-provisioning-sql\app-5.png)](.\media\active-directory-app-provisioning-sql\app-5.png#lightbox)
259259

260260

261261
#### Configure attribute mapping
@@ -273,7 +273,7 @@ Now that you have the Azure AD ECMA Connector Host talking with Azure AD, you ca
273273
|Direct|displayName|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:displayName|
274274
|Direct|objectId|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:objectGUID|
275275

276-
![Screenshot mapping assignments.](.\media\active-directory-app-provisioning-ldap\map-1.png)
276+
[![Screenshot mapping assignments.](.\media\active-directory-app-provisioning-ldap\map-1.png)](.\media\active-directory-app-provisioning-ldap\map-1.png#lightbox)
277277

278278
6. Select **Save**.
279279

0 commit comments

Comments
 (0)