You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -131,22 +131,22 @@ Now that we have configured the certificate and granted the network service acco
131
131
7. Under **On-Premises Connectivity**, download the agent installer.
132
132
8. Run the Azure AD Connect provisioning installer **AADConnectProvisioningAgentSetup.msi**.
133
133
9. On the **Microsoft Azure AD Connect Provisioning Agent Package** screen, accept the licensing terms, and select **Install**.
134
-
</br>
134
+
[](media/active-directory-app-provisioning-sql/install-1.png#lightbox)</br>
135
135
10. After this operation finishes, the configuration wizard starts. Select **Next**.
136
-
</br>
136
+
[](media/active-directory-app-provisioning-sql/install-2.png#lightbox)</br>
137
137
11. On the **Select Extension** screen, select **On-premises application provisioning (Azure AD to application)**. Select **Next**.
138
-
</br>
138
+
[](media/active-directory-app-provisioning-sql/install-3.png#lightbox)</br>
139
139
12. Use your global administrator account to sign in to Azure AD.
140
-
</br>
140
+
[](media/active-directory-app-provisioning-sql/install-4.png#lightbox)</br>
141
141
13. On the **Agent configuration** screen, select **Confirm**.
142
-
</br>
142
+
[](media/active-directory-app-provisioning-sql/install-5.png#lightbox)</br>
143
143
14. After the installation is complete, you should see a message at the bottom of the wizard. Select **Exit**.
144
-
</br>
144
+
[](media/active-directory-app-provisioning-sql/install-6.png#lightbox)</br>
145
145
15. Go to back to the Azure portal under the **On-premises ECMA app** application, and back to **Edit Provisioning**.
146
146
16. On the **Provisioning** page, change the mode to **Automatic**.
147
-
</br>
147
+
[](.\media\active-directory-app-provisioning-sql\configure-7.png#lightbox)</br>
148
148
17. On the **On-Premises Connectivity** section, select the agent that you just deployed and select **Assign Agent(s)**.
149
-
</br>
149
+
[](.\media\active-directory-app-provisioning-ldap\assign-1.png#lightbox)</br>
150
150
>[!NOTE]
151
151
>After you add the agent, wait 10 minutes for the registration to complete. The connectivity test won't work until the registration completes.
152
152
>
@@ -155,16 +155,16 @@ Now that we have configured the certificate and granted the network service acco
155
155
## Configure the Azure AD ECMA Connector Host certificate
156
156
1. On the desktop, select the ECMA shortcut.
157
157
2. After the ECMA Connector Host Configuration starts, leave the default port **8585** and select **Generate** to generate a certificate. The autogenerated certificate will be self-signed as part of the trusted root. The SAN matches the host name.
158
-

158
+
[](.\media\active-directory-app-provisioning-sql\configure-1.png#lightbox)
159
159
3. Select **Save**.
160
160
161
161
162
162
## Configure a generic LDAP connector
163
163
1. Select the ECMA Connector Host shortcut on the desktop.
164
164
2. Select **New Connector**.
165
-
</br>
165
+
[](.\media\active-directory-app-provisioning-sql\sql-3.png#lightbox)</br>
166
166
3. On the **Properties** page, fill in the boxes with the values specified in the table that follows the image and select **Next**.
167
-

167
+
[](.\media\active-directory-app-provisioning-ldap\create-1.png#lightbox)
168
168
169
169
|Property|Value|
170
170
|-----|-----|
@@ -173,7 +173,7 @@ Now that we have configured the certificate and granted the network service acco
173
173
|Secret Token|Enter your own key here. It should be 12 characters minimum.|
174
174
|Extension DLL|For a generic LDAP connector, select **Microsoft.IAM.Connector.GenericLdap.dll**.|
175
175
4. On the **Connectivity** page, fill in the boxes with the values specified in the table that follows the image and select **Next**.
176
-
</br>
176
+
[](.\media\active-directory-app-provisioning-ldap\create-2.png#lightbox)</br>
177
177
178
178
|Property|Value|
179
179
|-----|-----|
@@ -190,7 +190,7 @@ Now that we have configured the certificate and granted the network service acco
190
190
5. On the **Global** page, select **Next**.
191
191
6. On the **Partitions** page, keep the default and select **Next**.
192
192
7. On the **Run Profiles** page, keep the **Export** checkbox selected. Select the **Full import** checkbox and select **Next**.
193
-
</br>
193
+
[](.\media\active-directory-app-provisioning-ldap\create-3.png#lightbox)</br>
194
194
195
195
|Property|Description|
196
196
|-----|-----|
@@ -204,7 +204,7 @@ Now that we have configured the certificate and granted the network service acco
204
204
-**Anchor**: This attribute should be unique in the target system. The Azure AD provisioning service will query the ECMA host by using this attribute after the initial cycle. This anchor value should be the same as the anchor value in schema 3.
205
205
-**Query Attribute**: Used by the ECMA host to query the in-memory cache. This attribute should be unique.
206
206
-**DN**: The distinguishedName of the target object.
207
-
</br>
207
+
[](.\media\active-directory-app-provisioning-ldap\create-4.png#lightbox)</br>
208
208
209
209
|Property|Description|
210
210
|-----|-----|
@@ -214,7 +214,7 @@ Now that we have configured the certificate and granted the network service acco
214
214
|DN|dn|
215
215
|Autogenerated|unchecked|
216
216
15. The ECMA host discovers the attributes supported by the target system. You can choose which of those attributes you want to expose to Azure AD. These attributes can then be configured in the Azure portal for provisioning.On the **Select Attributes** page, add all the attributes in the dropdown list, and select **Next**.
217
-
</br>
217
+
[](.\media\active-directory-app-provisioning-ldap\create-5.png#lightbox)</br>
218
218
The **Attribute** dropdown list shows any attribute that was discovered in the target system and *wasn't* chosen on the previous **Select Attributes** page.
219
219
220
220
16. On the **Deprovisioning** page, under **Disable flow**, select **Delete**. The attributes selected on the previous page won't be available to select on the Deprovisioning page. Select **Finish**.
@@ -223,7 +223,7 @@ Now that we have configured the certificate and granted the network service acco
223
223
1. On the server the running the Azure AD ECMA Connector Host, select **Start**.
224
224
2. Enter **run** and enter **services.msc** in the box.
225
225
3. In the **Services** list, ensure that **Microsoft ECMA2Host** is present and running. If not, select **Start**.
226
-

226
+
[](.\media\active-directory-app-provisioning-sql\configure-2.png#lightbox)
227
227
228
228
229
229
@@ -239,23 +239,23 @@ Now that we have configured the certificate and granted the network service acco
239
239
240
240
5. Enter the **Secret Token** value that you defined when you created the connector.
241
241
6. Select **Test Connection**, and wait one minute.
242
-

242
+
[](.\media\active-directory-app-provisioning-ldap\test-1.png#lightbox)
243
243
7. After the connection test is successful, select **Save**.</br>
244
-

244
+
[](.\media\active-directory-app-provisioning-sql\configure-9.png#lightbox)
245
245
## Assign users to an application
246
246
Now that you have the Azure AD ECMA Connector Host talking with Azure AD, you can move on to configuring who's in scope for provisioning.
247
247
248
248
1. In the Azure portal, select **Enterprise applications**.
249
249
2. Select the **On-premises provisioning** application.
250
250
3. On the left, under **Manage**, select **Users and groups**.
251
251
4. Select **Add user/group**.
252
-

252
+
[](.\media\active-directory-app-provisioning-sql\app-2.png#lightbox)
253
253
5. Under **Users**, select **None Selected**.
254
-

254
+
[](.\media\active-directory-app-provisioning-sql\app-3.png#lightbox)
255
255
6. Select users from the right and select the **Select** button.</br>
256
-

256
+
[](.\media\active-directory-app-provisioning-sql\app-4.png#lightbox)
257
257
7. Now select **Assign**.
258
-

258
+
[](.\media\active-directory-app-provisioning-sql\app-5.png#lightbox)
259
259
260
260
261
261
#### Configure attribute mapping
@@ -273,7 +273,7 @@ Now that you have the Azure AD ECMA Connector Host talking with Azure AD, you ca
0 commit comments