Skip to content

Commit 202594f

Browse files
committed
doc-4
1 parent 4db632e commit 202594f

File tree

5 files changed

+15
-16
lines changed

5 files changed

+15
-16
lines changed

articles/active-directory/saas-apps/azure-databricks-with-private-link-workspace-provisioning-tutorial.md

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@ ms.reviewer: owinoakelo
1616

1717
The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) client that can be used to automatically provision users into cloud or on-premises applications. This article outlines how you can use the Azure AD provisioning service to provision users into Azure Databricks workspaces with no public access.
1818

19-
![Diagram that shows SCIM architecture.](./common/scim-architecture-diagram.png)
19+
[ ![Diagram that shows SCIM architecture.](media/azure-databricks-with-private-link-workspace-provisioning-tutorial/scim-architecture.png)](media/azure-databricks-with-private-link-workspace-provisioning-tutorial/scim-architecture.png#lightbox)
2020

2121
## Prerequisites
22-
* An Azure AD tenant with Microsoft Entra ID Governance ,Azure AD Premium P1 or Premium P2 (or EMS E3 or E5). To find the right license for your requirements, see [Compare generally available features of Azure AD] (https://www.microsoft.com/security/business/microsoft-entra-pricing).
22+
* An Azure AD tenant with Microsoft Entra ID Governance and Azure AD Premium P1 or Premium P2 (or EMS E3 or E5). To find the right license for your requirements, see [Compare generally available features of Azure AD](https://www.microsoft.com/security/business/microsoft-entra-pricing).
2323
* Administrator role for installing the agent. This task is a one-time effort and should be an Azure account that's either a hybrid administrator or a global administrator.
2424
* Administrator role for configuring the application in the cloud (application administrator, cloud application administrator, global administrator, or a custom role with permissions).
2525
* A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
@@ -31,31 +31,31 @@ If you have already downloaded the provisioning agent and configured it for anot
3131
1. In the Azure portal, select **Azure Active Directory**.
3232
1. On the left, select **Azure AD Connect**.
3333
1. On the left, select **Cloud sync**.
34-
![Screenshot of new UX screen.](./common/aad-connect-new-ux.png)
34+
[![Screenshot of new UX screen.](media/azure-databricks-with-private-link-workspace-provisioning-tutorial/azure-active-directory-connect-new-ux.png)](media/azure-databricks-with-private-link-workspace-provisioning-tutorial/azure-active-directory-connect-new-ux.png#lightbox)
3535

3636
1. On the left, select **Agent**.
3737
1. Select **Download on-premises agent**, and select **Accept terms & download**.
3838
>[!NOTE]
3939
>Please use different provisioning agents for on-premises application provisioning and Azure AD Connect Cloud Sync / HR-driven provisioning. All three scenarios should not be managed on the same agent.
4040
1. Open the provisioning agent installer, agree to the terms of service, and select **next**.
4141
1. When the provisioning agent wizard opens, continue to the **Select Extension** tab and select **On-premises application provisioning** when prompted for the extension you want to enable.
42-
1. The provisioning agent will use the operating system's web browser to display a popup window for you to authenticate to Azure AD, and potentially also your organization's identity provider. If you are using Internet Explorer as the browser on Windows Server, then you may need to add Microsoft web sites to your browser's trusted site list to allow JavaScript to run correctly.
42+
1. The provisioning agent uses the operating system's web browser to display a popup window for you to authenticate to Azure AD, and potentially also your organization's identity provider. If you're using Internet Explorer as the browser on Windows Server, then you may need to add Microsoft web sites to your browser's trusted site list to allow JavaScript to run correctly.
4343
1. Provide credentials for an Azure AD administrator when you're prompted to authorize. The user is required to have the Hybrid Identity Administrator or Global Administrator role.
4444
1. Select **Confirm** to confirm the setting. Once installation is successful, you can select **Exit**, and also close the Provisioning Agent Package installer.
4545

4646
## Provisioning to SCIM-enabled Workspace
4747
Once the agent is installed, no further configuration is necessary on-premises, and all provisioning configurations are then managed from the Azure portal.
4848

49-
1. In the Azure portal navigate to the Enterprise applications and add the **On-premises SCIM app** from the [gallery](../manage-apps/add-application-portal.md).
50-
1. From the left hand menu navigate to the **Provisioning** option and select **Get started**.
49+
1. In the Azure portal, navigate to the Enterprise applications and add the **On-premises SCIM app** from the [gallery](../manage-apps/add-application-portal.md).
50+
1. From the left hand menu, navigate to the **Provisioning** option and select **Get started**.
5151
1. Select **Automatic** from the dropdown list and expand the **On-Premises Connectivity** option.
5252
1. Select the agent that you installed from the dropdown list and select **Assign Agent(s)**.
5353
1. Now either wait 10 minutes or restart the **Microsoft Azure AD Connect Provisioning Agent** before proceeding to the next step & testing the connection.
5454
1. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolvable by DNS. An example for a scenario where the agent is installed on the same host as the application is `https://localhost:8585/scim`
55-
![Screenshot that shows assigning an agent.](./common/onpremises-assign-agents.png)
55+
![Screenshot that shows assigning an agent.](media/azure-databricks-with-private-link-workspace-provisioning-tutorial//on-premises-assign-agents.png)
5656

5757
1. Create an Admin Token in Azure Databricks User Settings Console and enter the same in the **Secret Token** field
58-
1. Select **Test Connection**, and save the credentials. The application SCIM endpoint must be actively listening for inbound provisioning requests, otherwise the test will fail. Use the steps [here](../app-provisioning/on-premises-ecma-troubleshoot.md#troubleshoot-test-connection-issues) if you run into connectivity issues.
58+
1. Select **Test Connection**, and save the credentials. The application SCIM endpoint must be actively listening for inbound provisioning requests, otherwise the test fails. Use the steps [here](../app-provisioning/on-premises-ecma-troubleshoot.md#troubleshoot-test-connection-issues) if you run into connectivity issues.
5959
>[!NOTE]
6060
> If the test connection fails, you will see the request made. Please note that while the URL in the test connection error message is truncated, the actual request sent to the application contains the entire URL provided above.
6161
@@ -69,15 +69,14 @@ Once the agent is installed, no further configuration is necessary on-premises,
6969
The following video provides an overview of on-premises provisioning.
7070
> [!VIDEO https://www.youtube.com/embed/QdfdpaFolys]
7171
72-
## Additional requirements
73-
* Ensure your [SCIM](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) implementation meets the [Azure AD SCIM requirements](../app-provisioning/use-scim-to-provision-users-and-groups.md).
74-
75-
Azure AD offers open-source [reference code](https://github.com/AzureAD/SCIMReferenceCode/wiki) that developers can use to bootstrap their SCIM implementation. The code is as is.
72+
## More requirements
73+
* Ensure your [SCIM](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) implementation meets the [Azure AD SCIM requirements](../app-provisioning/use-scim-to-provision-users-and-groups.md).
74+
Azure AD offers open-source [reference code](https://github.com/AzureAD/SCIMReferenceCode/wiki) that developers can use to bootstrap their SCIM implementation.
7675
* Support the /schemas endpoint to reduce configuration required in the Azure portal.
7776

7877
## Next steps
7978

80-
- [App provisioning](../app-provisioning/user-provisioning.md)
81-
- [Generic SQL connector](../app-provisioning/on-premises-sql-connector-configure.md)
82-
- [Tutorial: ECMA Connector Host generic SQL connector](../app-provisioning/tutorial-ecma-sql-connector.md)
83-
- [Known issues](../app-provisioning/known-issues.md)
79+
* [App provisioning](../app-provisioning/user-provisioning.md)
80+
* [Generic SQL connector](../app-provisioning/on-premises-sql-connector-configure.md)
81+
* [Tutorial: ECMA Connector Host generic SQL connector](../app-provisioning/tutorial-ecma-sql-connector.md)
82+
* [Known issues](../app-provisioning/known-issues.md)
Binary file not shown.
Loading

0 commit comments

Comments
 (0)