You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-configure-app.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ If you're configuring inbound user provisioning to on-premises Active Directory,
36
36
37
37
## Create your API-driven provisioning app
38
38
39
-
1. Log in to the [Microsoft Entra portal](<https://entra.microsoft.com>).
39
+
1. Log in to the [Microsoft Entra admin center](<https://entra.microsoft.com>).
40
40
2. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
41
41
3. Click on **New application** to create a new provisioning application.
42
42
[](media/inbound-provisioning-api-configure-app/provisioning-entra-admin-center.png#lightbox)
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-custom-attributes.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ You have configured API-driven provisioning app. You're provisioning app is succ
28
28
29
29
In this step, we'll add the two attributes "HireDate" and "JobCode" that are not part of the standard SCIM schema to the provisioning app and use them in the provisioning data flow.
30
30
31
-
1. Log in to Microsoft Entra portal with application administrator role.
31
+
1. Log in to Microsoft Entra admin center with application administrator role.
32
32
1. Go to **Enterprise applications** and open your API-driven provisioning app.
33
33
1. Open the **Provisioning** blade.
34
34
1. Click on the **Edit Provisioning** button.
@@ -44,7 +44,7 @@ In this step, we'll add the two attributes "HireDate" and "JobCode" that are not
44
44
1.**Save** your changes
45
45
46
46
> [!NOTE]
47
-
> If you'd like to add only a few additional attributes to the provisioning app, use Microsoft Entra Portal to extend the schema. If you'd like to add more custom attributes (let's say 20+ attributes), then we recommend using the [`UpdateSchema` mode of the CSV2SCIM PowerShell script](inbound-provisioning-api-powershell.md#extending-provisioning-job-schema) which automates the above manual process.
47
+
> If you'd like to add only a few additional attributes to the provisioning app, use Microsoft Entra admin center to extend the schema. If you'd like to add more custom attributes (let's say 20+ attributes), then we recommend using the [`UpdateSchema` mode of the CSV2SCIM PowerShell script](inbound-provisioning-api-powershell.md#extending-provisioning-job-schema) which automates the above manual process.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Depending on how your API client authenticates with Azure AD, you can select bet
27
27
## Configure a service principal
28
28
This configuration registers an app in Azure AD that represents the external API client and grants it permission to invoke the inbound provisioning API. The service principal client id and client secret can be used in the OAuth client credentials grant flow.
29
29
30
-
1. Log in to Microsoft Entra portal (https://entra.microsoft.com) with global administrator or application administrator login credentials.
30
+
1. Log in to Microsoft Entra admin center (https://entra.microsoft.com) with global administrator or application administrator login credentials.
31
31
1. Browse to **Azure Active Directory** -> **Applications** -> **App registrations**.
32
32
1. Click on the option **New registration**.
33
33
1. Provide an app name, select the default options, and click on **Register**.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-postman.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,10 +62,10 @@ In this step, you'll configure the Postman app and invoke the API using the conf
62
62
If the API invocation is successful, you see the message `202 Accepted.` Under Headers, the **Location** attribute points to the provisioning logs API endpoint.
63
63
64
64
## Verify processing of bulk request payload
65
-
You can verify the processing either from the Microsoft Entra portal or using Postman.
65
+
You can verify the processing either from the Microsoft Entra admin center or using Postman.
66
66
67
-
### Verify processing from Microsoft Entra portal
68
-
1. Log in to [Microsoft Entra portal](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
67
+
### Verify processing from Microsoft Entra admin center
68
+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
69
69
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
70
70
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
71
71
1. Open the Provisioning blade. The landing page displays the status of the last run.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -180,7 +180,7 @@ To illustrate the procedure, let's use the CSV file `Samples/csv-with-2-records.
180
180
181
181
This section explains how to send the generated bulk request payload to your inbound provisioning API endpoint.
182
182
183
-
1. Log in to your Entra portal as *Application Administrator* or *Global Administrator*.
183
+
1. Log in to your Microsoft Entra admin center as *Application Administrator* or *Global Administrator*.
184
184
1. Copy the `ServicePrincipalId` associated with your provisioning app from **Provisioning App** > **Properties** > **Object ID**.
185
185
186
186
:::image type="content" border="true" source="./media/inbound-provisioning-api-powershell/object-id.png" alt-text="Screenshot of the Object ID." lightbox="./media/inbound-provisioning-api-powershell/object-id.png":::
@@ -204,7 +204,7 @@ This section explains how to send the generated bulk request payload to your inb
204
204
$ThumbPrint = $ClientCertificate.ThumbPrint
205
205
```
206
206
The generated certificate is stored **Current User\Personal\Certificates**. You can view it using the **Control Panel** -> **Manage user certificates** option.
207
-
1. To associate this certificate with a valid service principal, log in to your Entra portal as *Application Administrator*.
207
+
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as *Application Administrator*.
208
208
1. Open [the service principal you configured](inbound-provisioning-api-grant-access.md#configure-a-service-principal) under **App Registrations**.
209
209
1. Copy the **Object ID** from the **Overview** blade. Use the value to replace the string `<AppObjectId>`. Copy the **Application (client) Id**. We will use it later and it is referenced as `<AppClientId>`.
210
210
1. Run the following command to upload your certificate to the registered service principal.
> The `AttributeMapping` and `ValidateAttributeMapping` command-line parameters refer to the mapping of CSV column attributes to the standard SCIM schema elements.
361
-
It doesn't refer to the attribute mappings that you perform in the Entra portal provisioning app between source SCIM schema elements and target Azure AD/on-premises AD attributes.
361
+
It doesn't refer to the attribute mappings that you perform in the Microsoft Entra admin center provisioning app between source SCIM schema elements and target Azure AD/on-premises AD attributes.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-authenticator-lite.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ To disable Authenticator Lite in the Azure portal, complete the following steps:
58
58
59
59
Only users who are enabled for Microsoft Authenticator here can be enabled to use Authenticator Lite for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook. Android users utilizing a personal and work profile on their device may be prompted to register if Authenticator is present on a different profile from the Outlook application.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-archive.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,7 +124,7 @@ For more information on how to enable this feature, see: [Cloud Sync directory e
124
124
**Service category:** Audit
125
125
**Product capability:** Monitoring & Reporting
126
126
127
-
This feature analyzes uploaded client-side logs, also known as diagnostic logs, from a Windows 10+ device that is having an issue(s) and suggests remediation steps to resolve the issue(s). Admins can work with end user to collect client-side logs, and then upload them to this troubleshooter in the Entra Portal. For more information, see: [Troubleshooting Windows devices in Azure AD](../devices/troubleshoot-device-windows-joined.md).
127
+
This feature analyzes uploaded client-side logs, also known as diagnostic logs, from a Windows 10+ device that is having an issue(s) and suggests remediation steps to resolve the issue(s). Admins can work with end user to collect client-side logs, and then upload them to this troubleshooter in the Microsoft Entra admin center. For more information, see: [Troubleshooting Windows devices in Azure AD](../devices/troubleshoot-device-windows-joined.md).
128
128
129
129
130
130
---
@@ -188,7 +188,7 @@ The ability for users to create tenants from the Manage Tenant overview has been
188
188
**Service category:** My Apps
189
189
**Product capability:** End User Experiences
190
190
191
-
We have consolidated relevant app launcher settings in a new App launchers section in the Azure and Entra portals. The entry point can be found under Enterprise applications, where Collections used to be. You can find the Collections option by selecting App launchers. In addition, we've added a new App launchers Settings option. This option has some settings you may already be familiar with like the Microsoft 365 settings. The new Settings options also have controls for previews. As an admin, you can choose to try out new app launcher features while they are in preview. Enabling a preview feature means that the feature turns on for your organization. This enabled feature reflects in the My Apps portal, and other app launchers for all of your users. To learn more about the preview settings, see: [End-user experiences for applications](../manage-apps/end-user-experiences.md).
191
+
We have consolidated relevant app launcher settings in a new App launchers section in the Azure and Microsoft Entra admin centers. The entry point can be found under Enterprise applications, where Collections used to be. You can find the Collections option by selecting App launchers. In addition, we've added a new App launchers Settings option. This option has some settings you may already be familiar with like the Microsoft 365 settings. The new Settings options also have controls for previews. As an admin, you can choose to try out new app launcher features while they are in preview. Enabling a preview feature means that the feature turns on for your organization. This enabled feature reflects in the My Apps portal, and other app launchers for all of your users. To learn more about the preview settings, see: [End-user experiences for applications](../manage-apps/end-user-experiences.md).
192
192
193
193
194
194
---
@@ -895,7 +895,7 @@ Customers can now meet their complex audit and recertification requirements thro
895
895
896
896
Currently, users can self-service leave for an organization without the visibility of their IT administrators. Some organizations may want more control over this self-service process.
897
897
898
-
With this feature, IT administrators can now allow or restrict external identities to leave an organization by Microsoft provided self-service controls via Azure Active Directory in the Microsoft Entra portal. In order to restrict users to leave an organization, customers need to include "Global privacy contact" and "Privacy statement URL" under tenant properties.
898
+
With this feature, IT administrators can now allow or restrict external identities to leave an organization by Microsoft provided self-service controls via Azure Active Directory in the Microsoft Entra admin center. In order to restrict users to leave an organization, customers need to include "Global privacy contact" and "Privacy statement URL" under tenant properties.
899
899
900
900
A new policy API is available for the administrators to control tenant wide policy:
0 commit comments