You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,10 +55,11 @@ This section describes how you can assign the necessary permissions to a managed
55
55
56
56
[](media/inbound-provisioning-api-grant-access/managed-identity-name.png#lightbox)
57
57
58
-
1. Run the following PowerShell script to assign permissions to your managed identity.
58
+
1. Run the following PowerShell script to assign permissions to your managed identity.
1. To confirm that the permission was applied, find the managed identity service principal under **Enterprise Applications** in Azure AD. Remove the **Application type** filter to see all service principals.
79
+
1. To confirm that the permission was applied, find the managed identity service principal under **Enterprise Applications** in Azure AD. Remove the **Application type** filter to see all service principals.
79
80
[](media/inbound-provisioning-api-grant-access/managed-identity-principal.png#lightbox)
80
81
1. Click on the **Permissions** blade under **Security**. Ensure the permission is set.
81
82
[](media/inbound-provisioning-api-grant-access/managed-identity-permissions.png#lightbox)
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,8 +82,8 @@ The PowerShell sample script published in the [Microsoft Entra ID inbound provis
82
82
- Test-ScriptCommands.ps1 (sample usage commands)
83
83
- UseClientCertificate.ps1 (script to generate self-signed certificate and upload it as service principal credential for use in OAuth flow)
84
84
-`Sample1` (folder with more examples of how CSV file columns can be mapped to SCIM standard attributes. If you get different CSV files for employees, contractors, interns, you can create a separate AttributeMapping.psd1 file for each entity.)
85
-
1. Download and install the latest version of PowerShell.
86
-
1. Run the command to enable execution of remote signed scripts:
85
+
1. Download and install the latest version of PowerShell.
86
+
1. Run the command to enable execution of remote signed scripts:
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ Once schema extensions are created, these extension attributes are automatically
49
49
When you've more than 1000 service principals, you may find extensions missing in the source attribute list. If an attribute you've created doesn't automatically appear, then verify the attribute was created and add it manually to your schema. To verify it was created, use Microsoft Graph and [Graph Explorer](/graph/graph-explorer/graph-explorer-overview). To add it manually to your schema, see [Editing the list of supported attributes](customize-application-attributes.md#editing-the-list-of-supported-attributes).
50
50
51
51
### Create an extension attribute for cloud only users using Microsoft Graph
52
-
You can extend the schema of Azure AD users using [Microsoft Graph](/graph/overview).
52
+
You can extend the schema of Azure AD users using [Microsoft Graph](/graph/overview).
53
53
54
54
First, list the apps in your tenant to get the ID of the app you're working on. To learn more, see [List extensionProperties](/graph/api/application-list-extensionproperty).
55
55
@@ -67,7 +67,7 @@ Content-type: application/json
67
67
"name": "extensionName",
68
68
"dataType": "string",
69
69
"targetObjects": [
70
-
"User"
70
+
"User"
71
71
]
72
72
}
73
73
```
@@ -89,10 +89,10 @@ GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_in
89
89
90
90
91
91
### Create an extension attribute on a cloud only user using PowerShell
92
-
Create a custom extension using PowerShell and assign a value to a user.
92
+
Create a custom extension using PowerShell and assign a value to a user.
93
93
94
94
```
95
-
#Connect to your Azure AD tenant
95
+
#Connect to your Azure AD tenant
96
96
Connect-AzureAD
97
97
98
98
#Create an application (you can instead use an existing application if you would like)
@@ -123,7 +123,7 @@ Cloud sync will automatically discover your extensions in on-premises Active Dir
123
123
4. Select the configuration you wish to add the extension attribute and mapping.
124
124
5. Under **Manage attributes** select **click to edit mappings**.
125
125
6. Click **Add attribute mapping**. The attributes will automatically be discovered.
126
-
7. The new attributes will be available in the drop-down under **source attribute**.
126
+
7. The new attributes will be available in the drop-down under **source attribute**.
127
127
8. Fill in the type of mapping you want and click **Apply**.
@@ -142,11 +142,11 @@ If users who will access the applications originate in on-premises Active Direct
142
142
1. Open the Azure AD Connect wizard, choose Tasks, and then choose **Customize synchronization options**.
143
143
144
144

145
-
146
-
2. Sign in as an Azure AD Global Administrator.
145
+
146
+
2. Sign in as an Azure AD Global Administrator.
147
147
148
148
3. On the **Optional Features** page, select **Directory extension attribute sync**.
149
-
149
+
150
150

151
151
152
152
4. Select the attribute(s) you want to extend to Azure AD.
@@ -156,13 +156,13 @@ If users who will access the applications originate in on-premises Active Direct
156
156

157
157
158
158
5. Finish the Azure AD Connect wizard and allow a full synchronization cycle to run. When the cycle is complete, the schema is extended and the new values are synchronized between your on-premises AD and Azure AD.
159
-
159
+
160
160
6. In the Azure portal, while you’re [editing user attribute mappings](customize-application-attributes.md), the **Source attribute** list will now contain the added attribute in the format `<attributename> (extension_<appID>_<attributename>)`, where appID is the identifier of a placeholder application in your tenant. Select the attribute and map it to the target application for provisioning.
161
161
162
162

163
163
164
164
> [!NOTE]
165
-
> The ability to provision reference attributes from on-premises AD, such as **managedby** or **DN/DistinguishedName**, is not supported today. You can request this feature on [User Voice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789).
165
+
> The ability to provision reference attributes from on-premises AD, such as **managedby** or **DN/DistinguishedName**, is not supported today. You can request this feature on [User Voice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789).
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/customers/tutorial-single-page-app-react-sign-in-prepare-app.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -195,7 +195,7 @@ All parts of the app that require authentication must be wrapped in the [`MsalPr
0 commit comments