You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-error-handling-js.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,11 +46,11 @@ The following error types are available:
46
46
47
47
-`AuthError`: Base error class for the MSAL.js library, also used for unexpected errors.
48
48
49
-
-`ClientAuthError`: Error class, which denotes an issue with Client authentication. Most errors that come from the library will be ClientAuthErrors. These errors result from things like calling a login method when login is already in progress, the user cancels the login, and so on.
49
+
-`ClientAuthError`: Error class which denotes an issue with Client authentication. Most errors that come from the library are ClientAuthErrors. These errors result from things like calling a login method when login is already in progress, the user cancels the login, and so on.
50
50
51
51
-`ClientConfigurationError`: Error class, extends `ClientAuthError` thrown before requests are made when the given user config parameters are malformed or missing.
52
52
53
-
-`ServerError`: Error class, represents the error strings sent by the authentication server. These may be errors such as invalid request formats or parameters, or any other errors that prevent the server from authenticating or authorizing the user.
53
+
-`ServerError`: Error class, represents the error strings sent by the authentication server. These errors may be invalid request formats or parameters, or any other errors that prevent the server from authenticating or authorizing the user.
54
54
55
55
-`InteractionRequiredAuthError`: Error class, extends `ServerError` to represent server errors, which require an interactive call. This error is thrown by `acquireTokenSilent` if the user is required to interact with the server to provide credentials or consent for authentication/authorization. Error codes include `"interaction_required"`, `"login_required"`, and `"consent_required"`.
The methods for pop-up experience (`loginPopup`, `acquireTokenPopup`) return promises, so you can use the promise pattern (.then and .catch) to handle them as shown:
74
+
The methods for pop-up experience (`loginPopup`, `acquireTokenPopup`) return promises, so you can use the promise pattern (`.then` and `.catch`) to handle them as shown:
75
75
76
76
```javascript
77
77
myMSALObj.acquireTokenPopup(request).then(
@@ -144,6 +144,10 @@ When calling an API requiring Conditional Access, you can receive a claims chall
144
144
145
145
See [How to use Continuous Access Evaluation enabled APIs in your applications](./app-resilience-continuous-access-evaluation.md) for more detail.
146
146
147
+
### Using other frameworks
148
+
149
+
Using toolkits like Tauri for registered single page applications (SPAs) with the identity platform are not recognized for production apps. SPAs only support URLs that start with `https` for production apps and `http://localhost` for local development. Prefixes like `tauri://localhost` cannot be used for browser apps. This format can only be supported for mobile or web apps as they have a confidential component unlike browser apps.
> The **eduRole** field accepts values like `Teacher or Student`, anything else will be ignored.
124
128
125
129
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Adobe Identity Management (OIDC)**.
126
130
@@ -152,7 +156,10 @@ Once you've configured provisioning, use the following resources to monitor your
152
156
153
157
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
154
158
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
155
-
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
159
+
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/adobe-identity-management-provisioning-tutorial.md
+25-14Lines changed: 25 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
42
42
> [!NOTE]
43
43
> If your organization uses the User Sync Tool or a UMAPI integration, you must first pause the integration. Then, add Azure AD automatic provisioning to automate user management from the Azure portal. Once Azure AD automatic provisioning is configured and running, you can completely remove the User Sync Tool or UMAPI integration.
44
44
45
+
> [!NOTE]
46
+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
47
+
45
48
## Step 1. Plan your provisioning deployment
46
49
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
47
50
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
@@ -115,24 +118,28 @@ This section guides you through the steps to configure the Azure AD provisioning
115
118
116
119
9. Review the user attributes that are synchronized from Azure AD to Adobe Identity Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Adobe Identity Management for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Adobe Identity Management API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
> The **eduRole** field accepts values like `Teacher or Student`, anything else will be ignored.
127
134
128
135
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Adobe Identity Management**.
129
136
130
137
11. Review the group attributes that are synchronized from Azure AD to Adobe Identity Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Adobe Identity Management for update operations. Select the **Save** button to commit any changes.
131
138
132
-
|Attribute|Type|
133
-
|---|---|
134
-
|displayName|String|
135
-
|members|Reference|
139
+
|Attribute|Type|Supported for filtering|Required by Adobe Identity Management
140
+
|---|---|---|---|
141
+
|displayName|String|✓|✓
142
+
|members|Reference||
136
143
137
144
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
138
145
@@ -157,7 +164,11 @@ Once you've configured provisioning, use the following resources to monitor your
157
164
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
158
165
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
159
166
160
-
## Additional resources
167
+
## Change log
168
+
07/18/2023 - The app was added to Gov Cloud.
169
+
08/15/2023 - Added support for Schema Discovery.
170
+
171
+
## More resources
161
172
162
173
*[Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
163
174
*[What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/oracle-cloud-infrastructure-console-provisioning-tutorial.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
37
37
* An Oracle Cloud Infrastructure Console [tenant](https://www.oracle.com/cloud/sign-in.html?intcmp=OcomFreeTier&source=:ow:o:p:nav:0916BCButton).
38
38
* A user account in Oracle Cloud Infrastructure Console with Admin permissions.
39
39
40
+
> [!NOTE]
41
+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud
42
+
40
43
## Step 1. Plan your provisioning deployment
41
44
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
42
45
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
@@ -178,7 +181,10 @@ Once you've configured provisioning, use the following resources to monitor your
178
181
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
179
182
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
180
183
181
-
## Additional resources
184
+
## Change log
185
+
08/15/2023 - The app was added to Gov Cloud.
186
+
187
+
## More resources
182
188
183
189
*[Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
184
190
*[What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/oreilly-learning-platform-provisioning-tutorial.md
+16-9Lines changed: 16 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,8 @@ ms.author: thwimmer
18
18
19
19
This tutorial describes the steps you need to perform in both O'Reilly learning platform and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users to [O'Reilly learning platform](https://www.oreilly.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
20
20
21
-
22
21
## Supported capabilities
22
+
23
23
> [!div class="checklist"]
24
24
> * Create users in O'Reilly learning platform.
25
25
> * Remove users in O'Reilly learning platform when they do not require access anymore.
@@ -33,31 +33,37 @@ The scenario outlined in this tutorial assumes that you already have the followi
33
33
*[An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
34
34
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
35
35
* A user account in O'Reilly learning platform with Admin permissions.
36
+
* An O'Reilly learning platform single sign-on (SSO) enabled subscription.
36
37
37
38
## Step 1. Plan your provisioning deployment
38
39
* Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
39
40
* Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
40
41
* Determine what data to [map between Azure AD and O'Reilly learning platform](../app-provisioning/customize-application-attributes.md).
41
42
42
43
## Step 2. Configure O'Reilly learning platform to support provisioning with Azure AD
43
-
Contact O'Reilly learning platform support to configure O'Reilly learning platform to support provisioning with Azure AD.
44
+
45
+
Before you begin to configure the O'Reilly learning platform to support provisioning with Azure AD, you’ll need to generate a SCIM API token within the O’Reilly Admin Console.
46
+
47
+
1. Navigate to [O’Reilly Admin Console](https://learning.oreilly.com/) by logging in to your O’Reilly account.
48
+
1. Once you’ve logged in, click **Admin** in the top navigation and select **Integrations**.
49
+
1. Scroll down to the **API tokens** section. Under API tokens, click **Create token** and select the **SCIM API**. Then give your token a name and expiration date, and click Continue. You’ll receive your API key in a pop-up message prompting you to store a copy of it in a secure place. Once you’ve saved a copy of your key, click the checkbox and Continue.
50
+
1. You will use the O’Reilly SCIM API token in Step 5.
44
51
45
52
## Step 3. Add O'Reilly learning platform from the Azure AD application gallery
46
53
47
-
Add O'Reilly learning platform from the Azure AD application gallery to start managing provisioning to O'Reilly learning platform. If you have previously setup O'Reilly learning platform for SSO you can use the same application. However it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
54
+
Add O'Reilly learning platform from the Azure AD application gallery to start managing provisioning to O'Reilly learning platform. If you have previously [set up O'Reilly learning platform for SSO](oreilly-learning-platform-tutorial.md), you can use the same application. However it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
48
55
49
-
## Step 4. Define who will be in scope for provisioning
56
+
## Step 4. Define who will be in scope for provisioning
50
57
51
-
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users to the application. If you choose to scope who will be provisioned based solely on attributes of the user, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
58
+
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users to the application. If you choose to scope who will be provisioned based solely on attributes of the user, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
52
59
53
60
* Start small. Test with a small set of users before rolling out to everyone. When scope for provisioning is set to assigned users, you can control this by assigning one or two users to the app. When scope is set to all users, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
54
61
55
62
* If you need more roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
56
63
64
+
## Step 5. Configure automatic user provisioning to O'Reilly learning platform
57
65
58
-
## Step 5. Configure automatic user provisioning to O'Reilly learning platform
59
-
60
-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users in TestApp based on user assignments in Azure AD.
66
+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users in O’Reilly learning platform based on user assignments in Azure AD.
61
67
62
68
### To configure automatic user provisioning for O'Reilly learning platform in Azure AD:
63
69
@@ -77,7 +83,7 @@ This section guides you through the steps to configure the Azure AD provisioning
77
83
78
84

79
85
80
-
1. Under the **Admin Credentials** section, input your O'Reilly learning platform Tenant URLand Secret Token. Click **Test Connection** to ensure Azure AD can connect to O'Reilly learning platform. If the connection fails, ensure your O'Reilly learning platform account has Admin permissions and try again.
86
+
1. Under the **Admin Credentials** section, input your O'Reilly learning platform Tenant URL, which is `https://api.oreilly.com/api/scim/v2`, and Secret Token, which you generated in Step 2. Click **Test Connection** to ensure Azure AD can connect to O'Reilly learning platform. If the connection fails, double-check that your token is correct or [contact the O’Reilly platform integration team](mailto:[email protected]) for help.
81
87
82
88

83
89
@@ -117,6 +123,7 @@ This section guides you through the steps to configure the Azure AD provisioning
117
123
This operation starts the initial synchronization cycle of all users defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
118
124
119
125
## Step 6. Monitor your deployment
126
+
120
127
Once you've configured provisioning, use the following resources to monitor your deployment:
121
128
122
129
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
0 commit comments