Skip to content

Commit 3028fbc

Browse files
authored
Merge pull request #250571 from Harshita-130901/Insite-lms-and-Asana
Insite lms and Asana update
2 parents 74a9824 + 5771bdd commit 3028fbc

File tree

3 files changed

+30
-19
lines changed

3 files changed

+30
-19
lines changed

articles/active-directory/saas-apps/asana-provisioning-tutorial.md

Lines changed: 25 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: 'Tutorial: Configure Asana for automatic user provisioning with Microsoft Entra ID'
3-
description: Learn how to automatically provision and de-provision user accounts from Microsoft Entra ID to Asana.
3+
description: Learn how to automatically provision and deprovision user accounts from Microsoft Entra ID to Asana.
44
services: active-directory
55
author: twimmers
66
writer: twimmers
@@ -17,7 +17,7 @@ ms.author: thwimmer
1717

1818
# Tutorial: Configure Asana for automatic user provisioning
1919

20-
This tutorial describes the steps you need to do in both Asana and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and de-provisions users and groups to [Asana](https://www.asana.com/) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](../app-provisioning/user-provisioning.md).
20+
This tutorial describes the steps you need to do in both Asana and Microsoft Entra ID to configure automatic user provisioning. When configured, Microsoft Entra ID automatically provisions and deprovisions users and groups to [Asana](https://www.asana.com/) using the Microsoft Entra provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Microsoft Entra ID](../app-provisioning/user-provisioning.md).
2121

2222

2323
## Capabilities Supported
@@ -70,7 +70,7 @@ The Microsoft Entra provisioning service allows you to scope who will be provisi
7070

7171
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
7272

73-
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
73+
* If you need more roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
7474

7575

7676
## Step 5: Configure automatic user provisioning to Asana
@@ -84,33 +84,33 @@ This section guides you through the steps to configure the Microsoft Entra provi
8484
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
8585
1. Browse to **Identity** > **Applications** > **Enterprise applications**
8686

87-
![Enterprise applications blade](common/enterprise-applications.png)
87+
![Screenshot of Enterprise applications blade.](common/enterprise-applications.png)
8888

8989
1. In the applications list, select **Asana**.
9090

91-
![The Asana link in the Applications list](common/all-applications.png)
91+
![Screenshot of the Asana link in the Applications list.](common/all-applications.png)
9292

9393
1. Select the **Provisioning** tab.
9494

95-
![Provisioning tab](common/provisioning.png)
95+
![Screenshot of Provisioning tab.](common/provisioning.png)
9696

9797
1. Set the **Provisioning Mode** to **Automatic**.
9898

99-
![Provisioning tab automatic](common/provisioning-automatic.png)
99+
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
100100

101101
1. In the **Admin Credentials** section, input your Asana Tenant URL and Secret Token provided by Asana. Click **Test Connection** to ensure Microsoft Entra ID can connect to Asana. If the connection fails, contact Asana to check your account setup.
102102

103-
![Token](common/provisioning-testconnection-tenanturltoken.png)
103+
![Screenshot of token.](common/provisioning-testconnection-tenanturltoken.png)
104104

105105
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
106106

107-
![Notification Email](common/provisioning-notification-email.png)
107+
![Screenshot of notification email.](common/provisioning-notification-email.png)
108108

109109
1. Select **Save**.
110110

111111
1. In the **Mappings** section, select **Synchronize Microsoft Entra users to Asana**.
112112

113-
1. Review the user attributes that are synchronized from Microsoft Entra ID to Asana in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Asana for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the Asana API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
113+
1. Review the user attributes that are synchronized from Microsoft Entra ID to Asana in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Asana for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you need to ensure that the Asana API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
114114

115115
|Attribute|Type|Supported for filtering|Required by Asana|
116116
|---|---|---|---|
@@ -119,7 +119,15 @@ This section guides you through the steps to configure the Microsoft Entra provi
119119
|name.formatted|String||
120120
|title|String||
121121
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department|String||
122-
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager|String||
122+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager|Reference||
123+
|addresses[type eq "work"].country|String||
124+
|addresses[type eq "work"].region|String||
125+
|addresses[type eq "work"].locality|String||
126+
|phoneNumbers[type eq "work"].value|String||
127+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:employeeNumber|String||
128+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:costCenter|String||
129+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:organization|String||
130+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:division|String||
123131

124132

125133
1. Under the **Mappings** section, select **Synchronize Microsoft Entra groups to Asana**.
@@ -135,15 +143,15 @@ This section guides you through the steps to configure the Microsoft Entra provi
135143

136144
1. To enable the Microsoft Entra provisioning service for Asana, change the **Provisioning Status** to **On** in the **Settings** section.
137145

138-
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
146+
![Screenshot of Provisioning status toggled on.](common/provisioning-toggle-on.png)
139147

140148
1. Define the users and groups that you would like to provision to Asana by choosing the appropriate values in **Scope** in the **Settings** section.
141149

142-
![Provisioning Scope](common/provisioning-scope.png)
150+
![Screenshot of Provisioning scope.](common/provisioning-scope.png)
143151

144152
1. When you're ready to provision, click **Save**.
145153

146-
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
154+
![Screenshot of Saving provisioning configuration.](common/provisioning-configuration-save.png)
147155

148156
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to execute than next cycles, which occur approximately every 40 minutes as long as the Microsoft Entra provisioning service is running.
149157

@@ -152,12 +160,14 @@ Once you've configured provisioning, use the following resources to monitor your
152160

153161
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
154162
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion
155-
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
163+
* If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
156164

157165
## Change log
158166

159167
* 11/06/2021 - Dropped support for **externalId, name.givenName and name.familyName**. Added support for **preferredLanguage , title and urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department**. Enabled **Group Provisioning**.
160168
* 05/23/2023 - Dropped support for **preferredLanguage** Added support for **urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager**.
169+
* 09/07/2023 - Added support for **addresses[type eq "work"].locality, addresses[type eq "work"].region, addresses[type eq "work"].country, phoneNumbers[type eq "work"].value, urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:employeeNumber, urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:costCenter,
170+
urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:organization and urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:division**.
161171

162172
## More resources
163173

articles/active-directory/saas-apps/insite-lms-provisioning-tutorial.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,16 +45,17 @@ The scenario outlined in this tutorial assumes that you already have the followi
4545
## Step 2: Configure Insite LMS to support provisioning with Microsoft Entra ID
4646
To generate the Secret Token
4747

48-
1. Login to [Insite LMS Admin Console](https://portal.insitelms.net/organization/applications).
49-
1. Navigate to **Self Hosted Jobs**. You find a job named “SCIM”.
48+
1. Log in to [Insite LMS Console](https://portal.insitelms.net) with your Admin account.
49+
1. Navigate to **Applications** module on the left hand side menu.
50+
1. In the section **Self hosted Jobs**, you'll find a job named “SCIM”. If you can't find the job, contact the Insite LMS support team.
5051

5152
![Screenshot of generate API Key.](media/insite-lms-provisioning-tutorial/generate-api-key.png)
5253

5354
1. Click on **Generate Api Key**.
5455
Copy and save the **Api Key**. This value is entered in the **Secret Token** field in the Provisioning tab of your Insite LMS application.
5556

56-
>[!NOTE]
57-
>The Access Token is only valid for 1 year.
57+
> [!NOTE]
58+
> The Api Key is only valid for 1 year and needs to be renewed manually before it expires.
5859
5960
<a name='step-3-add-insite-lms-from-the-azure-ad-application-gallery'></a>
6061

-5.62 KB
Loading

0 commit comments

Comments
 (0)