Skip to content

Commit 304b273

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into phsm-misc
2 parents 280fb1a + 477d090 commit 304b273

File tree

101 files changed

+2902
-720
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

101 files changed

+2902
-720
lines changed

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,24 +24,37 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
2424
- Administrator role for configuring the application in the cloud (application administrator, cloud application administrator, global administrator, or a custom role with permissions).
2525
- A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
2626

27-
## Deploying Azure AD provisioning agent
28-
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a separate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or separate hosts, again as long as each SCIM endpoint is reachable by the agent.
29-
30-
1. [Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM application endpoint is hosted on.
31-
2. Run the provisioning agent installer, agree to the terms of service, and select **Install**.
32-
3. Once installed, locate and launch the **AAD Connect Provisioning Agent wizard**, and when prompted for an extensions select **On-premises provisioning**
33-
4. For the agent to register itself with your tenant, provide credentials for an Azure AD admin with Hybrid administrator or global administrator permissions.
34-
5. Select **Confirm** to confirm the installation was successful.
27+
## Download, install, and configure the Azure AD Connect Provisioning Agent Package
28+
29+
If you have already downloaded the provisioning agent and configured it for another on-premises application, then continue reading in the next section.
30+
31+
1. In the Azure portal, select **Azure Active Directory**.
32+
2. On the left, select **Azure AD Connect**.
33+
3. On the left, select **Cloud sync**.
34+
35+
:::image type="content" source="../../../includes/media/active-directory-cloud-sync-how-to-install/new-ux-1.png" alt-text="Screenshot of new UX screen." lightbox="../../../includes/media/active-directory-cloud-sync-how-to-install/new-ux-1.png":::
36+
37+
4. On the left, select **Agent**.
38+
5. Select **Download on-premises agent**, and select **Accept terms & download**.
39+
40+
>[!NOTE]
41+
>Please use different provisioning agents for on-premises application provisioning and Azure AD Connect Cloud Sync / HR-driven provisioning. All three scenarios should not be managed on the same agent.
42+
43+
1. Open the provisioning agent installer, agree to the terms of service, and select **next**.
44+
1. When the provisioning agent wizard opens, continue to the **Select Extension** tab and select **On-premises application provisioning** when prompted for the extension you want to enable.
45+
1. The provisioning agent will use the operating system's web browser to display a popup window for you to authenticate to Azure AD, and potentially also your organization's identity provider. If you are using Internet Explorer as the browser on Windows Server, then you may need to add Microsoft web sites to your browser's trusted site list to allow JavaScript to run correctly.
46+
1. Provide credentials for an Azure AD administrator when you're prompted to authorize. The user is required to have the Hybrid Identity Administrator or Global Administrator role.
47+
1. Select **Confirm** to confirm the setting. Once installation is successful, you can select **Exit**, and also close the Provisioning Agent Package installer.
3548

3649
## Provisioning to SCIM-enabled application
37-
Once the agent is installed, no further configuration is necesary on-prem, and all provisioning configurations are then managed from the portal. Repeat the below steps for every on-premises application being provisioned via SCIM.
50+
Once the agent is installed, no further configuration is necessary on-premises, and all provisioning configurations are then managed from the portal. Repeat the below steps for every on-premises application being provisioned via SCIM.
3851

3952
1. In the Azure portal navigate to the Enterprise applications and add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
4053
2. From the left hand menu navigate to the **Provisioning** option and select **Get started**.
4154
3. Select **Automatic** from the dropdown list and expand the **On-Premises Connectivity** option.
4255
4. Select the agent that you installed from the dropdown list and select **Assign Agent(s)**.
4356
5. Now either wait 10 minutes or restart the **Microsoft Azure AD Connect Provisioning Agent** before proceeding to the next step & testing the connection.
44-
6. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolveable by DNS. An example for a scenario where the agent is installed on the same host as the application is https://localhost:8585/scim ![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
57+
6. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolvable by DNS. An example for a scenario where the agent is installed on the same host as the application is https://localhost:8585/scim ![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
4558
7. Select **Test Connection**, and save the credentials. The application SCIM endpoint must be actively listening for inbound provisioning requests, otherwise the test will fail. Use the steps [here](on-premises-ecma-troubleshoot.md#troubleshoot-test-connection-issues) if you run into connectivity issues.
4659
>[!NOTE]
4760
> If the test connection fails, you will see the request made. Please note that while the URL in the test connection error message is truncated, the actual request sent to the aplication contains the entire URL provided above.
@@ -53,7 +66,7 @@ Once the agent is installed, no further configuration is necesary on-prem, and a
5366
12. Go to the **Provisioning** pane, and select **Start provisioning**.
5467
13. Monitor using the [provisioning logs](../../active-directory/reports-monitoring/concept-provisioning-logs.md).
5568

56-
The following video provides an overview of on-premises provisoning.
69+
The following video provides an overview of on-premises provisioning.
5770
> [!VIDEO https://www.youtube.com/embed/QdfdpaFolys]
5871
5972
## Additional requirements

articles/active-directory/enterprise-users/licensing-groups-migrate-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The most important thing to keep in mind is that you should avoid a situation wh
4444

4545
1. Verify that no license assignments failed by checking each group for users in error state. For more information, see [Identifying and resolving license problems for a group](licensing-groups-resolve-problems.md).
4646

47-
Consider removing the original direct assignments. We recommend that you do it gradually, and monitor the outcome on a subset of users first. If you could leave the original direct assignments on users, but when the users leave their licensed groups they retain the directly assigned licenses, which might not be what you want.
47+
Consider removing the original direct assignments. We recommend that you do it gradually, and monitor the outcome on a subset of users first. You could leave the original direct assignments on users, but when the users leave their licensed groups they retain the directly assigned licenses, which might not be what you want.
4848

4949
## An example
5050

0 commit comments

Comments
 (0)