Skip to content

Commit 362359c

Browse files
authored
Merge pull request #179946 from MicrosoftDocs/master
11/15 AM Publish
2 parents 3ae70bc + e8afe54 commit 362359c

File tree

169 files changed

+1126
-896
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

169 files changed

+1126
-896
lines changed

.github/workflows/stale.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
exempt-pr-labels: keep-open
2121
operations-per-run: 1200
2222
ascending: true
23-
start-date: '2021-08-10'
23+
start-date: '2021-07-29'
2424
stale-pr-message: >
2525
This pull request has been inactive for at least 14 days.
2626
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.

articles/active-directory/develop/custom-rbac-for-developers.md

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 06/28/2021
12+
ms.date: 11/15/2021
1313
ms.custom: template-concept
1414
ms.author: cchiedo
1515
ms.reviewer: john.garland, maggie.marxen, ian.bennett, marsma
@@ -19,11 +19,7 @@ ms.reviewer: john.garland, maggie.marxen, ian.bennett, marsma
1919

2020
# Role-based access control for application developers
2121

22-
Role-based access control (RBAC) allows certain users or groups to have specific permissions regarding which resources they have access to, what they can do with those resources, and who manages which resources. This article explains application-specific role-based access control.
23-
24-
> [!NOTE]
25-
> Application role-based access control differs from [Azure role-based access control](../../role-based-access-control/overview.md) and [Azure AD role-based access control](../roles/custom-overview.md#understand-azure-ad-role-based-access-control). Azure custom roles and built-in roles are both part of Azure RBAC, which helps you manage Azure resources. Azure AD RBAC allows you to manage Azure AD resources.
26-
22+
Role-based access control (RBAC) allows certain users or groups to have specific permissions regarding which resources they have access to, what they can do with those resources, and who manages which resources. Application role-based access control differs from [Azure role-based access control](../../role-based-access-control/overview.md) and [Azure AD role-based access control](../roles/custom-overview.md#understand-azure-ad-role-based-access-control). Azure custom roles and built-in roles are both part of Azure RBAC, which helps you manage Azure resources. Azure AD RBAC allows you to manage Azure AD resources. This article explains application-specific role-based access control.
2723

2824

2925
## What are roles?
@@ -62,8 +58,7 @@ App roles and groups both store information about user assignments in the Azure
6258

6359
Using custom storage allows developers extra customization and control over how to assign roles to users and how to represent them. However, the extra flexibility also introduces more responsibility. For example, there's no mechanism currently available to include this information in tokens returned from Azure AD. If developers maintain role information in a custom data store, they'll need to have the apps retrieve the roles. This is typically done using extensibility points defined in the middleware available to the platform that is being used to develop the application. Furthermore, developers are responsible for properly securing the custom data store.
6460

65-
> [!NOTE]
66-
> Using [Azure AD B2C Custom policies](../../active-directory-b2c/custom-policy-overview.md) it is possible to interact with custom data stores and to include custom claims within a token.
61+
Using [Azure AD B2C Custom policies](../../active-directory-b2c/custom-policy-overview.md) it is possible to interact with custom data stores and to include custom claims within a token.
6762

6863
## Choosing an approach
6964

@@ -79,13 +74,10 @@ Although either app roles or groups can be used for authorization, key differenc
7974
|**Role values are static between Azure AD tenants**|Yes |No |Depends on the implementation.|
8075
|**Role values can be used in multiple applications**|No. Unless role configuration is duplicated in each app registration.|Yes |Yes |
8176
|**Information stored within directory**|Yes |Yes |No |
82-
|**Information is delivered via tokens**|Yes (roles claim) |Yes* (groups claim) |No. Retrieved at runtime via custom code. |
77+
|**Information is delivered via tokens**|Yes (roles claim) |Yes (In the case of an overage, *groups claims* may need to be retrieved at runtime) |No. Retrieved at runtime via custom code. |
8378
|**Lifetime**|Lives in app registration in directory. Removed when the app registration is removed.|Lives in directory. Remain intact even if the app registration is removed. |Lives in custom data store. Not tied to app registration.|
8479

8580

86-
> [!NOTE]
87-
> Yes* - In the case of an overage, *groups claims* may need to be retrieved at runtime.
88-
8981
## Next steps
9082

9183
- [How to add app roles to your application and receive them in the token](./howto-add-app-roles-in-azure-ad-apps.md).

articles/active-directory/devices/hybrid-azuread-join-managed-domains.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,14 @@ If some of your domain-joined devices are Windows down-level devices, you must:
128128
- Configure seamless SSO
129129
- Install Microsoft Workplace Join for Windows down-level computers
130130

131+
Windows down-level devices are devices with older operating systems. The following are Windows down-level devices:
132+
133+
- Windows 7
134+
- Windows 8.1
135+
- Windows Server 2008 R2
136+
- Windows Server 2012
137+
- Windows Server 2012 R2
138+
131139
> [!NOTE]
132140
> Windows 7 support ended on January 14, 2020. For more information, see [Windows 7 support ended](https://support.microsoft.com/help/4057281/windows-7-support-ended-on-january-14-2020).
133141
Lines changed: 149 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,149 @@
1+
---
2+
title: 'Tutorial: Configure BIC Cloud Design for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to automatically provision and de-provision user accounts from Azure AD to BIC Cloud Design.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: twimmers
7+
writer: Thwimmer
8+
manager: beatrizd
9+
10+
ms.assetid: 1aace746-6f6d-4ac4-ad2c-7ba65bb86a72
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: article
17+
ms.date: 11/15/2021
18+
ms.author: Thwimmer
19+
---
20+
21+
# Tutorial: Configure BIC Cloud Design for automatic user provisioning
22+
23+
This tutorial describes the steps you need to perform in both BIC Cloud Design and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [BIC Cloud Design](https://www.gbtec.de/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
24+
25+
26+
## Capabilities supported
27+
> [!div class="checklist"]
28+
> * Create users in BIC Cloud Design.
29+
> * Remove users in BIC Cloud Design when they do not require access anymore.
30+
> * Keep user attributes synchronized between Azure AD and BIC Cloud Design.
31+
> * Provision groups and group memberships in BIC Cloud Design.
32+
> * [Single sign-on](bic-cloud-design-tutorial.md) to BIC Cloud Design.
33+
34+
## Prerequisites
35+
36+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
37+
38+
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md).
39+
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
40+
41+
42+
## Step 1. Plan your provisioning deployment
43+
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
44+
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
45+
1. Determine what data to [map between Azure AD and BIC Cloud Design](../app-provisioning/customize-application-attributes.md).
46+
47+
## Step 2. Configure BIC Cloud Design to support provisioning with Azure AD
48+
49+
To configure BIC Cloud Design to support provisioning with Azure AD - please write an email to [BIC Cloud Design support team](mailto:[email protected]).
50+
51+
## Step 3. Add Contoso from the Azure AD application gallery
52+
53+
Add BIC Cloud Design from the Azure AD application gallery to start managing provisioning to BIC Cloud Design. If you have previously setup BIC Cloud Design for SSO, you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
54+
55+
## Step 4. Define who will be in scope for provisioning
56+
57+
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
58+
59+
* When assigning users and groups to BIC Cloud Design, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add more roles.
60+
61+
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
62+
63+
64+
## Step 5. Configure automatic user provisioning to BIC Cloud Design
65+
66+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in BIC Cloud Design based on user and/or group assignments in Azure AD.
67+
68+
### To configure automatic user provisioning for BIC Cloud Design in Azure AD:
69+
70+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
71+
72+
![Enterprise applications blade](common/enterprise-applications.png)
73+
74+
1. In the applications list, select **BIC Cloud Design**.
75+
76+
![The Contoso link in the Applications list](common/all-applications.png)
77+
78+
1. Select the **Provisioning** tab.
79+
80+
![Provisioning tab](common/provisioning.png)
81+
82+
1. Set the **Provisioning Mode** to **Automatic**.
83+
84+
![Provisioning tab automatic](common/provisioning-automatic.png)
85+
86+
1. Under the **Admin Credentials** section, input your BIC Cloud Design Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to BIC Cloud Design. If the connection fails, ensure your BIC Cloud Design account has Admin permissions and try again.
87+
88+
![Token](common/provisioning-testconnection-tenanturltoken.png)
89+
90+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
91+
92+
![Notification Email](common/provisioning-notification-email.png)
93+
94+
1. Select **Save**.
95+
96+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to BIC Cloud Design**.
97+
98+
1. Review the user attributes that are synchronized from Azure AD to BIC Cloud Design in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in BIC Cloud Design for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the BIC Cloud Design API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
99+
100+
|Attribute|Type|Supported for filtering|Required by Real Links|
101+
|---|---|---|---|
102+
|userName|String|✓|✓
103+
|emails[type eq "work"].value|String|✓|✓
104+
|active|Boolean||✓
105+
|roles[primary eq "True"].value|String||✓
106+
|displayName|String||✓
107+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:organization|String||✓
108+
109+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to BIC Cloud Design**.
110+
111+
1. Review the group attributes that are synchronized from Azure AD to BIC Cloud Design in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in BIC Cloud Design for update operations. Select the **Save** button to commit any changes.
112+
113+
|Attribute|Type|Supported for filtering|Required by Real Links|
114+
|---|---|---|---|
115+
|displayName|String|✓|✓
116+
|externalId|String||✓
117+
|members|Reference|
118+
119+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
120+
121+
1. To enable the Azure AD provisioning service for BIC Cloud Design, change the **Provisioning Status** to **On** in the **Settings** section.
122+
123+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
124+
125+
1. Define the users and/or groups that you would like to provision to BIC Cloud Design by choosing the desired values in **Scope** in the **Settings** section.
126+
127+
![Provisioning Scope](common/provisioning-scope.png)
128+
129+
1. When you are ready to provision, click **Save**.
130+
131+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
132+
133+
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
134+
135+
## Step 6. Monitor your deployment
136+
Once you've configured provisioning, use the following resources to monitor your deployment:
137+
138+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
139+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
140+
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
141+
142+
## More resources
143+
144+
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
145+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
146+
147+
## Next steps
148+
149+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

0 commit comments

Comments
 (0)