Skip to content

Commit 3c3bec6

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pauljewell-obj-model
2 parents 1968ec9 + 86dae39 commit 3c3bec6

File tree

229 files changed

+1527
-912
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

229 files changed

+1527
-912
lines changed

articles/active-directory/app-provisioning/configure-automatic-user-provisioning-portal.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,11 @@ This article describes the general steps for managing automatic user account pro
2222
2323
## Finding your apps in the portal
2424

25-
Use the Azure Active Directory portal to view and manage all applications that are configured for single sign-on in a directory. Enterprise apps are apps that are deployed and used within your organization. Follow these steps to view and manage your enterprise applications:
25+
Use the Azure portal to view and manage all applications that are configured for single sign-on in a directory. Enterprise apps are apps that are deployed and used within your organization. Follow these steps to view and manage your enterprise applications:
2626

27-
1. Open the [Azure Active Directory portal](https://aad.portal.azure.com).
28-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
27+
1. Open the [Azure portal](https://portal.azure.com).
28+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
29+
1. A list of all configured apps is shown, including apps that were added from the gallery.
2930
1. Select any app to load its resource pane, where you can view reports and manage app settings.
3031
1. Select **Provisioning** to manage user account provisioning settings for the selected app.
3132

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,9 @@ You can customize the default attribute-mappings according to your business need
2929

3030
Follow these steps to access the **Mappings** feature of user provisioning:
3131

32-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com).
33-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
32+
1. Sign in to the [Azure portal](https://portal.azure.com).
33+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
34+
1. A list of all configured apps is shown, including apps that were added from the gallery.
3435
1. Select any app to load its app management pane, where you can view reports and manage app settings.
3536
1. Select **Provisioning** to manage user account provisioning settings for the selected app.
3637
1. Expand **Mappings** to view and edit the user attributes that flow between Azure AD and the target application. If the target application supports it, this section lets you optionally configure provisioning of groups and user accounts.
@@ -142,7 +143,7 @@ When you are editing the list of supported attributes, the following properties
142143

143144
#### Provisioning a custom extension attribute to a SCIM compliant application
144145
The SCIM RFC defines a core user and group schema, while also allowing for extensions to the schema to meet your application's needs. To add a custom attribute to a SCIM application:
145-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
146+
1. Sign in to the [Azure portal](https://portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
146147
2. Under **Mappings**, select the object (user or group) for which you'd like to add a custom attribute.
147148
3. At the bottom of the page, select **Show advanced options**.
148149
4. Select **Edit attribute list for AppName**.

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Since ECMA Connector Host currently only supports the USER object type, the OBJE
7979

8080
### User creation workflow
8181

82-
1. The Azure AD provisioning service queries the ECMA Connector Host to see if the user exists. It uses the **matching attribute** as the filter. This attribute is defined in the Azure AD portal under Enterprise applications -> On-premises provisioning -> provisioning -> attribute matching. It is denoted by the 1 for matching precedence.
82+
1. The Azure AD provisioning service queries the ECMA Connector Host to see if the user exists. It uses the **matching attribute** as the filter. This attribute is defined in the Azure portal under Enterprise applications -> On-premises provisioning -> provisioning -> attribute matching. It is denoted by the 1 for matching precedence.
8383
You can define one or more matching attribute(s) and prioritize them based on the precedence. Should you want to change the matching attribute you can also do so.
8484
[![Matching attribute](.\media\on-premises-application-provisioning-architecture\match-1.png)](.\media\on-premises-application-provisioning-architecture\match-1.png#lightbox)
8585

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Widen the rollout to larger groups of users by increasing the scope of the group
144144

145145
## Plan application connections and administration
146146

147-
Use the Azure AD portal to view and manage all the applications that support provisioning. See [Finding your apps in the portal](../app-provisioning/configure-automatic-user-provisioning-portal.md).
147+
Use the Azure portal to view and manage all the applications that support provisioning. See [Finding your apps in the portal](../app-provisioning/configure-automatic-user-provisioning-portal.md).
148148

149149
### Determine the type of connector to use
150150

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ To facilitate Azure AD provisioning workflows between the cloud HR app and Activ
150150

151151
For example, the following image lists the Workday connector apps that are available in the Azure AD app gallery.
152152

153-
![Azure Active Directory portal app gallery](media/plan-cloud-hr-provision/plan-cloudhr-provisioning-img2.png)
153+
![Azure portal app gallery](media/plan-cloud-hr-provision/plan-cloudhr-provisioning-img2.png)
154154

155155
### Decision flow chart
156156

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1308,8 +1308,9 @@ Applications that support the SCIM profile described in this article can be conn
13081308

13091309
**To connect an application that supports SCIM:**
13101310

1311-
1. Sign in to the [Azure AD portal](https://aad.portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1312-
1. Select **Enterprise applications** from the left pane. A list of all configured apps is shown, including apps that were added from the gallery.
1311+
1. Sign in to the [Azure portal](https://portal.azure.com). You can get access a free trial for Azure AD with P2 licenses by signing up for the [developer program](https://developer.microsoft.com/microsoft-365/dev-program))
1312+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
1313+
1. A list of all configured apps is shown, including apps that were added from the gallery.
13131314
1. Select **+ New application** > **+ Create your own application**.
13141315
1. Enter a name for your application, choose the option "*integrate any other application you don't find in the gallery*" and select **Add** to create an app object. The new app is added to the list of enterprise applications and opens to its app management screen.
13151316

@@ -1397,9 +1398,7 @@ The provisioning service supports the [authorization code grant](https://tools.i
13971398
> [!NOTE]
13981399
> OAuth v1 is not supported due to exposure of the client secret. OAuth v2 is supported.
13991400

1400-
Best practices (recommended, but not required):
1401-
* Support multiple redirect URLs. Administrators can configure provisioning from both "portal.azure.com" and "aad.portal.azure.com". Supporting multiple redirect URLs will ensure that users can authorize access from either portal.
1402-
* Support multiple secrets for easy renewal, without downtime.
1401+
Supportting multiple secrets for easy renewal, without downtime is recommended, but not required.
14031402

14041403
#### How to set up OAuth code grant flow
14051404

articles/active-directory/app-proxy/application-proxy-config-problem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Problem creating an Azure Active Directory Application Proxy application
3-
description: How to troubleshoot issues creating Application Proxy applications in the Azure Active Directory Admin portal
3+
description: How to troubleshoot issues creating Application Proxy applications in the Azure portal
44
services: active-directory
55
author: kenwith
66
manager: amycolannino

articles/active-directory/app-proxy/application-proxy-configure-custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To create and verify a custom domain:
6666
1. Go to your domain registrar and create a new TXT record for your domain, based on your copied DNS information.
6767
1. After you register the domain, on the domain's page in Azure Active Directory, select **Verify**. Once the domain status is **Verified**, you can use the domain across all your Azure AD configurations, including Application Proxy.
6868

69-
For more detailed instructions, see [Add your custom domain name using the Azure Active Directory portal](../fundamentals/add-custom-domain.md).
69+
For more detailed instructions, see [Add your custom domain name using the Azure portal](../fundamentals/add-custom-domain.md).
7070

7171
### Configure an app to use a custom domain
7272

articles/active-directory/app-proxy/application-proxy-configure-custom-home-page.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ You can set the home page URL either through the Azure portal or by using PowerS
4242

4343
## Change the home page in the Azure portal
4444

45-
To change the home page URL of your app through the Azure AD portal, follow these steps:
45+
To change the home page URL of your app through the Azure portal, follow these steps:
4646

4747
1. Sign in to the [Azure portal](https://portal.azure.com/) as an administrator.
4848
1. Select **Azure Active Directory**, and then **App registrations**. The list of registered apps appears.

articles/active-directory/app-proxy/application-proxy-configure-native-client-application.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,8 @@ Publish your proxy application as you would any other application and assign use
3333

3434
You now need to register your application in Azure AD, as follows:
3535

36-
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/). The **Dashboard** for the **Azure Active Directory admin center** appears.
37-
1. In the sidebar, select **Azure Active Directory**. The **Azure Active Directory** overview page appears.
38-
1. In the Azure AD overview sidebar, select **App registrations**. The list of all app registrations appears.
36+
1. Sign in to the [Azure portal](https://portal.azure.com).
37+
1. Browse to **Azure Active Directory** > **App registrations**. The list of all app registrations appears.
3938
1. Select **New registration**. The **Register an application** page appears.
4039

4140
![Create a new app registration in the Azure portal](./media/application-proxy-configure-native-client-application/create.png)
@@ -99,9 +98,9 @@ if (authResult != null)
9998
}
10099
```
101100

102-
The required info in the sample code can be found in the Azure AD portal, as follows:
101+
The required info in the sample code can be found in the Azure portal, as follows:
103102

104-
| Info required | How to find it in the Azure AD portal |
103+
| Info required | How to find it in the Azure portal |
105104
| --- | --- |
106105
| \<Tenant ID> | **Azure Active Directory** > **Properties** > **Directory ID** |
107106
| \<App ID of the Native app> | **Application registration** > *your native application* > **Overview** > **Application ID** |

0 commit comments

Comments
 (0)