Skip to content

Commit 41093e1

Browse files
committed
Pull changes from master
2 parents 17a0a0a + bea449b commit 41093e1

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+1843
-31
lines changed
Lines changed: 170 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,170 @@
1+
---
2+
title: 'Tutorial: Configure 4me for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to 4me.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: zchia
7+
writer: zchia
8+
manager: beatrizd
9+
10+
ms.assetid: na
11+
ms.service: active-directory
12+
ms.component: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: article
17+
ms.date: 06/3/2019
18+
ms.author: zchia
19+
---
20+
21+
# Tutorial: Configure 4me for automatic user provisioning
22+
23+
The objective of this tutorial is to demonstrate the steps to be performed in 4me and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and de-provision users and/or groups to 4me.
24+
25+
> [!NOTE]
26+
> This tutorial describes a connector built on top of the Azure AD User Provisioning Service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
27+
>
28+
> This connector is currently in Public Preview. For more information on the general Microsoft Azure terms of use for Preview features, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
29+
30+
## Prerequisites
31+
32+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
33+
34+
* An Azure AD tenant
35+
* [A 4me tenant](https://www.4me.com/trial/)
36+
* A user account in 4me with Admin permissions.
37+
38+
## Add 4me from the gallery
39+
40+
Before configuring 4me for automatic user provisioning with Azure AD, you need to add 4me from the Azure AD application gallery to your list of managed SaaS applications.
41+
42+
**To add 4me from the Azure AD application gallery, perform the following steps:**
43+
44+
1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**.
45+
46+
![The Azure Active Directory button](common/select-azuread.png)
47+
48+
2. Go to **Enterprise applications**, and then select **All applications**.
49+
50+
![The Enterprise applications blade](common/enterprise-applications.png)
51+
52+
3. To add a new application, select the **New application** button at the top of the pane.
53+
54+
![The New application button](common/add-new-app.png)
55+
56+
4. In the search box, enter **4me**, select **4me** in the results panel, and then click the **Add** button to add the application.
57+
58+
![4me in the results list](common/search-new-app.png)
59+
60+
## Assigning users to 4me
61+
62+
Azure Active Directory uses a concept called *assignments* to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users and/or groups that have been assigned to an application in Azure AD are synchronized.
63+
64+
Before configuring and enabling automatic user provisioning, you should decide which users and/or groups in Azure AD need access to 4me. Once decided, you can assign these users and/or groups to 4me by following the instructions here:
65+
66+
* [Assign a user or group to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md)
67+
68+
### Important tips for assigning users to 4me
69+
70+
* It is recommended that a single Azure AD user is assigned to 4me to test the automatic user provisioning configuration. Additional users and/or groups may be assigned later.
71+
72+
* When assigning a user to 4me, you must select any valid application-specific role (if available) in the assignment dialog. Users with the **Default Access** role are excluded from provisioning.
73+
74+
## Configuring automatic user provisioning to 4me
75+
76+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in 4me based on user and/or group assignments in Azure AD.
77+
78+
> [!TIP]
79+
> You may also choose to enable SAML-based single sign-on for 4me, following the instructions provided in the [4me single sign-on tutorial](4me-tutorial.md). Single sign-on can be configured independently of automatic user provisioning, though these two features compliment each other.
80+
81+
### To configure automatic user provisioning for 4me in Azure AD:
82+
83+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
84+
85+
![Enterprise applications blade](common/enterprise-applications.png)
86+
87+
2. In the applications list, select **4me**.
88+
89+
![The 4me link in the Applications list](common/all-applications.png)
90+
91+
3. Select the **Provisioning** tab.
92+
93+
![Provisioning tab](common/provisioning.png)
94+
95+
4. Set the **Provisioning Mode** to **Automatic**.
96+
97+
![Provisioning tab](common/provisioning-automatic.png)
98+
99+
5. To retrieve the **Tenant URL** and **Secret Token** of your 4me account, follow the walkthrough as described in Step 6.
100+
101+
6. Sign in to your 4me Admin Console. Navigate to **Settings**.
102+
103+
![4me Settings](media/4me-provisioning-tutorial/4me01.png)
104+
105+
Type in **apps** in the search bar.
106+
107+
![4me apps](media/4me-provisioning-tutorial/4me02.png)
108+
109+
Open the **SCIM** dropdown to retrieve the Secret Token and the SCIM endpoint.
110+
111+
![4me SCIM](media/4me-provisioning-tutorial/4me03.png)
112+
113+
7. Upon populating the fields shown in Step 5, click **Test Connection** to ensure Azure AD can connect to 4me. If the connection fails, ensure your 4me account has Admin permissions and try again.
114+
115+
![Token](common/provisioning-testconnection-tenanturltoken.png)
116+
117+
8. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
118+
119+
![Notification Email](common/provisioning-notification-email.png)
120+
121+
9. Click **Save**.
122+
123+
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to 4me**.
124+
125+
![4me User Mappings](media/4me-provisioning-tutorial/4me-user-mapping.png)
126+
127+
11. Review the user attributes that are synchronized from Azure AD to 4me in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in 4me for update operations. Select the **Save** button to commit any changes.
128+
129+
![4me User Mappings](media/4me-provisioning-tutorial/4me-user-attributes.png)
130+
131+
12. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to 4me**.
132+
133+
![4me User Mappings](media/4me-provisioning-tutorial/4me-group-mapping.png)
134+
135+
13. Review the group attributes that are synchronized from Azure AD to 4me in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in 4me for update operations. Select the **Save** button to commit any changes.
136+
137+
![4me Group Mappings](media/4me-provisioning-tutorial/4me-group-attribute.png)
138+
139+
14. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
140+
141+
15. To enable the Azure AD provisioning service for 4me, change the **Provisioning Status** to **On** in the **Settings** section.
142+
143+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
144+
145+
16. Define the users and/or groups that you would like to provision to 4me by choosing the desired values in **Scope** in the **Settings** section.
146+
147+
![Provisioning Scope](common/provisioning-scope.png)
148+
149+
17. When you are ready to provision, click **Save**.
150+
151+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
152+
153+
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity report, which describes all actions performed by the Azure AD provisioning service on 4me.
154+
155+
For more information on how to read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
156+
157+
## Connector Limitations
158+
159+
* 4me has different SCIM endpoint URLs for test and production environments. The former ends with **.qa** while the latter ends with **.com**
160+
* 4me generated Secret Tokens have an expiration date of a month from generation.
161+
* 4me doesn’t support **DELETE** operations
162+
163+
## Additional resources
164+
165+
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
166+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
167+
168+
## Next steps
169+
170+
* [Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md)
15.1 KB
Loading
11.5 KB
Loading
27.6 KB
Loading
12.7 KB
Loading
4.72 KB
Loading
5.92 KB
Loading
28.7 KB
Loading

articles/active-directory/saas-apps/toc.yml

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
href: 23video-tutorial.md
1616
- name: 360 Online
1717
href: 360online-tutorial.md
18-
- name: 4me
18+
name: 4me
1919
href: 4me-tutorial.md
2020
- name: 8x8 Virtual Office
2121
href: 8x8virtualoffice-tutorial.md
@@ -319,6 +319,9 @@
319319
href: databasics-tutorial.md
320320
- name: Datahug
321321
href: datahug-tutorial.md
322+
name: Dailpad
323+
href: dailpad-provisioning-tutorial.md
324+
href: datahug-tutorial.md
322325
- name: Dealpath
323326
href: dealpath-tutorial.md
324327
- name: Degreed
@@ -885,8 +888,6 @@
885888
href: patentsquare-tutorial.md
886889
- name: Pavaso Digital Close
887890
href: pavaso-digital-close-tutorial.md
888-
- name: Peakon
889-
href: peakon-tutorial.md
890891
- name: Pega Systems
891892
href: pegasystems-tutorial.md
892893
- name: People
@@ -939,6 +940,8 @@
939940
href: promaster-tutorial.md
940941
- name: Proofpoint on Demand
941942
href: proofpoint-ondemand-tutorial.md
943+
- name: Proxyclick
944+
href: proxyclick-tutorial.md
942945
- name: PureCloud by Genesys
943946
href: purecloud-by-genesys-tutorial.md
944947
- name: PurelyHR
@@ -1349,6 +1352,8 @@
13491352
href: zoho-mail-tutorial.md
13501353
- name: Zoho One
13511354
href: zohoone-tutorial.md
1355+
name: Zoom
1356+
href: zoom-tutorial.md
13521357
- name: Zscaler
13531358
href: zscaler-tutorial.md
13541359
- name: Zscaler Beta
@@ -1369,6 +1374,13 @@
13691374
href: zscaler-zscloud-tutorial.md
13701375
- name: Zwayam
13711376
href: zwayam-tutorial.md
1377+
- name: User provisioning tutorials
1378+
expanded: true
1379+
items:
1380+
- name: 0 - 9
1381+
items:
1382+
- name: 4me
1383+
href: 4me-provisioning-tutorial.md
13721384
- name: User provisioning tutorials
13731385
expanded: true
13741386
items:

articles/cosmos-db/find-request-unit-charge.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to find the request unit (RU) charge for any operation ex
44
author: ThomasWeiss
55
ms.service: cosmos-db
66
ms.topic: sample
7-
ms.date: 05/23/2019
7+
ms.date: 06/14/2019
88
ms.author: thweiss
99
---
1010
# Find the request unit charge in Azure Cosmos DB
@@ -296,3 +296,4 @@ To learn about optimizing your RU consumption, see these articles:
296296
* [Globally scale provisioned throughput](scaling-throughput.md)
297297
* [Provision throughput on containers and databases](set-throughput.md)
298298
* [Provision throughput for a container](how-to-provision-container-throughput.md)
299+
* [Monitor and debug with metrics in Azure Cosmos DB](use-metrics.md)

0 commit comments

Comments
 (0)