Skip to content

Commit 45b702c

Browse files
Merge pull request #246606 from v-missam/airbase
doc-1
2 parents 5bacfbc + 9709e25 commit 45b702c

File tree

5 files changed

+26
-10
lines changed

5 files changed

+26
-10
lines changed

articles/active-directory/saas-apps/airtable-provisioning-tutorial.md

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,23 @@ The scenario outlined in this tutorial assumes that you already have the followi
3737
* A user account in Airtable with Admin permissions.
3838

3939
## Step 1. Plan your provisioning deployment
40-
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
41-
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
42-
1. Determine what data to [map between Azure AD and Airtable](../app-provisioning/customize-application-attributes.md).
40+
* Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
41+
* Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
42+
* Determine what data to [map between Azure AD and Airtable](../app-provisioning/customize-application-attributes.md).
4343

44-
## Step 2. Configure Airtable to support provisioning with Azure AD
45-
Contact Airtable support to configure Airtable to support provisioning with Azure AD.
44+
## Step 2. Create an Airtable Personal Access Token to authorize provisioning with Azure AD.
45+
46+
1. Login to [Airtable Developer Hub](https://airtable.com) as an Admin user, and then navigate to `https://airtable.com/create/tokens`.
47+
1. Select "Personal Access Tokens" from the left hand navigation bar.
48+
49+
![Screenshot of Personal Access Token Selection.](media/airtable-provisioning-tutorial/developer-hub-personal-access-token.png)
50+
51+
1. Create a new token with a memorable name such as "AzureAdScimProvisioning".
52+
1. Add the "enterprise.scim.usersAndGroups:manage" scope.
53+
54+
![Screenshot of enterprise scim scope addition.](media/airtable-provisioning-tutorial/enterprise-scim-scope.png)
55+
56+
1. Select "Create Token" and copy the resulting token for use in **Step 5** below.
4657

4758
## Step 3. Add Airtable from the Azure AD application gallery
4859

@@ -79,7 +90,12 @@ This section guides you through the steps to configure the Azure AD provisioning
7990

8091
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
8192

82-
1. Under the **Admin Credentials** section, input your Airtable Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Airtable. If the connection fails, ensure your Airtable account has Admin permissions and try again.
93+
1. Under the **Admin Credentials** section,
94+
1. Enter `https://airtable.com/scim/v2` as the Airtable **Tenant URL**.
95+
96+
1. Enter the Personal Access Token created in **Step 2** above as **Secret Token**.
97+
98+
Click **Test Connection** to ensure Azure AD can connect to Airtable. If the connection fails, ensure your Airtable account has Admin permissions and that your personal access token has the appropriate scope applied and try again.
8399

84100
![Screenshot of Token.](common/provisioning-testconnection-tenanturltoken.png)
85101

articles/active-directory/saas-apps/kintone-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: thwimmer
1616

1717
# Tutorial: Configure Kintone for automatic user provisioning
1818

19-
This tutorial describes the steps you need to perform in both Kintone and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users to [Kintone](https://www.kintone.com/en-us/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
19+
This tutorial describes the steps you need to perform in both Kintone and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users to [Kintone](https://www.kintone.com) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
2020

2121

2222
## Supported capabilities
9.62 KB
Loading
38.5 KB
Loading

articles/active-directory/saas-apps/wiggledesk-provisioning-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ The scenario outlined in this tutorial assumes that you already have the followi
3535
* A user account in WiggleDesk with Admin permissions.
3636

3737
## Step 1. Plan your provisioning deployment
38-
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
39-
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
40-
1. Determine what data to [map between Azure AD and WiggleDesk](../app-provisioning/customize-application-attributes.md).
38+
* Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
39+
* Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
40+
* Determine what data to [map between Azure AD and WiggleDesk](../app-provisioning/customize-application-attributes.md).
4141

4242
## Step 2. Configure WiggleDesk to support provisioning with Azure AD
4343
Contact WiggleDesk support to configure WiggleDesk to support provisioning with Azure AD.

0 commit comments

Comments
 (0)