Skip to content

Commit 4c006a8

Browse files
committed
Graph scrub on app provisioning
1 parent 432c9f7 commit 4c006a8

6 files changed

+71
-154
lines changed

articles/active-directory/app-provisioning/application-provisioning-configure-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Use MS Graph APIs to configure provisioning - Azure Active Directory | Microsoft Docs
3-
description: Need to set up provisioning for multiple instances of an application? Learn how to save time by using MS Graph APIs to automate the configuration of automatic provisioning.
2+
title: Use Microsoft Graph APIs to configure provisioning - Azure Active Directory | Microsoft Docs
3+
description: Need to set up provisioning for multiple instances of an application? Learn how to save time by using the Microsoft Graph APIs to automate the configuration of automatic provisioning.
44
services: active-directory
55
documentationcenter: ''
66
author: msmimart
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
# Configure provisioning using Microsoft Graph APIs
2424

25-
The Azure portal is a convenient way to configure provisioning for individual apps one at a time. But if you're creating several—or even hundreds—of instances of an application, it can be easier to automate app creation and configuration with Microsoft Graph APIs. This article outlines how to automate provisioning configuration through APIs. This method is commonly used for applications like [Amazon Web Services](../saas-apps/amazon-web-service-tutorial.md#configure-azure-ad-sso).
25+
The Azure portal is a convenient way to configure provisioning for individual apps one at a time. But if you're creating several—or even hundreds—of instances of an application, it can be easier to automate app creation and configuration with the Microsoft Graph APIs. This article outlines how to automate provisioning configuration through APIs. This method is commonly used for applications like [Amazon Web Services](../saas-apps/amazon-web-service-tutorial.md#configure-azure-ad-sso).
2626

2727
**Overview of steps for using Microsoft Graph APIs to automate provisioning configuration**
2828

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Applications and systems that support customization of the attribute list includ
108108
- Salesforce
109109
- ServiceNow
110110
- Workday
111-
- Azure Active Directory ([Azure AD Graph API default attributes](https://msdn.microsoft.com/Library/Azure/Ad/Graph/api/entity-and-complex-type-reference#user-entity) and custom directory extensions are supported)
111+
- Azure Active Directory ([Microsoft Graph REST API v1.0 reference](https://docs.microsoft.com/graph/api/overview?view=graph-rest-1.0) and custom directory extensions are supported)
112112
- Apps that support [SCIM 2.0](https://tools.ietf.org/html/rfc7643), where attributes defined in the [core schema](https://tools.ietf.org/html/rfc7643) need to be added
113113

114114
> [!NOTE]
@@ -129,7 +129,7 @@ When editing the list of supported attributes, the following properties are prov
129129
- **Multi-value?** - Whether the attribute supports multiple values.
130130
- **Exact case?** - Whether the attributes values are evaluated in a case-sensitive way.
131131
- **API Expression** - Don't use, unless instructed to do so by the documentation for a specific provisioning connector (such as Workday).
132-
- **Referenced Object Attribute** - If it's a Reference type attribute, then this menu lets you select the table and attribute in the target application that contains the value associated with the attribute. For example, if you have an attribute named "Department" whose stored value references an object in a separate "Departments" table, you would select "Departments.Name". The reference tables and the primary ID fields supported for a given application are pre-configured and currently can't be edited using the Azure portal, but can be edited using the [Graph API](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/synchronization-configure-with-custom-target-attributes).
132+
- **Referenced Object Attribute** - If it's a Reference type attribute, then this menu lets you select the table and attribute in the target application that contains the value associated with the attribute. For example, if you have an attribute named "Department" whose stored value references an object in a separate "Departments" table, you would select "Departments.Name". The reference tables and the primary ID fields supported for a given application are pre-configured and currently can't be edited using the Azure portal, but can be edited using the [Microsoft Graph API](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/synchronization-configure-with-custom-target-attributes).
133133

134134
#### Provisioning a custom extension attribute to a SCIM compliant application
135135
The SCIM RFC defines a core user and group schema, while also allowing for extensions to the schema to meet your application's needs. To add a custom attribute to a SCIM application:

articles/active-directory/app-provisioning/export-import-provisioning-configuration.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Export or import your provisioning configuration by using Graph API | Microsoft Docs'
3-
description: Learn how to export and import provisioning configuration using Graph API.
2+
title: 'Export or import your provisioning configuration by using the Microsoft Graph API | Microsoft Docs'
3+
description: Learn how to export and import provisioning configuration using the Microsoft Graph API.
44
services: active-directory
55
author: cmmdesai
66
documentationcenter: na
@@ -18,14 +18,14 @@ ms.author: chmutali
1818

1919
ms.collection: M365-identity-device-management
2020
---
21-
# Export or import your provisioning configuration by using Graph API
21+
# Export or import your provisioning configuration by using the Microsoft Graph API
2222

23-
You can use Microsoft Graph API and Graph Explorer to export your User Provisioning attribute mappings and schema to a JSON file and import it back into Azure AD. You can also use the steps captured here to create a backup of your provisioning configuration.
23+
You can use the Microsoft Graph API and the Microsoft Graph Explorer to export your User Provisioning attribute mappings and schema to a JSON file and import it back into Azure AD. You can also use the steps captured here to create a backup of your provisioning configuration.
2424

2525
## Step 1: Retrieve your Provisioning App Service Principal ID (Object ID)
2626

2727
1. Launch the [Azure portal](https://portal.azure.com), and navigate to the Properties section of your provisioning application. For e.g. if you want to export your *Workday to AD User Provisioning application* mapping navigate to the Properties section of that app.
28-
1. In the Properties section of your provisioning app, copy the GUID value associated with the *Object ID* field. This value is also called the **ServicePrincipalId** of your App and it will be used in Graph Explorer operations.
28+
1. In the Properties section of your provisioning app, copy the GUID value associated with the *Object ID* field. This value is also called the **ServicePrincipalId** of your App and it will be used in Microsoft Graph Explorer operations.
2929

3030
![Workday App Service Principal ID](./media/export-import-provisioning-configuration/wd_export_01.png)
3131

@@ -34,7 +34,7 @@ You can use Microsoft Graph API and Graph Explorer to export your User Provision
3434
1. Launch [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)
3535
1. Click on the "Sign-In with Microsoft" button and sign-in using Azure AD Global Admin or App Admin credentials.
3636

37-
![Graph Sign-in](./media/export-import-provisioning-configuration/wd_export_02.png)
37+
![Microsoft Graph Sign-in](./media/export-import-provisioning-configuration/wd_export_02.png)
3838

3939
1. Upon successful sign-in, you will see the user account details in the left-hand pane.
4040

0 commit comments

Comments
 (0)