Skip to content

Commit 4ed029b

Browse files
MergeConflictFix
1 parent d6649ad commit 4ed029b

File tree

2 files changed

+1
-20
lines changed

2 files changed

+1
-20
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1329,11 +1329,7 @@ Applications that support the SCIM profile described in this article can be conn
13291329
1. In the app management screen, select **Provisioning** in the left panel.
13301330
1. In the **Provisioning Mode** menu, select **Automatic**.
13311331

1332-
<<<<<<< HEAD
1333-
The following screenshot shows how to configure provisioning settings:
1334-
=======
13351332
The following screenshot shows the configuring provisioning settings in the Microsoft Entra admin center:
1336-
>>>>>>> 89ae6f906bf2a9742f18c04ce327dd16860ba801
13371333

13381334
![Screenshot of app provisioning page in the Microsoft Entra admin center.](media/use-scim-to-provision-users-and-groups/scim-figure-2b.png)
13391335

@@ -1419,7 +1415,6 @@ It's recommended, but not required, that you support multiple secrets for easy r
14191415
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
14201416
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application** > **Provisioning** and select **Authorize**.
14211417

1422-
<<<<<<< HEAD
14231418
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
14241419
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
14251420
1. Select your application and go to **Provisioning**.
@@ -1432,15 +1427,6 @@ It's recommended, but not required, that you support multiple secrets for easy r
14321427
1. The third party app redirects user back and provides the grant code
14331428

14341429
1. The Provisioning Service calls the token URL and provides the grant code. The third party application responds with the access token, refresh token, and expiry date
1435-
=======
1436-
1. Microsoft Entra admin center redirects user to the Authorization URL (sign in page for the third party app).
1437-
1438-
1. Admin provides credentials to the third party application.
1439-
1440-
1. Third party app redirects user back to Microsoft Entra admin center and provides the grant code
1441-
1442-
1. Microsoft Entra provisioning service calls the token URL and provides the grant code. The third party application responds with the access token, refresh token, and expiry date
1443-
>>>>>>> 89ae6f906bf2a9742f18c04ce327dd16860ba801
14441430

14451431
1. When the provisioning cycle begins, the service checks if the current access token is valid and exchanges it for a new token if needed. The access token is provided in each request made to the app and the validity of the request is checked before each request.
14461432

articles/active-directory/develop/quickstart-console-app-nodejs-acquire-token.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -68,13 +68,8 @@ To register your application and add the app's registration information to your
6868

6969
Using a plaintext secret in the source code poses an increased security risk for your application. Although the sample in this quickstart uses a plaintext client secret, it's only for simplicity. We recommend using [certificate credentials](./certificate-credentials.md) instead of client secrets in your confidential client applications, especially those apps you intend to deploy to production.
7070

71-
<<<<<<< HEAD
72-
1. Edit *.env* and replace the Azure AD and Microsoft Graph endpoints with the following values:
73-
- For the Azure AD endpoint, replace `Enter_the_Cloud_Instance_Id_Here` with `https://login.microsoftonline.com`.
74-
=======
75-
3. Edit *.env* and replace the Microsoft Entra ID and Microsoft Graph endpoints with the following values:
71+
1. Edit *.env* and replace the Microsoft Entra ID and Microsoft Graph endpoints with the following values:
7672
- For the Microsoft Entra endpoint, replace `Enter_the_Cloud_Instance_Id_Here` with `https://login.microsoftonline.com`.
77-
>>>>>>> 89ae6f906bf2a9742f18c04ce327dd16860ba801
7873
- For the Microsoft Graph endpoint, replace `Enter_the_Graph_Endpoint_Here` with `https://graph.microsoft.com/`.
7974

8075
#### Step 4: Admin consent

0 commit comments

Comments
 (0)