You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article introduces and administrator for Azure Active Directory (Azure AD), part of Microsoft Entra, to the relationship between top [identity management](../fundamentals/active-directory-whatis.md?context=azure%2factive-directory%2fusers-groups-roles%2fcontext%2fugr-context) tasks for users in terms of their groups, licenses, deployed enterprise apps, and administrator roles. As your organization grows, you can use Azure AD groups and administrator roles to:
23
23
24
-
* Assign licenses to groups instead of to individually
25
-
* Delegate permissions to distribute the work of Azure AD management to less-privileged roles
26
-
* Assign enterprise app access to groups
24
+
* Assign licenses to groups instead of to individual users.
25
+
* Delegate permissions to distribute the work of Azure AD management to less-privileged roles.
26
+
* Assign enterprise app access to groups.
27
27
28
28
## Assign users to groups
29
29
30
30
You can use groups in Azure AD to assign licenses to large numbers of users, or to assign user access to deployed enterprise apps. You can use groups to assign all administrator roles except for Global Administrator in Azure AD, or you can grant access to resources that are external, such as SaaS applications or SharePoint sites.
31
31
32
-
For additional flexibility and to reduce the work of managing group membership, you can use [dynamic groups](groups-create-rule.md) in Azure AD to expand and contract group membership automatically. You'll need an Azure AD Premium P1 license for each unique user that is a member of one or more dynamic groups.
32
+
For additional flexibility and to reduce group membership management work, you can use [dynamic groups](groups-create-rule.md) in Azure AD to expand and contract group membership automatically. You'll need an Azure AD Premium P1 license for each unique user that is a member of one or more dynamic groups.
33
33
34
34
## Assign licenses to groups
35
35
36
36
Assigning or removing licenses from users individually can demand time and attention. If you [assign licenses to groups](../fundamentals/license-users-groups.md?context=azure%2factive-directory%2fusers-groups-roles%2fcontext%2fugr-context) instead, you can make your large-scale license management easier.
37
37
38
-
In Azure AD, when users join a licensed group, they're automatically assigned the appropriate licenses. When users leave the group, Azure AD removes their license assignments. Without Azure AD groups, you'd have to write a PowerShell script or use Graph API to bulk add or remove user licenses for users joining or leaving the organization.
38
+
Azure ADusers who join a licensed group are automatically assigned the appropriate licenses. When users leave the group, Azure AD removes their license assignments. Without Azure AD groups, you'd have to write a PowerShell script or use Graph API to bulk add or remove user licenses for users joining or leaving the organization.
39
39
40
-
If there are not enough available licenses, or an issue occurs like service plans that can't be assigned at the same time, you can see status of any licensing issue for the group in the Azure portal.
40
+
If there aren't enough licenses available, or an issue occurs like service plans that can't be assigned at the same time, you can see status of any licensing issue for the group in the Azure portal.
4. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following step:
73
+
4. On the **Basic SAML Configuration** section, If you wish to configure the application in **IDP** initiated mode, perform the following steps:
74
74
75
-
In the **Identifier** text box, type the URL:
75
+
a. In the **Identifier** text box, type the URL:
76
76
`https://api.clearcompany.com`
77
77
78
+
b. In the **Reply URL** text box, type the URL:
79
+
`https://api.clearcompany.com/v1/auth/sso/saml`
80
+
78
81
5. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
79
82
80
83
In the **Sign-on URL** text box, type a URL using the following pattern:
@@ -129,15 +132,15 @@ In this section, you test your Azure AD single sign-on configuration with follow
129
132
130
133
#### SP initiated:
131
134
132
-
* Click on **Test this application** in Azure portal. This will redirect to ClearCompany Signon URL where you can initiate the login flow.
135
+
* Click on **Test this application** in Azure portal. This will redirect to ClearCompany Sign-on URL where you can initiate the login flow.
133
136
134
-
* Go to ClearCompany Sign-on URL directly and initiate the login flow from there.
137
+
* Go to ClearCompany Signon URL directly and initiate the login flow from there.
135
138
136
139
#### IDP initiated:
137
140
138
141
* Click on **Test this application** in Azure portal and you should be automatically signed in to the ClearCompany for which you set up the SSO.
139
142
140
-
You can also use Microsoft My Apps to test the application in any mode. When you click the ClearCompany tile in the My Apps, if configured in SP mode you would be redirected to the application signon page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the ClearCompany for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
143
+
You can also use Microsoft My Apps to test the application in any mode. When you click the ClearCompany tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the ClearCompany for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/infor-cloudsuite-provisioning-tutorial.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,6 +68,14 @@ Before configuring and enabling automatic user provisioning, you should decide w
68
68
5. To generate the bearer token, copy the **User Identifier** and **SCIM Password**. Paste them in notepad++ separated by a colon. Encode the string value by navigating to **Plugins > MIME Tools > Basic64 Encode**.
69
69
70
70
:::image type="content" source="media/infor-cloudsuite-provisioning-tutorial/token.png" alt-text="Screenshot of a Notepad++ document. In the Plugins menu, MIME tools is highlighted. In the MIME tools menu, Base64 encode is highlighted." border="false":::
71
+
72
+
To generate the bearer token using PowerShell instead of Notepad++, use the following commands:
3. Copy the bearer token. This value will be entered in the Secret Token field in the Provisioning tab of your Infor CloudSuite application in the Azure portal.
0 commit comments