You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sync-feature-preferreddatalocation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,7 +167,7 @@ The outbound synchronization rule permits the attribute value to flow from the m
167
167
| sourceObjectType | EQUAL | User |
168
168
| cloudMastered | NOTEQUAL | True |
169
169
170
-
Scoping filter determines which Azure AD objects this outbound synchronization rule is applied to. In this example, we use the same scoping filter from “Out to AD – User Identity” OOB (out-of-box) synchronization rule. It prevents the synchronization rule from being applied to **User** objects that are not synchronized from on-premises Active Directory. You might need to tweak the scoping filter according to your Azure AD Connect deployment.
170
+
Scoping filter determines which Azure AD objects this outbound synchronization rule is applied to. In this example, we use the same scoping filter from “Out to Azure AD – User Identity” OOB (out-of-box) synchronization rule. It prevents the synchronization rule from being applied to **User** objects that are not synchronized from on-premises Active Directory. You might need to tweak the scoping filter according to your Azure AD Connect deployment.
171
171
172
172
6. Go to the **Transformation** tab, and implement the following transformation rule:
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-provisioning-config-problem-no-users-provisioned.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: conceptual
15
-
ms.date: 09/20/2018
15
+
ms.date: 09/03/2019
16
16
ms.author: mimart
17
-
ms.reviewer: asteen
17
+
ms.reviewer: arvinh
18
18
ms.collection: M365-identity-device-management
19
19
---
20
20
@@ -25,29 +25,29 @@ After automatic provisioning has been configured for an application (including v
25
25
- Whether or not **attribute mappings** are enabled, and configured to sync valid attributes from Azure AD to the app. For more information on attribute mappings, see [Customizing User Provisioning Attribute Mappings for SaaS Applications in Azure Active Directory](customize-application-attributes.md).
26
26
- Whether or not there is a **scoping filter** present that is filtering users based on specific attribute values. For more information on scoping filters, see [Attribute-based application provisioning with scoping filters](define-conditional-rules-for-provisioning-user-accounts.md).
27
27
28
-
If you observe that users are not being provisioned, consult the Audit logs in Azure AD. Search for log entries for a specific user.
28
+
If you observe that users are not being provisioned, consult the [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) in Azure AD. Search for log entries for a specific user.
29
29
30
-
The provisioning audit logs can be accessed in the Azure portal, in the**Azure Active Directory > Enterprise Apps >\[Application Name\]> Audit Logs**tab. Filter the logs on the **Account Provisioning**category to only see the provisioning events for that app. You can search for users based on the “matching ID” that was configured for them in the attribute mappings. For example, if you configured the “user principal name” or “email address” as the matching attribute on the Azure AD side, and the user not being provisioning has a value of “[email protected]”, then search the audit logs for “[email protected]” and review the entries returned.
30
+
You can access the provisioning logs in the Azure portal by selecting**Azure Active Directory**>**Enterprise Apps**>**Provisioning logs (preview)**in the **Activity**section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
31
31
32
-
The provisioning audit logs record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning, querying the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison.
32
+
The provisioning logs record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning, querying the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison.
33
33
34
34
## General Problem Areas with Provisioning to consider
35
35
Below is a list of the general problem areas that you can drill into if you have an idea of where to start.
36
36
37
37
-[Provisioning service does not appear to start](#provisioning-service-does-not-appear-to-start)
38
-
-[Audit logs say users are skipped and not provisioned, even though they are assigned](#audit-logs-say-users-are-skipped-and-not-provisioned-even-though-they-are-assigned)
38
+
-[Provisioning logs say users are skipped and not provisioned, even though they are assigned](#provisioning-logs-say-users-are-skipped-and-not-provisioned-even-though-they-are-assigned)
39
39
40
40
## Provisioning service does not appear to start
41
-
If you set the **Provisioning Status** to be **On** in the **Azure Active Directory > Enterprise Apps >\[Application Name\]>Provisioning** section of the Azure portal. However no other status details are shown on that page after subsequent reloads, it is likely that the service is running but has not completed an initial synchronization yet. Check the **Audit logs** described above to determine what operations the service is performing, and if there are any errors.
41
+
If you set the **Provisioning Status** to be **On** in the **Azure Active Directory > Enterprise Apps >\[Application Name\]>Provisioning** section of the Azure portal. However no other status details are shown on that page after subsequent reloads, it is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs (preview)** described above to determine what operations the service is performing, and if there are any errors.
42
42
43
43
>[!NOTE]
44
-
>An initial sync can take anywhere from 20 minutes to several hours, depending on the size of the Azure AD directory and the number of users in scope for provisioning. Subsequent syncs after the initial sync are faster, as the provisioning service stores watermarks that represent the state of both systems after the initial sync. The initial sync improves performance of subsequent syncs.
44
+
>An initial cycle can take anywhere from 20 minutes to several hours, depending on the size of the Azure AD directory and the number of users in scope for provisioning. Subsequent syncs after the initial cycle are faster, as the provisioning service stores watermarks that represent the state of both systems after the initial cycle. The initial cycle improves performance of subsequent syncs.
45
45
>
46
46
47
47
48
-
## Audit logs say users are skipped and not provisioned even though they are assigned
48
+
## Provisioning logs say users are skipped and not provisioned even though they are assigned
49
49
50
-
When a user shows up as “skipped” in the audit logs, it is important to read the extended details in the log message to determine the reason. Below are common reasons and resolutions:
50
+
When a user shows up as “skipped” in the provisioning logs, it is important to review the **Steps** tab of the log to determine the reason. Below are common reasons and resolutions:
51
51
52
52
-**A scoping filter has been configured****that is filtering the user out based on an attribute value**. For more information on scoping filters, see [scoping filters](define-conditional-rules-for-provisioning-user-accounts.md).
53
53
-**The user is “not effectively entitled”.** If you see this specific error message, it is because there is a problem with the user assignment record stored in Azure AD. To fix this issue, unassign the user (or group) from the app, and reassign it again. For more information on assignment, see [Assign user or group access](assign-user-or-group-access-portal.md).
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-provisioning-config-problem.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: conceptual
16
-
ms.date: 07/11/2017
16
+
ms.date: 09/03/2019
17
17
ms.author: mimart
18
18
ms.reviewer: asteen
19
19
@@ -30,34 +30,34 @@ You should always start by finding the setup tutorial specific to setting up pro
30
30
31
31
Once the service is configured, most insights into the operation of the service can be drawn from two places:
32
32
33
-
-**Audit logs** – The provisioning audit logs record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning. Query the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison. The provisioning audit logs can be accessed in the Azure portal, in the**Azure Active Directory > Enterprise Apps >\[Application Name\]> Audit Logs**tab. Filter the logs on the **Account Provisioning**category to only see the provisioning events for that app.
33
+
-**Provisioning logs (preview)** – The [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning. Query the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison. You can access the provisioning logs in the Azure portal by selecting**Azure Active Directory**>**Enterprise Apps**>**Provisioning logs (preview)**in the **Activity**section.
34
34
35
-
-**Provisioning status –** A summary of the last provisioning run for a given app can be seen in the **Azure Active Directory > Enterprise Apps >\[Application Name\]>Provisioning** section, at the bottom of the screen under the service settings. This section summarizes how many users (and/or groups) are currently being synchronized between the two systems, and if there are any errors. Error details be in the audit logs. Note that the provisioning status not be populated until one full initial synchronization has been completed between Azure AD and the app.
35
+
-**Current status –** A summary of the last provisioning run for a given app can be seen in the **Azure Active Directory > Enterprise Apps >\[Application Name\]>Provisioning** section, at the bottom of the screen under the service settings. The Current Status section shows whether a provisioning cycle has started provisioning user accounts. You can watch the progress of the cycle, see how many users and groups have been provisioned, and see how many roles are created. If there are any errors, details can be found in the [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
36
36
37
37
## General problem areas with provisioning to consider
38
38
39
39
Below is a list of the general problem areas that you can drill into if you have an idea of where to start.
40
40
41
41
*[Provisioning service does not appear to start](#provisioning-service-does-not-appear-to-start)
42
42
* Can’t save configuration due to app credentials not working
43
-
*[Audit logs say users are “skipped” and not provisioned, even though they are assigned](#audit-logs-say-users-are-skipped-and-not-provisioned-even-though-they-are-assigned)
43
+
*[Provisioning logs say users are “skipped” and not provisioned, even though they are assigned](#provisioning-logs-say-users-are-skipped-and-not-provisioned-even-though-they-are-assigned)
44
44
45
45
## Provisioning service does not appear to start
46
46
47
-
If you set the **Provisioning Status** to be **On** in the **Azure Active Directory > Enterprise Apps >\[Application Name\]>Provisioning** section of the Azure portal. However no other status details are shown on that page after subsequent reloads. It is likely that the service is running but has not completed an initial synchronization yet. Check the **Audit logs** described above to determine what operations the service is performing, and if there are any errors.
47
+
If you set the **Provisioning Status** to be **On** in the **Azure Active Directory > Enterprise Apps >\[Application Name\]>Provisioning** section of the Azure portal. However no other status details are shown on that page after subsequent reloads. It is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs** described above to determine what operations the service is performing, and if there are any errors.
48
48
49
49
>[!NOTE]
50
-
>An initial sync can take anywhere from 20 minutes to several hours, depending on the size of the Azure AD directory and the number of users in scope for provisioning. Subsequent syncs after the initial sync be faster, as the provisioning service stores watermarks that represent the state of both systems after the initial sync, improving performance of subsequent syncs.
50
+
>An initial cycle can take anywhere from 20 minutes to several hours, depending on the size of the Azure AD directory and the number of users in scope for provisioning. Subsequent syncs after the initial cycle be faster, as the provisioning service stores watermarks that represent the state of both systems after the initial cycle, improving performance of subsequent syncs.
51
51
>
52
52
>
53
53
54
54
## Can’t save configuration due to app credentials not working
55
55
56
56
In order for provisioning to work, Azure AD requires valid credentials that allow it to connect to a user management API provided by that app. If these credentials don’t work, or you don’t know what they are, review the tutorial for setting up this app, described previously.
57
57
58
-
## Audit logs say users are skipped and not provisioned even though they are assigned
58
+
## Provisioning logs say users are skipped and not provisioned even though they are assigned
59
59
60
-
When a user shows up as “skipped” in the audit logs, it is very important to read the extended details in the log message to determine the reason. Below are common reasons and resolutions:
60
+
When a user shows up as “skipped” in the provisioning logs, it is very important to read the extended details in the log message to determine the reason. Below are common reasons and resolutions:
61
61
62
62
-**A scoping filter has been configured****that is filtering the user out based on an attribute value**. For more information on scoping filters, see <https://docs.microsoft.com/azure/active-directory/active-directory-saas-scoping-filters>.
0 commit comments