Skip to content

Commit 5524ba5

Browse files
authored
Merge pull request #96025 from v-sonan/user/v-sonan/harness
User/v sonan/harness
2 parents 79b65f0 + a05cc07 commit 5524ba5

File tree

11 files changed

+174
-0
lines changed

11 files changed

+174
-0
lines changed
Lines changed: 172 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,172 @@
1+
---
2+
title: 'Tutorial: Configure Harness for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to Harness.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: zchia
7+
writer: zchia
8+
manager: beatrizd
9+
10+
ms.assetid: 0cdb970b-440b-4e7c-9118-2f03baab6a20
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: article
17+
ms.date: 10/29/2019
18+
ms.author: Zhchia
19+
---
20+
21+
# Tutorial: Configure Harness for automatic user provisioning
22+
23+
The objective of this tutorial is to demonstrate the steps to be performed in Harness and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and de-provision users and/or groups to Harness.
24+
25+
> [!NOTE]
26+
> This tutorial describes a connector built on top of the Azure AD User Provisioning Service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
27+
>
28+
> This connector is currently in Public Preview. For more information on the general Microsoft Azure terms of use for Preview features, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
29+
30+
## Prerequisites
31+
32+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
33+
34+
* An Azure AD tenant
35+
* [A Harness tenant](https://harness.io/pricing/)
36+
* A user account in Harness with Admin permissions.
37+
38+
## Assigning users to Harness
39+
40+
Azure Active Directory uses a concept called *assignments* to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users and/or groups that have been assigned to an application in Azure AD are synchronized.
41+
42+
Before configuring and enabling automatic user provisioning, you should decide which users and/or groups in Azure AD need access to Harness. Once decided, you can assign these users and/or groups to Harness by following the instructions here:
43+
* [Assign a user or group to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md)
44+
45+
## Important tips for assigning users to Harness
46+
47+
* It is recommended that a single Azure AD user is assigned to Harness to test the automatic user provisioning configuration. Additional users and/or groups may be assigned later.
48+
49+
* When assigning a user to Harness, you must select any valid application-specific role (if available) in the assignment dialog. Users with the **Default Access** role are excluded from provisioning.
50+
51+
## Set up Harness for provisioning
52+
53+
1. Sign in to your [Harness Admin Console](https://app.harness.io/#/login). Navigate to **Continuous Security > Access Management**.
54+
55+
![Harness Admin Console](media/harness-provisioning-tutorial/admin.png)
56+
57+
2. Click on **API Keys**.
58+
59+
![Harness Add SCIM](media/harness-provisioning-tutorial/apikeys.png)
60+
61+
3. Click on **Add New Key**. In the **Add Api Key** dialog box, provide a **Name** and select an option from **Permissions Inherited from** dropdown menu. Click on **Submit** button.
62+
63+
![Harness Add New Key](media/harness-provisioning-tutorial/addkey.png)
64+
65+
![Harness Add New Key dialog](media/harness-provisioning-tutorial/title.png)
66+
67+
3. Copy the **Key**. This value will be entered in the Secret Token field in the Provisioning tab of your Harness application in the Azure portal.
68+
69+
![Harness Create Token](media/harness-provisioning-tutorial/token.png)
70+
71+
## Add Harness from the gallery
72+
73+
Before configuring Harness for automatic user provisioning with Azure AD, you need to add Harness from the Azure AD application gallery to your list of managed SaaS applications.
74+
75+
**To add Harness from the Azure AD application gallery, perform the following steps:**
76+
77+
1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**.
78+
79+
![The Azure Active Directory button](common/select-azuread.png)
80+
81+
2. Go to **Enterprise applications**, and then select **All applications**.
82+
83+
![The Enterprise applications blade](common/enterprise-applications.png)
84+
85+
3. To add a new application, select the **New application** button at the top of the pane.
86+
87+
![The New application button](common/add-new-app.png)
88+
89+
4. In the search box, enter **Harness**, select **Harness** in the results panel, and then click the **Add** button to add the application.
90+
91+
![Harness in the results list](common/search-new-app.png)
92+
93+
## Configuring automatic user provisioning to Harness
94+
95+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Harness based on user and/or group assignments in Azure AD.
96+
97+
> [!TIP]
98+
> You may also choose to enable SAML-based single sign-on for Harness by following the instructions provided in the [Harness Single sign-on tutorial](https://docs.microsoft.com/azure/active-directory/saas-apps/harness-tutorial). Single sign-on can be configured independently of automatic user provisioning, although these two features complement each other
99+
100+
> [!NOTE]
101+
> To learn more about Harness' SCIM endpoint, refer [this](https://docs.harness.io/article/smloyragsm-api-keys)
102+
103+
### To configure automatic user provisioning for Harness in Azure AD:
104+
105+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
106+
107+
![Enterprise applications blade](common/enterprise-applications.png)
108+
109+
2. In the applications list, select **Harness**.
110+
111+
![The Harness link in the Applications list](common/all-applications.png)
112+
113+
3. Select the **Provisioning** tab.
114+
115+
![Provisioning tab](common/provisioning.png)
116+
117+
4. Set the **Provisioning Mode** to **Automatic**.
118+
119+
![Provisioning tab](common/provisioning-automatic.png)
120+
121+
5. Under the **Admin Credentials** section, input `https://app.harness.io/gateway/api/scim/account/XCPzWkCIQ46ypIu2DeT7yw` in **Tenant URL**. Input the **SCIM Authentication Token** value retrieved earlier in **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to Harness. If the connection fails, ensure your Harness account has Admin permissions and try again.
122+
123+
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
124+
125+
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
126+
127+
![Notification Email](common/provisioning-notification-email.png)
128+
129+
7. Click **Save**.
130+
131+
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Harness**.
132+
133+
![Harness User Mappings](media/harness-provisioning-tutorial/usermappings.png)
134+
135+
9. Review the user attributes that are synchronized from Azure AD to Harness in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Harness for update operations. Select the **Save** button to commit any changes.
136+
137+
![Harness User Attributes](media/harness-provisioning-tutorial/userattributes.png)
138+
139+
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Harness**.
140+
141+
![Harness Group Mappings](media/harness-provisioning-tutorial/groupmappings.png)
142+
143+
11. Review the group attributes that are synchronized from Azure AD to Harness in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Harness for update operations. Select the **Save** button to commit any changes.
144+
145+
![Harness Group Attributes](media/harness-provisioning-tutorial/groupattributes.png)
146+
147+
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
148+
149+
13. To enable the Azure AD provisioning service for Harness, change the **Provisioning Status** to **On** in the **Settings** section.
150+
151+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
152+
153+
14. Define the users and/or groups that you would like to provision to Harness by choosing the desired values in **Scope** in the **Settings** section.
154+
155+
![Provisioning Scope](common/provisioning-scope.png)
156+
157+
15. When you are ready to provision, click **Save**.
158+
159+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
160+
161+
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity report, which describes all actions performed by the Azure AD provisioning service on Harness.
162+
163+
For more information on how to read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
164+
165+
## Additional resources
166+
167+
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
168+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
169+
170+
## Next steps
171+
172+
* [Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md)
1.34 KB
Loading
9.75 KB
Loading
5.69 KB
Loading
10 KB
Loading
12.4 KB
Loading
6.62 KB
Loading
9.95 KB
Loading
12.1 KB
Loading
12.4 KB
Loading

0 commit comments

Comments
 (0)