Skip to content

Commit 5cdbd0e

Browse files
authored
Merge pull request #88521 from itechedit/foodee-provisioning-tutorial
edit pass: foodee-provisioning-tutorial
2 parents 245139d + 863f3d7 commit 5cdbd0e

File tree

1 file changed

+69
-63
lines changed

1 file changed

+69
-63
lines changed

articles/active-directory/saas-apps/foodee-provisioning-tutorial.md

Lines changed: 69 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Configure Foodee for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3-
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to Foodee.
2+
title: 'Tutorial: Configure Foodee for automatic user provisioning by using Azure Active Directory | Microsoft Docs'
3+
description: Learn how to configure Azure Active Directory to automatically provision and deprovision user accounts to Foodee.
44
services: active-directory
55
documentationcenter: ''
66
author: zchia
@@ -20,147 +20,153 @@ ms.author: Zhchia
2020

2121
# Tutorial: Configure Foodee for automatic user provisioning
2222

23-
The objective of this tutorial is to demonstrate the steps to be performed in Foodee and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and de-provision users and/or groups to Foodee.
23+
This article shows you how to configure Azure Active Directory (Azure AD) in Foodee and Azure AD to automatically provision or deprovision users or groups to Foodee.
2424

2525
> [!NOTE]
26-
> This tutorial describes a connector built on top of the Azure AD User Provisioning Service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
26+
> The article describes a connector that's built on top of the Azure AD User Provisioning service. To learn what this service does and how it works, and to get answers to frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
2727
>
28-
> This connector is currently in Public Preview. For more information on the general Microsoft Azure terms of use for Preview features, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
28+
> This connector is currently in preview. For more information about the Azure terms-of-use feature for preview features, go to [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2929
3030
## Prerequisites
3131

32-
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
32+
This tutorial assumes that you've met the following prerequisites:
3333

34-
* An Azure AD tenant.
34+
* An Azure AD tenant
3535
* [A Foodee tenant](https://www.food.ee/about/)
36-
* A user account in Foodee with Admin permissions.
36+
* A user account in Foodee with Admin permissions
3737

38-
## Assigning users to Foodee
38+
## Assign users to Foodee
3939

40-
Azure Active Directory uses a concept called *assignments* to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users and/or groups that have been assigned to an application in Azure AD are synchronized.
40+
Azure AD uses a concept called *assignments* to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users or groups that have been assigned to an application in Azure AD are synchronized.
4141

42-
Before configuring and enabling automatic user provisioning, you should decide which users and/or groups in Azure AD need access to Foodee. Once decided, you can assign these users and/or groups to Foodee by following the instructions here:
43-
* [Assign a user or group to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md)
42+
Before you configure and enable automatic user provisioning, you should decide which users or groups in Azure AD need access to Foodee. After you've made this determination, you can assign these users or groups to Foodee by following the instructions in [Assign a user or group to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md).
4443

4544
## Important tips for assigning users to Foodee
4645

47-
* It is recommended that a single Azure AD user is assigned to Foodee to test the automatic user provisioning configuration. Additional users and/or groups may be assigned later.
46+
When you're assigning users, keep the following tips in mind:
4847

49-
* When assigning a user to Foodee, you must select any valid application-specific role (if available) in the assignment dialog. Users with the **Default Access** role are excluded from provisioning.
48+
* We recommend that you assign only a single Azure AD user to Foodee to test the configuration of automatic user provisioning. You can assign additional users or groups later.
5049

51-
## Setup Foodee for provisioning
50+
* When you're assigning a user to Foodee, select any valid application-specific role, if it's available, in the **Assignment** pane. Users who have the *Default Access* role are excluded from provisioning.
5251

53-
Before configuring Foodee for automatic user provisioning with Azure AD, you will need to enable SCIM provisioning on Foodee.
52+
## Set up Foodee for provisioning
5453

55-
1. Log in into [Foodee](https://www.food.ee/login/). Click on your **Tenant ID**
54+
Before you configure Foodee for automatic user provisioning by using Azure AD, you need to enable System for Cross-domain Identity Management (SCIM) provisioning in Foodee.
55+
56+
1. Sign in to [Foodee](https://www.food.ee/login/), and then select your tenant ID.
5657

5758
![Foodee](media/Foodee-provisioning-tutorial/tenant.png)
5859

59-
2. Under Enterprise portal > Select **Single Sign On**.
60+
1. Under **Enterprise portal**, select **Single Sign On**.
6061

61-
![Foodee](media/Foodee-provisioning-tutorial/scim.png)
62+
![The Foodee Enterprise Portal left-pane menu](media/Foodee-provisioning-tutorial/scim.png)
6263

63-
3. Copy the **API Token**. These values will be entered in the **Secret Token** field in the Provisioning tab of your Foodee application in the Azure portal.
64+
1. Copy the value in the **API Token** box for later use. You'll enter it in the **Secret Token** box in the **Provisioning** tab of your Foodee application in the Azure portal.
6465

6566
![Foodee](media/Foodee-provisioning-tutorial/token.png)
6667

67-
6868
## Add Foodee from the gallery
6969

70-
To configure Foodee for automatic user provisioning with Azure AD, you need to add Foodee from the Azure AD application gallery to your list of managed SaaS applications.
70+
To configure Foodee for automatic user provisioning by using Azure AD, you need to add Foodee from the Azure AD application gallery to your list of managed SaaS applications.
7171

72-
**To add Foodee from the Azure AD application gallery, perform the following steps:**
72+
To add Foodee from the Azure AD application gallery, do the following:
7373

74-
1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**.
74+
1. In the [Azure portal](https://portal.azure.com), in the left pane, select **Azure Active Directory**.
7575

76-
![The Azure Active Directory button](common/select-azuread.png)
76+
![The Azure Active Directory command](common/select-azuread.png)
7777

78-
2. Go to **Enterprise applications**, and then select **All applications**.
78+
1. Select **Enterprise applications** > **All applications**.
7979

80-
![The Enterprise applications blade](common/enterprise-applications.png)
80+
![The Enterprise applications pane](common/enterprise-applications.png)
8181

82-
3. To add a new application, select the **New application** button at the top of the pane.
82+
1. To add a new application, select **New application** at the top of the pane.
8383

8484
![The New application button](common/add-new-app.png)
8585

86-
4. In the search box, enter **Foodee**, select **Foodee** in the results panel, and then click the **Add** button to add the application.
86+
1. In the search box, enter **Foodee**, select **Foodee** in the results pane, and then select **Add** to add the application.
8787

88-
![Foodee in the results list](common/search-new-app.png)
88+
![Foodee in the results list](common/search-new-app.png)
8989

90-
## Configuring automatic user provisioning to Foodee
90+
## Configure automatic user provisioning to Foodee
9191

92-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Foodee based on user and/or group assignments in Azure AD.
92+
In this section, you configure the Azure AD provisioning service to create, update, and disable users or groups in Foodee based on user or group assignments in Azure AD.
9393

9494
> [!TIP]
95-
> You may also choose to enable SAML-based single sign-on for Foodee, following the instructions provided in the [Foodee Single sign-on tutorial](Foodee-tutorial.md). Single sign-on can be configured independently of automatic user provisioning, though these two features complement each other.
95+
> You can also enable SAML-based single sign-on for Foodee by following the instructions in the [Foodee single sign-on tutorial](Foodee-tutorial.md). You can configure single sign-on independent of automatic user provisioning, though these two features complement each other.
9696
97-
### To configure automatic user provisioning for Foodee in Azure AD:
97+
Configure automatic user provisioning for Foodee in Azure AD by doing the following:
9898

99-
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
99+
1. In the [Azure portal](https://portal.azure.com), select **Enterprise Applications** > **All applications**.
100100

101-
![Enterprise applications blade](common/enterprise-applications.png)
101+
![Enterprise applications pane](common/enterprise-applications.png)
102102

103-
2. In the applications list, select **Foodee**.
103+
1. In the **Applications** list, select **Foodee**.
104104

105-
![The Foodee link in the Applications list](common/all-applications.png)
105+
![The Foodee link in the Applications list](common/all-applications.png)
106106

107-
3. Select the **Provisioning** tab.
107+
1. Select the **Provisioning** tab.
108108

109109
![Provisioning tab](common/provisioning.png)
110110

111-
4. Set the **Provisioning Mode** to **Automatic**.
111+
1. In the **Provisioning Mode** drop-down list, select **Automatic**.
112112

113113
![Provisioning tab](common/provisioning-automatic.png)
114114

115-
5. Under the Admin Credentials section, input the ` https://concierge.food.ee/scim/v2` and **API Token** values retrieved earlier in **Tenant URL** and **Secret Token** respectively. Click **Test Connection** to ensure Azure AD can connect to Foodee. If the connection fails, ensure your Foodee account has Admin permissions and try again.
115+
1. Under **Admin Credentials**, do the following:
116116

117-
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
117+
a. In the **Tenant URL** box, enter the **https://concierge.food.ee/scim/v2** value that you retrieved earlier.
118118

119-
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
119+
b. In the **Secret Token** box, enter the **API Token** value that you retrieved earlier.
120+
121+
c. To ensure that Azure AD can connect to Foodee, select **Test Connection**. If the connection fails, ensure that your Foodee account has administrator permissions, and then try again.
120122

121-
![Notification Email](common/provisioning-notification-email.png)
123+
![The Test Connection link](common/provisioning-testconnection-tenanturltoken.png)
122124

123-
7. Click **Save**.
125+
1. In the **Notification Email** box, enter the email address of a person or group who should receive the provisioning error notifications, and then select the **Send an email notification when a failure occurs** check box.
124126

125-
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Foodee**.
127+
![The Notification Email text box](common/provisioning-notification-email.png)
126128

127-
![Foodee User Mappings](media/Foodee-provisioning-tutorial/usermapping.png)
129+
1. Select **Save**.
128130

129-
9. Review the user attributes that are synchronized from Azure AD to Foodee in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Foodee for update operations. Select the **Save** button to commit any changes.
131+
1. Under **Mappings**, select **Synchronize Azure Active Directory Users to Foodee**.
130132

131-
![Foodee User Attributes](media/Foodee-provisioning-tutorial/userattribute.png)
133+
![Foodee user mappings](media/Foodee-provisioning-tutorial/usermapping.png)
132134

133-
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to **Foodee**
135+
1. Under **Attribute Mappings**, review the user attributes that are synchronized from Azure AD to Foodee. The attributes that are selected as **Matching** properties are used to match the *user accounts* in Foodee for update operations.
134136

135-
![Foodee User Attributes](media/Foodee-provisioning-tutorial/groupmapping.png)
137+
![Foodee user mappings](media/Foodee-provisioning-tutorial/userattribute.png)
136138

137-
11. Review the user attributes that are synchronized from Azure AD to Foodee in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the group accounts in Foodee for update operations. Select the **Save** button to commit any changes.
139+
1. To commit your changes, select **Save**.
140+
1. Under **Mappings**, select **Synchronize Azure Active Directory Groups to Foodee**.
138141

139-
![Foodee User Attributes](media/Foodee-provisioning-tutorial/groupattribute.png)
142+
![Foodee user mappings](media/Foodee-provisioning-tutorial/groupmapping.png)
140143

141-
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
144+
1. Under **Attribute Mappings**, review the user attributes that are synchronized from Azure AD to Foodee. The attributes that are selected as **Matching** properties are used to match the *group accounts* in Foodee for update operations.
142145

143-
13. To enable the Azure AD provisioning service for Foodee, change the **Provisioning Status** to **On** in the **Settings** section.
146+
![Foodee user mappings](media/Foodee-provisioning-tutorial/groupattribute.png)
144147

145-
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
148+
1. To commit your changes, select **Save**.
149+
1. Configure the scoping filters. To learn how, refer to the instructions in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
146150

147-
14. Define the users and/or groups that you would like to provision to Foodee by choosing the desired values in **Scope** in the **Settings** section.
151+
1. To enable the Azure AD provisioning service for Foodee, in the **Settings** section, change the **Provisioning Status** to **On**.
148152

149-
![Provisioning Scope](common/provisioning-scope.png)
153+
![The Provisioning Status switch](common/provisioning-toggle-on.png)
150154

151-
15. When you are ready to provision, click **Save**.
155+
1. Under **Settings**, in the **Scope** drop-down list, define the users or groups that you want to provision to Foodee.
152156

153-
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
157+
![The Provisioning Scope drop-down list](common/provisioning-scope.png)
154158

155-
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs. For more information on how long it will take for users and/or groups to provision, see [How long will it take to provision users](../manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md#how-long-will-it-take-to-provision-users).
159+
1. When you're ready to provision, select **Save**.
156160

157-
You can use the **Current Status** section to monitor progress and follow links to your provisioning activity report, which describes all actions performed by the Azure AD provisioning service on Foodee. For more information, see [Check the status of user provisioning](../manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md). To read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
161+
![The Provisioning Configuration Save button](common/provisioning-configuration-save.png)
158162

163+
The preceding operation starts the initial synchronization of the users or groups that you've defined in the **Scope** drop-down list. The initial sync takes longer to perform than subsequent syncs. For more information, see [How long will it take to provision users?](../manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md#how-long-will-it-take-to-provision-users).
159164

165+
You can use the **Current Status** section to monitor progress and follow links to your provisioning activity report. The report describes all actions that are performed by the Azure AD provisioning service on Foodee. For more information, see [Check the status of user provisioning](../manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md). To read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
160166

161167
## Additional resources
162168

163-
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
169+
* [Manage user account provisioning for enterprise apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
164170
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
165171

166172
## Next steps

0 commit comments

Comments
 (0)