Skip to content

Commit 5f8bdf1

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-skills
2 parents f89f0e0 + f9bb2c9 commit 5f8bdf1

File tree

160 files changed

+1897
-1113
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

160 files changed

+1897
-1113
lines changed

.openpublishing.redirection.json

Lines changed: 295 additions & 235 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,9 @@ articles/chef/ @TomArcherMsft
88
articles/jenkins/ @TomArcherMsft
99
articles/terraform/ @TomArcherMsft
1010

11+
# Requires Internal Review
12+
articles/best-practices-availability-paired-regions.md @jpconnock @arob98 @syntaxc4 @tysonn @snoviking
13+
1114
# Governance
1215
articles/governance/ @DCtheGeek
1316

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,10 @@ To safeguard access to sites, web browsers will introduce a new secure-by-defaul
2626

2727
Developers must use the new cookie setting, `SameSite=None`, to designate cookies for cross-site access. When the `SameSite=None` attribute is present, an additional `Secure` attribute must be used so cross-site cookies can only be accessed over HTTPS connections. Validate and test all your applications, including those applications that use Azure AD B2C.
2828

29-
For more information, see [Effect on customer websites and Microsoft services and products in Chrome version 80 or later](https://support.microsoft.com/help/4522904/potential-disruption-to-customer-websites-in-latest-chrome).
29+
For more information, see:
30+
31+
* [Handle SameSite cookie changes in Chrome browser](../active-directory/develop/howto-handle-samesite-cookie-changes-chrome-browser.md)
32+
* [Effect on customer websites and Microsoft services and products in Chrome version 80 or later](https://support.microsoft.com/help/4522904/potential-disruption-to-customer-websites-in-latest-chrome)
3033

3134
## Cookies
3235

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -190,6 +190,23 @@ If your previous computer certificate has expired, and a new certificate has bee
190190
> [!NOTE]
191191
> If you use your own certificates instead of generating certificates with the PowerShell script, make sure that they align to the NPS naming convention. The subject name must be **CN=\<TenantID\>,OU=Microsoft NPS Extension**.
192192
193+
### Microsoft Azure Government additional steps
194+
195+
For customers that use Azure Government cloud, the following additional configuration steps are required on each NPS server:
196+
197+
1. Open **Registry Editor** on the NPS server.
198+
1. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa`. Set the following key values:
199+
200+
| Registry key | Value |
201+
|--------------------|-----------------------------------|
202+
| AZURE_MFA_HOSTNAME | adnotifications.windowsazure.us |
203+
| STS_URL | https://login.microsoftonline.us/ |
204+
205+
1. Repeat the previous two steps to set the registry key values for each NPS server.
206+
1. Restart the NPS service for each NPS server.
207+
208+
For minimal impact, take each NPS server out of the NLB rotation one at a time and wait for all connections to drain.
209+
193210
### Certificate rollover
194211

195212
With release 1.0.1.32 of the NPS extension, reading multiple certificates is now supported. This capability will help facilitate rolling certificate updates prior to their expiration. If your organization is running a previous version of the NPS extension, you should upgrade to version 1.0.1.32 or higher.

articles/active-directory/develop/TOC.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -740,18 +740,18 @@
740740
items:
741741
- name: Glossary
742742
href: developer-glossary.md
743-
- name: Azure roadmap
744-
href: https://azure.microsoft.com/roadmap/?category=security-identity
743+
- name: Videos
744+
href: identity-videos.md
745745
- name: Azure AD blog
746746
href: https://cloudblogs.microsoft.com/enterprisemobility/?product=azure-active-directory
747747
- name: Microsoft identity platform developer blog
748748
href: https://developer.microsoft.com/en-us/identity/blogs/
749+
- name: Azure roadmap
750+
href: https://azure.microsoft.com/roadmap/?category=security-identity
749751
- name: Try Sign in with Microsoft
750752
href: https://azure.microsoft.com/develop/identity/signin/
753+
- name: Managed identities for Azure resources
754+
href: https://docs.microsoft.com/azure/active-directory/managed-service-identity/overview
751755
- name: Getting help
752756
displayName: support, help options
753757
href: developer-support-help-options.md
754-
- name: Managed identities for Azure resources
755-
href: https://docs.microsoft.com/azure/active-directory/managed-service-identity/overview
756-
- name: Microsoft identity platform videos
757-
href: identity-videos.md

articles/active-directory/develop/scenario-protected-web-api-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The bearer token that's set in the header when the app is called holds informati
4444
Here's a C# code example that shows a client calling the API after it acquires a token with Microsoft Authentication Library for .NET (MSAL.NET):
4545

4646
```csharp
47-
var scopes = new[] {$"api://.../access_as_user}";
47+
var scopes = new[] {$"api://.../access_as_user"};
4848
var result = await app.AcquireToken(scopes)
4949
.ExecuteAsync();
5050

articles/active-directory/hybrid/how-to-connect-pta-user-privacy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ To view logs related to the Pass-through Authentication Agent, open the **Event
6868

6969
### Delete Authentication Agent trace log files
7070

71-
You should regularly check the contents of <strong>%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace\</strong> and delete the contents of this folder every 48 hours.
71+
You should regularly check the contents of **%ProgramData%\Microsoft\Azure AD Connect Authentication Agent\Trace** and delete the contents of this folder every 48 hours.
7272

7373
>[!IMPORTANT]
7474
>If the Authentication Agent service is running, you'll not be able to delete the current log file in the folder. Stop the service before trying again. To avoid user sign-in failures, you should have already configured Pass-through Authentication for [high availability](how-to-connect-pta-quick-start.md#step-4-ensure-high-availability).
104 KB
Loading
3.44 KB
Loading
Lines changed: 147 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,147 @@
1+
---
2+
title: 'Tutorial: Configure Mixpanel for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Mixpanel.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: Zhchia
7+
writer: Zhchia
8+
manager: beatrizd
9+
10+
ms.assetid: 565cdc45-4377-4b70-870b-64edf3dcc92c
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: article
17+
ms.date: 01/24/2020
18+
ms.author: Zhchia
19+
---
20+
21+
# Tutorial: Configure Mixpanel for automatic user provisioning
22+
23+
This tutorial describes the steps you need to perform in both Mixpanel and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Mixpanel](https://mixpanel.com/pricing/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
24+
25+
26+
## Capabilities supported
27+
> [!div class="checklist"]
28+
> * Create users in Mixpanel
29+
> * Remove users in Mixpanel when they do not require access anymore
30+
> * Keep user attributes synchronized between Azure AD and Mixpanel
31+
> * Provision groups and group memberships in Mixpanel
32+
> * [Single sign-on](https://docs.microsoft.com/azure/active-directory/saas-apps/mixpanel-tutorial) to Mixpanel (recommended)
33+
34+
## Prerequisites
35+
36+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
37+
* [An Azure AD tenant](https://docs.microsoft.com/azure/active-directory/develop/quickstart-create-new-tenant)
38+
* A user account in Azure AD with [permission](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
39+
* An Enterprise level mixpanel organization
40+
* A mixpanel account with admin privileges on said org
41+
* SSO enabled within mixpanel with a claimed domain
42+
43+
## Step 1. Plan your provisioning deployment
44+
1. Learn about [how the provisioning service works](https://docs.microsoft.com/azure/active-directory/manage-apps/user-provisioning).
45+
2. Determine who will be in [scope for provisioning](https://docs.microsoft.com/azure/active-directory/manage-apps/define-conditional-rules-for-provisioning-user-accounts).
46+
3. Determine what data to [map between Azure AD and Mixpanel](https://docs.microsoft.com/azure/active-directory/manage-apps/customize-application-attributes).
47+
48+
## Step 2. Configure Mixpanel to support provisioning with Azure AD
49+
1. For setting up SSO and claiming a domain refer [this](https://help.mixpanel.com/hc/articles/360036428871-Single-Sign-On).
50+
2. After that you will need to generate a SCIM token in the SCIM tab of the access security section of your organization settings.
51+
![Mixpanel token](./media/mixpanel-provisioning-tutorial/mixpanelscim.png)
52+
53+
54+
## Step 3. Add Mixpanel from the Azure AD application gallery
55+
56+
Add Mixpanel from the Azure AD application gallery to start managing provisioning to Mixpanel. If you have previously setup Mixpanel for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](https://docs.microsoft.com/azure/active-directory/manage-apps/add-gallery-app).
57+
58+
## Step 4. Define who will be in scope for provisioning
59+
60+
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](https://docs.microsoft.com/azure/active-directory/manage-apps/define-conditional-rules-for-provisioning-user-accounts).
61+
62+
* When assigning users and groups to Mixpanel, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](https://docs.microsoft.com/azure/active-directory/develop/howto-add-app-roles-in-azure-ad-apps) to add additional roles.
63+
64+
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](https://docs.microsoft.com/azure/active-directory/manage-apps/define-conditional-rules-for-provisioning-user-accounts).
65+
66+
67+
## Step 5. Configure automatic user provisioning to Mixpanel
68+
69+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
70+
71+
### To configure automatic user provisioning for Mixpanel in Azure AD:
72+
73+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
74+
75+
![Enterprise applications blade](common/enterprise-applications.png)
76+
77+
2. In the applications list, select **Mixpanel**.
78+
79+
![The Mixpanel link in the Applications list](common/all-applications.png)
80+
81+
3. Select the **Provisioning** tab.
82+
83+
![Provisioning tab](common/provisioning.png)
84+
85+
4. Set the **Provisioning Mode** to **Automatic**.
86+
87+
![Provisioning tab](common/provisioning-automatic.png)
88+
89+
5. Under the **Admin Credentials** section, input your Mixpanel **Tenant URL** and **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to Mixpanel. If the connection fails, ensure your Mixpanel account has Admin permissions and try again.
90+
91+
![provisioning](./media/mixpanel-provisioning-tutorial/provisioning.png)
92+
93+
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
94+
95+
![Notification Email](common/provisioning-notification-email.png)
96+
97+
7. Select **Save**.
98+
99+
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Mixpanel**.
100+
101+
9. Review the user attributes that are synchronized from Azure AD to Mixpanel in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Mixpanel for update operations. If you choose to change the [matching target attribute](https://docs.microsoft.com/azure/active-directory/manage-apps/customize-application-attributes), you will need to ensure that the Mixpanel API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
102+
103+
|Attribute|Type|
104+
|---|---|
105+
|userName|String|
106+
|displayName|String|
107+
108+
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Mixpanel**.
109+
110+
11. Review the group attributes that are synchronized from Azure AD to Mixpanel in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Mixpanel for update operations. Select the **Save** button to commit any changes.
111+
112+
|Attribute|Type|
113+
|---|---|
114+
|displayName|String|
115+
|members|Reference|
116+
117+
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
118+
119+
13. To enable the Azure AD provisioning service for Mixpanel, change the **Provisioning Status** to **On** in the **Settings** section.
120+
121+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
122+
123+
14. Define the users and/or groups that you would like to provision to Mixpanel by choosing the desired values in **Scope** in the **Settings** section.
124+
125+
![Provisioning Scope](common/provisioning-scope.png)
126+
127+
15. When you are ready to provision, click **Save**.
128+
129+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
130+
131+
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
132+
133+
## Step 6. Monitor your deployment
134+
Once you've configured provisioning, use the following resources to monitor your deployment:
135+
136+
1. Use the [provisioning logs](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-provisioning-logs) to determine which users have been provisioned successfully or unsuccessfully
137+
2. Check the [progress bar](https://docs.microsoft.com/azure/active-directory/manage-apps/application-provisioning-when-will-provisioning-finish-specific-user) to see the status of the provisioning cycle and how close it is to completion
138+
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](https://docs.microsoft.com/azure/active-directory/manage-apps/application-provisioning-quarantine-status).
139+
140+
## Additional resources
141+
142+
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
143+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
144+
145+
## Next steps
146+
147+
* [Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md)

0 commit comments

Comments
 (0)