Skip to content

Commit 6f8c935

Browse files
authored
Merge pull request #192594 from MicrosoftDocs/main
Merge Main to Live, 4 AM
2 parents 0c5d0e5 + 425ceae commit 6f8c935

File tree

33 files changed

+765
-427
lines changed

33 files changed

+765
-427
lines changed

articles/active-directory/saas-apps/cisco-umbrella-user-management-provisioning-tutorial.md

Lines changed: 24 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -40,16 +40,16 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040

4141
## Step 1. Plan your provisioning deployment
4242
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
43-
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
44-
3. Determine what data to [map between Azure AD and Cisco Umbrella User Management](../app-provisioning/customize-application-attributes.md).
43+
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
44+
1. Determine what data to [map between Azure AD and Cisco Umbrella User Management](../app-provisioning/customize-application-attributes.md).
4545

4646
## Step 2. Import ObjectGUID attribute via Azure AD Connect (Optional)
47-
If you have previously provisioned user and group identities from on-premise AD to Cisco Umbrella and would now like to provision the same users and groups from Azure AD, you will need to synchronize the ObjectGUID attribute so that previously provisioned identities persist in the Umbrella policy.
47+
If you have previously provisioned user identities from on-premise AD to Cisco Umbrella and would now like to provision the same users from Azure AD, you will need to synchronize the ObjectGUID attribute so that previously provisioned identities persist in the Umbrella reporting. You will need to reconfigure any Umbrella policy on groups after importing groups from Azure AD.
4848

4949
> [!NOTE]
5050
> The on-premise Umbrella AD Connector should be turned off before importing the ObjectGUID attribute.
5151
52-
When using Microsoft Azure AD Connect, the ObjectGUID attribute of users and groups is not synchronized from on-premise AD to Azure AD by default. To synchronize this attribute, enable the optional **Directory Extension attribute sync** and select the objectGUID attributes for groups and users.
52+
When using Microsoft Azure AD Connect, the ObjectGUID attribute of users is not synchronized from on-premise AD to Azure AD by default. To synchronize this attribute, enable the optional **Directory Extension attribute sync** and select the objectGUID attributes for users.
5353

5454
![Azure Active Directory Connect wizard Optional features page](./media/cisco-umbrella-user-management-provisioning-tutorial/active-directory-connect-directory-extension-attribute-sync.png)
5555

@@ -62,17 +62,16 @@ When using Microsoft Azure AD Connect, the ObjectGUID attribute of users and gro
6262

6363
1. Log in to [Cisco Umbrella dashboard](https://login.umbrella.com ). Navigate to **Deployments** > **Core Identities** > **Users and Groups**.
6464

65-
2. If the import mechanism is set to Manual import, click on **Import from IdP** to switch the import mechanism.
6665

67-
3. Expand the Azure Active Directory card and click on the **API Keys page**.
66+
1. Expand the Azure Active Directory card and click on the **API Keys page**.
6867

6968
![Api](./media/cisco-umbrella-user-management-provisioning-tutorial/keys.png)
7069

71-
4. Expand the Azure Active Directory card on the API Keys page and click on **Generate Token**.
70+
1. Expand the Azure Active Directory card on the API Keys page and click on **Generate Token**.
7271

7372
![Generate](./media/cisco-umbrella-user-management-provisioning-tutorial/token.png)
7473

75-
5. The generated token will be displayed only once. Copy and save the URL and the token. These values will be entered in the **Tenant URL** and **Secret Token** fields respectively in the Provisioning tab of your Cisco Umbrella User Management application in the Azure portal.
74+
1. The generated token will be displayed only once. Copy and save the URL and the token. These values will be entered in the **Tenant URL** and **Secret Token** fields respectively in the Provisioning tab of your Cisco Umbrella User Management application in the Azure portal.
7675

7776

7877
## Step 4. Add Cisco Umbrella User Management from the Azure AD application gallery
@@ -97,31 +96,31 @@ This section guides you through the steps to configure the Azure AD provisioning
9796

9897
![Enterprise applications blade](common/enterprise-applications.png)
9998

100-
2. In the applications list, select **Cisco Umbrella User Management**.
99+
1. In the applications list, select **Cisco Umbrella User Management**.
101100

102101
![The Cisco Umbrella User Management link in the Applications list](common/all-applications.png)
103102

104-
3. Select the **Provisioning** tab.
103+
1. Select the **Provisioning** tab.
105104

106105
![Provisioning tab](common/provisioning.png)
107106

108-
4. Set the **Provisioning Mode** to **Automatic**.
107+
1. Set the **Provisioning Mode** to **Automatic**.
109108

110109
![Provisioning tab automatic](common/provisioning-automatic.png)
111110

112-
5. Under the **Admin Credentials** section, input your Cisco Umbrella User Management Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Cisco Umbrella User Management. If the connection fails, ensure your Cisco Umbrella User Management account has Admin permissions and try again.
111+
1. Under the **Admin Credentials** section, input your Cisco Umbrella User Management Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Cisco Umbrella User Management. If the connection fails, ensure your Cisco Umbrella User Management account has Admin permissions and try again.
113112

114113
![Token](common/provisioning-testconnection-tenanturltoken.png)
115114

116-
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
115+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
117116

118117
![Notification Email](common/provisioning-notification-email.png)
119118

120-
7. Select **Save**.
119+
1. Select **Save**.
121120

122-
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Cisco Umbrella User Management**.
121+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Cisco Umbrella User Management**.
123122

124-
9. Review the user attributes that are synchronized from Azure AD to Cisco Umbrella User Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Cisco Umbrella User Management for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Cisco Umbrella User Management API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
123+
1. Review the user attributes that are synchronized from Azure AD to Cisco Umbrella User Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Cisco Umbrella User Management for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Cisco Umbrella User Management API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
125124

126125
|Attribute|Type|Supported for Filtering|
127126
|---|---|---|
@@ -137,31 +136,26 @@ This section guides you through the steps to configure the Azure AD provisioning
137136
> [!NOTE]
138137
> If you have imported the objectGUID attribute for users via Azure AD Connect (refer Step 2), add a mapping from objectGUID to urn:ietf:params:scim:schemas:extension:ciscoumbrella:2.0:User:nativeObjectId.
139138
140-
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Cisco Umbrella User Management**.
139+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Cisco Umbrella User Management**.
141140

142-
11. Review the group attributes that are synchronized from Azure AD to Cisco Umbrella User Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Cisco Umbrella User Management for update operations. Select the **Save** button to commit any changes.
141+
1. Review the group attributes that are synchronized from Azure AD to Cisco Umbrella User Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Cisco Umbrella User Management for update operations. Select the **Save** button to commit any changes.
143142

144143
|Attribute|Type|Supported for Filtering|
145144
|---|---|---|
146145
|displayName|String|✓|
147146
|externalId|String|
148147
|members|Reference|
149-
|urn:ietf:params:scim:schemas:extension:ciscoumbrella:2.0:Group:nativeObjectId|String|
148+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
150149

151-
> [!NOTE]
152-
> If you have imported the objectGUID attribute for groups via Azure AD Connect (refer Step 2), add a mapping from objectGUID to urn:ietf:params:scim:schemas:extension:ciscoumbrella:2.0:Group:nativeObjectId.
153-
154-
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
155-
156-
13. To enable the Azure AD provisioning service for Cisco Umbrella User Management, change the **Provisioning Status** to **On** in the **Settings** section.
150+
1. To enable the Azure AD provisioning service for Cisco Umbrella User Management, change the **Provisioning Status** to **On** in the **Settings** section.
157151

158152
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
159153

160-
14. Define the users and/or groups that you would like to provision to Cisco Umbrella User Management by choosing the desired values in **Scope** in the **Settings** section.
154+
1. Define the users and/or groups that you would like to provision to Cisco Umbrella User Management by choosing the desired values in **Scope** in the **Settings** section.
161155

162156
![Provisioning Scope](common/provisioning-scope.png)
163157

164-
15. When you are ready to provision, click **Save**.
158+
1. When you are ready to provision, click **Save**.
165159

166160
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
167161

@@ -170,9 +164,9 @@ This operation starts the initial synchronization cycle of all users and groups
170164
## Step 7. Monitor your deployment
171165
Once you've configured provisioning, use the following resources to monitor your deployment:
172166

173-
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
174-
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
175-
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
167+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
168+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
169+
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
176170

177171
## Connector Limitations
178172
* Cisco Umbrella User Management supports provisioning a maximum of 200 groups. Any groups beyond this number that are in scope may not be provisioned to Cisco Umbrella.

articles/active-directory/saas-apps/gong-provisioning-tutorial.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,14 +27,15 @@ This tutorial describes the steps you need to perform in both Gong and Azure Act
2727
> * Create users in Gong.
2828
> * Remove users in Gong when they do not require access anymore.
2929
> * Keep user attributes synchronized between Azure AD and Gong.
30+
> * Provision groups and group memberships in Gong.
3031
3132
## Prerequisites
3233

3334
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
3435

3536
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md).
3637
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
37-
* A user account in Gong with **Technical Administrator** privileges.
38+
* A user account in Gong with **Technical Administrator** privilege.
3839

3940

4041
## Step 1. Plan your provisioning deployment
@@ -121,8 +122,8 @@ This section guides you through the steps to configure the Azure AD provisioning
121122

122123
1. Review the user attributes that are synchronized from Azure AD to Gong in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Gong for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Gong API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
123124

124-
|Attribute|Type|Supported for filtering|Required by Gong|
125-
|---|---|---|---|
125+
|Attribute|Type|Supported for filtering|Required by Gong|
126+
|---|---|---|---|
126127
|userName|String|✓|✓
127128
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager|String||
128129
|active|Boolean||
@@ -135,7 +136,16 @@ This section guides you through the steps to configure the Azure AD provisioning
135136
|locale|String||
136137
|timezone|String||
137138
|urn:ietf:params:scim:schemas:extension:Gong:2.0:User:stateOrProvince|String||
138-
|urn:ietf:params:scim:schemas:extension:Gong:2.0:User:country|String||
139+
|urn:ietf:params:scim:schemas:extension:Gong:2.0:User:country|String||
140+
141+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Gong**.
142+
143+
1. Review the group attributes that are synchronized from Azure AD to Gong in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Gong for update operations. Select the **Save** button to commit any changes.
144+
145+
|Attribute|Type|Supported for filtering|Required by Gong|
146+
|---|---|---|---|
147+
|displayName|String|✓|✓
148+
|members|Reference||
139149

140150
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
141151

@@ -160,6 +170,8 @@ Once you've configured provisioning, use the following resources to monitor your
160170
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
161171
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
162172

173+
## Change Log
174+
03/23/2022 - Added support for **Group Provisioning**.
163175

164176
## More resources
165177

Loading
Loading
-38.9 KB
Loading
-8 KB
Loading

0 commit comments

Comments
 (0)