Skip to content

Commit 6fa632a

Browse files
authored
Merge pull request #106995 from damienbod/damienbod/cross-tenant-synchronization-configure-graph
damienbod/cross-tenant-synchronization-configure-graph-easy-to-use
2 parents 6eae3f1 + 0f6d05c commit 6fa632a

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure-graph.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,8 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
7575

7676
1. Get the tenant ID of the source and target tenants. The example configuration described in this article uses the following tenant IDs:
7777

78-
- Source tenant ID: 3d0f5dec-5d3d-455c-8016-e2af1ae4d31a
79-
- Target tenant ID: 376a1f89-b02f-4a85-8252-2974d1984d14
78+
- Source tenant ID: {sourceTenantId}
79+
- Target tenant ID: {targetTenantId}
8080

8181
## Step 2: Enable user synchronization in the target tenant
8282

@@ -91,7 +91,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
9191
Content-Type: application/json
9292
9393
{
94-
"tenantId": "3d0f5dec-5d3d-455c-8016-e2af1ae4d31a"
94+
"tenantId": "{sourceTenantId}"
9595
}
9696
```
9797
@@ -103,7 +103,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
103103
104104
{
105105
"@odata.context": "https://graph.microsoft.com/beta/$metadata#policies/crossTenantAccessPolicy/partners/$entity",
106-
"tenantId": "3d0f5dec-5d3d-455c-8016-e2af1ae4d31a",
106+
"tenantId": "{sourceTenantId}",
107107
"isServiceProvider": null,
108108
"inboundTrust": null,
109109
"b2bCollaborationOutbound": null,
@@ -129,7 +129,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
129129
**Request**
130130
131131
```http
132-
PUT https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/3d0f5dec-5d3d-455c-8016-e2af1ae4d31a/identitySynchronization
132+
PUT https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{sourceTenantId}/identitySynchronization
133133
Content-type: application/json
134134
135135
{
@@ -156,7 +156,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
156156
**Request**
157157
158158
```http
159-
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/3d0f5dec-5d3d-455c-8016-e2af1ae4d31a
159+
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{sourceTenantId}
160160
Content-Type: application/json
161161
162162
{
@@ -187,7 +187,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
187187
Content-Type: application/json
188188
189189
{
190-
"tenantId": "376a1f89-b02f-4a85-8252-2974d1984d14"
190+
"tenantId": "{targetTenantId}"
191191
}
192192
```
193193
@@ -199,7 +199,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
199199
200200
{
201201
"@odata.context": "https://graph.microsoft.com/beta/$metadata#policies/crossTenantAccessPolicy/partners/$entity",
202-
"tenantId": "376a1f89-b02f-4a85-8252-2974d1984d14",
202+
"tenantId": "{targetTenantId}",
203203
"isServiceProvider": null,
204204
"inboundTrust": null,
205205
"b2bCollaborationOutbound": null,
@@ -225,7 +225,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
225225
**Request**
226226
227227
```http
228-
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/376a1f89-b02f-4a85-8252-2974d1984d14
228+
PATCH https://graph.microsoft.com/beta/policies/crossTenantAccessPolicy/partners/{targetTenantId}
229229
Content-Type: application/json
230230
231231
{
@@ -290,7 +290,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
290290
"appId": "{appId}",
291291
"appDisplayName": "Fabrikam",
292292
"applicationTemplateId": "518e5f48-1fc8-4c48-9387-9fdf28b0dfe7",
293-
"appOwnerTenantId": "376a1f89-b02f-4a85-8252-2974d1984d14",
293+
"appOwnerTenantId": "{targetTenantId}",
294294
"appRoleAssignmentRequired": true,
295295
"displayName": "Fabrikam",
296296
"errorUrl": null,
@@ -342,7 +342,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
342342
"credentials": [
343343
{
344344
"key": "CompanyId",
345-
"value": "376a1f89-b02f-4a85-8252-2974d1984d14"
345+
"value": "{targetTenantId}"
346346
},
347347
{
348348
"key": "AuthenticationType",
@@ -439,7 +439,7 @@ In the source tenant, to enable provisioning, create a provisioning job.
439439
"value": [
440440
{
441441
"key": "CompanyId",
442-
"value": "376a1f89-b02f-4a85-8252-2974d1984d14"
442+
"value": "{targetTenantId}"
443443
},
444444
{
445445
"key": "AuthenticationType",
@@ -645,7 +645,7 @@ Now that you have a configuration, you can test on-demand provisioning with one
645645
{
646646
"id": "{id}",
647647
"activityDateTime": "2022-12-11T00:40:37Z",
648-
"tenantId": "376a1f89-b02f-4a85-8252-2974d1984d14",
648+
"tenantId": "{targetTenantId}",
649649
"jobId": "{jobId}",
650650
"cycleId": "{cycleId}",
651651
"changeId": "{changeId}",

0 commit comments

Comments
 (0)