Skip to content

Commit 7066890

Browse files
committed
updates
1 parent 0733884 commit 7066890

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/active-directory/governance/tutorial-prepare-azure-ad-user-accounts.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: template-tutorial
1515
---
1616
# Preparing user accounts for Lifecycle workflows tutorials (Preview)
1717

18-
For the on-boarding and off-boarding tutorials you need accounts for which the workflows will be executed, the following section helps you prepare these accounts, if you already have test accounts that meet the following requirements you can proceed directly to the on-boarding and off-boarding tutorials. Two accounts are required for the on-boarding tutorials, one account for the new hire and another account that acts as the manager of the new hire. The new hire account must have the following attributes set:
18+
For the on-boarding and off-boarding tutorials you need accounts for which the workflows are executed. This section helps you prepare these accounts, if you already have test accounts that meet the following requirements, you can proceed directly to the on-boarding and off-boarding tutorials. Two accounts are required for the on-boarding tutorials, one account for the new hire and another account that acts as the manager of the new hire. The new hire account must have the following attributes set:
1919

2020
- employeeHireDate must be set to today
2121
- department must be set to sales
@@ -47,8 +47,8 @@ First we create our employee, Melva Prince.
4747
1. Now navigate to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
4848
2. Sign-in to Graph Explorer with the global administrator account for your tenant.
4949
3. At the top, change **GET** to **POST** and add `https://graph.microsoft.com/v1.0/users/` to the box.
50-
4. Copy the code below in to the **Request body**
51-
5. Replace `<your tenant here>` in the code below with the value of your Azure AD tenant.
50+
4. Copy the following code in to the **Request body**
51+
5. Replace `<your tenant here>` in the following code with the value of your Azure AD tenant.
5252
6. Select **Run query**
5353
7. Copy the ID that is returned in the results. This is used later to assign a manager.
5454

@@ -69,14 +69,14 @@ First we create our employee, Melva Prince.
6969
```
7070
:::image type="content" source="media/tutorial-lifecycle-workflows/graph-post-user.png" alt-text="Screenshot of POST create Melva in graph explorer." lightbox="media/tutorial-lifecycle-workflows/graph-post-user.png":::
7171

72-
Next, we create Britta Simon. This is the account that will be used as our manager.
72+
Next, we create Britta Simon. This is the account that is used as our manager.
7373

7474
1. Still in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
7575
2. Make sure the top is still set to **POST** and `https://graph.microsoft.com/v1.0/users/` is in the box.
76-
3. Copy the code below in to the **Request body**
77-
4. Replace `<your tenant here>` in the code below with the value of your Azure AD tenant.
76+
3. Copy the following code in to the **Request body**
77+
4. Replace `<your tenant here>` in the following code with the value of your Azure AD tenant.
7878
5. Select **Run query**
79-
6. Copy the ID that is returned in the results. This will be used later to assign a manager.
79+
6. Copy the ID that is returned in the results. This is used later to assign a manager.
8080
```HTTP
8181
{
8282
"accountEnabled": true,
@@ -96,18 +96,18 @@ Next, we create Britta Simon. This is the account that will be used as our mana
9696
>[!NOTE]
9797
> You need to change the &lt;your tenant name here&gt; section of the code to match your Azure AD tenant.
9898
99-
As an alternative, the following PowerShell script may also be used to quickly create two users needed execute a lifecycle workflow. One user will represent our new employee and the second will represent the new employee's manager.
99+
As an alternative, the following PowerShell script may also be used to quickly create two users needed execute a lifecycle workflow. One user represents our new employee and the second represents the new employee's manager.
100100

101101
>[!IMPORTANT]
102102
>The following PowerShell script is provided to quickly create the two users required for this tutorial. These users can also be created manually by signing in to the Azure portal as a global administrator and creating them.
103103
104-
In order to create this step, save the PowerShell script below to a location on a machine that has access to Azure.
104+
In order to create this step, save the following PowerShell script to a location on a machine that has access to Azure.
105105

106106
Next, you need to edit the script and replace the &lt;your tenant name here&gt; portion with the name of your tenant. For example: $UPN_manager = "bsimon@&lt;your tenant name here&gt;" to $UPN_manager = "[email protected]".
107107

108108
You need to do perform this action for both $UPN_employee and $UPN_manager
109109

110-
After editing the script, save it and follow the steps below.
110+
After editing the script, save it and follow these steps:
111111

112112
1. Open a Windows PowerShell command prompt, with Administrative privileges, from a machine that has access to the Azure portal.
113113
2. Navigate to the saved PowerShell script location and run it.
@@ -166,7 +166,7 @@ Some of the attributes required for the pre-hire onboarding tutorial are exposed
166166
|mail|Used to notify manager of the new employees temporary access pass|Manager|
167167
|manager|This attribute that is used by the lifecycle workflow|Employee|
168168

169-
For the tutorial, the **mail** attribute only needs to be set on the manager account and the **manager** attribute set on the employee account. Use the following steps below.
169+
For the tutorial, the **mail** attribute only needs to be set on the manager account and the **manager** attribute set on the employee account. Use the following steps:
170170

171171
1. Sign in to Azure portal.
172172
2. On the right, select **Azure Active Directory**.
@@ -195,7 +195,7 @@ In order to do this, we must get the object ID for our user Melva Prince.
195195
5. Select the copy sign next to the **Object ID**.
196196
6. Now navigate to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
197197
7. Sign-in to Graph Explorer with the global administrator account for your tenant.
198-
8. At the top, change **GET** to **PATCH** and add `https://graph.microsoft.com/v1.0/users/<id>` to the box. Replace `<id>` with the value we copied above.
198+
8. At the top, change **GET** to **PATCH** and add `https://graph.microsoft.com/v1.0/users/<id>` to the box. Replace `<id>` with the value we copied before.
199199
9. Copy the following in to the **Request body** and select **Run query**
200200
```Example
201201
{
@@ -213,7 +213,7 @@ The manager attribute is used for email notification tasks. It's used by the li
213213
1. Still in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
214214
2. Make sure the top is still set to **PUT** and `https://graph.microsoft.com/v1.0/users/<id>/manager/$ref` is in the box. Change `<id>` to the ID of Melva Prince.
215215
3. Copy the code below in to the **Request body**
216-
4. Replace `<managerid>` in the code below with the value of Britta Simons ID.
216+
4. Replace `<managerid>` in the following code with the value of Britta Simons ID.
217217
5. Select **Run query**
218218
```Example
219219
{
@@ -234,7 +234,7 @@ For more information about updating manager information for a user in Graph API,
234234
### Enabling the Temporary Access Pass (TAP)
235235
A Temporary Access Pass is a time-limited pass issued by an admin that satisfies strong authentication requirements.
236236
237-
In this scenario, we'll use this feature of Azure AD to generate a temporary access pass for our new employee. It will then be mailed to the employee's manager.
237+
In this scenario, we use this feature of Azure AD to generate a temporary access pass for our new employee. It is then mailed to the employee's manager.
238238
239239
To use this feature, it must be enabled on our Azure AD tenant. To do this, use the following steps.
240240

0 commit comments

Comments
 (0)