You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/tutorial-prepare-azure-ad-user-accounts.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.custom: template-tutorial
15
15
---
16
16
# Preparing user accounts for Lifecycle workflows tutorials (Preview)
17
17
18
-
For the on-boarding and off-boarding tutorials you need accounts for which the workflows will be executed, the following section helps you prepare these accounts, if you already have test accounts that meet the following requirements you can proceed directly to the on-boarding and off-boarding tutorials. Two accounts are required for the on-boarding tutorials, one account for the new hire and another account that acts as the manager of the new hire. The new hire account must have the following attributes set:
18
+
For the on-boarding and off-boarding tutorials you need accounts for which the workflows are executed. This section helps you prepare these accounts, if you already have test accounts that meet the following requirements, you can proceed directly to the on-boarding and off-boarding tutorials. Two accounts are required for the on-boarding tutorials, one account for the new hire and another account that acts as the manager of the new hire. The new hire account must have the following attributes set:
19
19
20
20
- employeeHireDate must be set to today
21
21
- department must be set to sales
@@ -47,8 +47,8 @@ First we create our employee, Melva Prince.
47
47
1. Now navigate to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
48
48
2. Sign-in to Graph Explorer with the global administrator account for your tenant.
49
49
3. At the top, change **GET** to **POST** and add `https://graph.microsoft.com/v1.0/users/` to the box.
50
-
4. Copy the code below in to the **Request body**
51
-
5. Replace `<your tenant here>` in the code below with the value of your Azure AD tenant.
50
+
4. Copy the following code in to the **Request body**
51
+
5. Replace `<your tenant here>` in the following code with the value of your Azure AD tenant.
52
52
6. Select **Run query**
53
53
7. Copy the ID that is returned in the results. This is used later to assign a manager.
54
54
@@ -69,14 +69,14 @@ First we create our employee, Melva Prince.
69
69
```
70
70
:::image type="content" source="media/tutorial-lifecycle-workflows/graph-post-user.png" alt-text="Screenshot of POST create Melva in graph explorer." lightbox="media/tutorial-lifecycle-workflows/graph-post-user.png":::
71
71
72
-
Next, we create Britta Simon. This is the account that will be used as our manager.
72
+
Next, we create Britta Simon. This is the account that is used as our manager.
73
73
74
74
1. Still in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
75
75
2. Make sure the top is still set to **POST** and `https://graph.microsoft.com/v1.0/users/` is in the box.
76
-
3. Copy the code below in to the **Request body**
77
-
4. Replace `<your tenant here>` in the code below with the value of your Azure AD tenant.
76
+
3. Copy the following code in to the **Request body**
77
+
4. Replace `<your tenant here>` in the following code with the value of your Azure AD tenant.
78
78
5. Select **Run query**
79
-
6. Copy the ID that is returned in the results. This will be used later to assign a manager.
79
+
6. Copy the ID that is returned in the results. This is used later to assign a manager.
80
80
```HTTP
81
81
{
82
82
"accountEnabled": true,
@@ -96,18 +96,18 @@ Next, we create Britta Simon. This is the account that will be used as our mana
96
96
>[!NOTE]
97
97
> You need to change the <your tenant name here> section of the code to match your Azure AD tenant.
98
98
99
-
As an alternative, the following PowerShell script may also be used to quickly create two users needed execute a lifecycle workflow. One user will represent our new employee and the second will represent the new employee's manager.
99
+
As an alternative, the following PowerShell script may also be used to quickly create two users needed execute a lifecycle workflow. One user represents our new employee and the second represents the new employee's manager.
100
100
101
101
>[!IMPORTANT]
102
102
>The following PowerShell script is provided to quickly create the two users required for this tutorial. These users can also be created manually by signing in to the Azure portal as a global administrator and creating them.
103
103
104
-
In order to create this step, save the PowerShell script below to a location on a machine that has access to Azure.
104
+
In order to create this step, save the following PowerShell script to a location on a machine that has access to Azure.
105
105
106
106
Next, you need to edit the script and replace the <your tenant name here> portion with the name of your tenant. For example: $UPN_manager = "bsimon@<your tenant name here>" to $UPN_manager = "[email protected]".
107
107
108
108
You need to do perform this action for both $UPN_employee and $UPN_manager
109
109
110
-
After editing the script, save it and follow the steps below.
110
+
After editing the script, save it and follow these steps:
111
111
112
112
1. Open a Windows PowerShell command prompt, with Administrative privileges, from a machine that has access to the Azure portal.
113
113
2. Navigate to the saved PowerShell script location and run it.
@@ -166,7 +166,7 @@ Some of the attributes required for the pre-hire onboarding tutorial are exposed
166
166
|mail|Used to notify manager of the new employees temporary access pass|Manager|
167
167
|manager|This attribute that is used by the lifecycle workflow|Employee|
168
168
169
-
For the tutorial, the **mail** attribute only needs to be set on the manager account and the **manager** attribute set on the employee account. Use the following steps below.
169
+
For the tutorial, the **mail** attribute only needs to be set on the manager account and the **manager** attribute set on the employee account. Use the following steps:
170
170
171
171
1. Sign in to Azure portal.
172
172
2. On the right, select **Azure Active Directory**.
@@ -195,7 +195,7 @@ In order to do this, we must get the object ID for our user Melva Prince.
195
195
5. Select the copy sign next to the **Object ID**.
196
196
6. Now navigate to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
197
197
7. Sign-in to Graph Explorer with the global administrator account for your tenant.
198
-
8. At the top, change **GET** to **PATCH** and add `https://graph.microsoft.com/v1.0/users/<id>` to the box. Replace `<id>` with the value we copied above.
198
+
8. At the top, change **GET** to **PATCH** and add `https://graph.microsoft.com/v1.0/users/<id>` to the box. Replace `<id>` with the value we copied before.
199
199
9. Copy the following in to the **Request body** and select **Run query**
200
200
```Example
201
201
{
@@ -213,7 +213,7 @@ The manager attribute is used for email notification tasks. It's used by the li
213
213
1. Still in [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
214
214
2. Make sure the top is still set to **PUT** and `https://graph.microsoft.com/v1.0/users/<id>/manager/$ref` is in the box. Change `<id>` to the ID of Melva Prince.
215
215
3. Copy the code below in to the **Request body**
216
-
4. Replace `<managerid>` in the code below with the value of Britta Simons ID.
216
+
4. Replace `<managerid>` in the following code with the value of Britta Simons ID.
217
217
5. Select **Run query**
218
218
```Example
219
219
{
@@ -234,7 +234,7 @@ For more information about updating manager information for a user in Graph API,
234
234
### Enabling the Temporary Access Pass (TAP)
235
235
A Temporary Access Pass is a time-limited pass issued by an admin that satisfies strong authentication requirements.
236
236
237
-
In this scenario, we'll use this feature of Azure AD to generate a temporary access pass for our new employee. It will then be mailed to the employee's manager.
237
+
In this scenario, we use this feature of Azure AD to generate a temporary access pass for our new employee. It is then mailed to the employee's manager.
238
238
239
239
To use this feature, it must be enabled on our Azure AD tenant. To do this, use the following steps.
0 commit comments