You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cloud sync is built on top of the Azure AD services and has 2 key components:
24
24
25
25
-**Provisioning agent**: The Azure AD Connect cloud provisioning agent is the same agent as Workday inbound and built on the same server-side technology as app proxy and Pass Through Authentication. It requires an outbound connection only and agents are auto-updated.
26
-
-**Provisioning service**: Same provisioning service as outbound provisioning and Workday inbound provisioning which uses a scheduler-based model. In case of cloud sync, the changes are provisioned every 2 mins.
26
+
-**Provisioning service**: Same provisioning service as outbound provisioning and Workday inbound provisioning, which uses a scheduler-based model. Cloud sync provisions change every 2 mins.
27
27
28
28
29
29
## Initial setup
30
-
During initial setup, a few things are done that makes cloud sync happen. These are:
30
+
During initial setup, a few things are done that makes cloud sync happen.
31
31
32
32
-**During agent installation**: You configure the agent for the AD domains you want to provision from. This configuration registers the domains in the hybrid identity service and establishes an outbound connection to the service bus listening for requests.
33
-
-**When you enable provisioning**: You select the AD domain and enable provisioning which runs every 2 mins. Optionally you may deselect password hash sync and define notification email. You can also manage attribute transformation using Microsoft Graph APIs.
33
+
-**When you enable provisioning**: You select the AD domain and enable provisioning, which runs every 2 mins. Optionally you may deselect password hash sync and define notification email. You can also manage attribute transformation using Microsoft Graph APIs.
34
34
35
35
36
36
## Agent installation
37
-
The following is a walk-through of what occurs when the cloud provisioning agent is installed.
37
+
The following items occur when the cloud provisioning agent is installed.
38
38
39
-
- First, the Installer installs the Agent binaries and the Agent Service running under the Virtual Service Account (NETWORK SERVICE\AADProvisioningAgent). A virtual service account is a special type of account that does not have a password and is managed by Windows.
39
+
- First, the Installer installs the Agent binaries and the Agent Service running under the Virtual Service Account (NETWORK SERVICE\AADProvisioningAgent). A virtual service account is a special type of account that doesn't have a password and is managed by Windows.
40
40
- The Installer then starts the Wizard.
41
41
- The Wizard will prompt for Azure AD credentials, will then authenticate, and retrieve a token.
42
42
- The wizard then asks for the current machine Domain Administrators credentials.
43
43
- Using these credentials, the agent general managed service account (GMSA) for this domain is either created or located and reused if it already exists.
44
44
- The agent service is now reconfigured to run under the GMSA.
45
45
- The wizard now asks for domain configuration along with the Enterprise Admin (EA)/Domain Admin(DA) Account for each domain you want the agent to service.
46
-
- The GMSA account is then updated with permissions that enable it access to each domain entered above.
46
+
- The GMSA account is then updated with permissions that enable it access to each domain entered during setup.
47
47
- Next, the wizard triggers agent registration
48
48
- The agent creates a certificate and using the Azure AD token, registers itself and the certificate with the Hybrid Identity Service(HIS) Registration Service
49
49
- The Wizard triggers an AgentResourceGrouping call. This call to HIS Admin Service is to assign the agent to one or more AD Domains in the HIS configuration.
50
50
- The wizard now restarts the agent service.
51
-
- The agent calls a Bootstrap Service on restart (and every 10 mins afterwards) to check for configuration updates. The bootstrap service validates the agent identity. It also updates the last bootstrap time. This is important because if agents don't bootstrap, they are not getting updated Service Bus endpoints and may not be able to receive requests.
51
+
- The agent calls a Bootstrap Service on restart (and every 10 mins afterwards) to check for configuration updates. The bootstrap service validates the agent identity. It also updates the last bootstrap time. This is important because if agents don't bootstrap, they aren't getting updated Service Bus endpoints and may not be able to receive requests.
52
52
53
53
54
54
## What is System for Cross-domain Identity Management (SCIM)?
55
55
56
-
The [SCIM specification](https://tools.ietf.org/html/draft-scim-core-schema-01) is a standard that is used to automate the exchanging of user or group identity information between identity domains such as Azure AD. SCIM is becoming the de facto standard for provisioning and, when used in conjunction with federation standards like SAML or OpenID Connect, provides administrators an end-to-end standards-based solution for access management.
56
+
The [SCIM specification](https://tools.ietf.org/html/draft-scim-core-schema-01) is a standard that is used to automate the exchanging of user or group identity information between identity domains such as Azure AD. SCIM is becoming the de facto standard for provisioning and, when used with federation standards like SAML or OpenID Connect, provides administrators an end-to-end standards-based solution for access management.
57
57
58
58
The Azure AD Connect cloud provisioning agent uses SCIM with Azure AD to provision and deprovision users and groups.
Once you have installed the agent and enabled provisioning, the following flow occurs.
62
+
Once you've installed the agent and enabled provisioning, the following flow occurs.
63
63
64
64
1. Once configured, the Azure AD Provisioning service calls the Azure AD hybrid service to add a request to the Service bus. The agent constantly maintains an outbound connection to the Service Bus listening for requests and picks up the System for Cross-domain Identity Management (SCIM) request immediately.
65
65
2. The agent breaks up the request into separate queries based on object type.
66
66
3. AD returns the result to the agent and the agent filters this data before sending it to Azure AD.
67
67
4. Agent returns the SCIM response to Azure AD. These responses are based on the filtering that happened within the agent. The agent uses scoping to filter the results.
68
68
5. The provisioning service writes the changes to Azure AD.
69
-
6. If this is a delta Sync as opposed to a full sync, then cookie/watermark is used. New queries will get changes from that cookie/watermark onwards.
69
+
6.If a delta Sync occurs, as opposed to a full sync, then the cookie/watermark is used. New queries will get changes from that cookie/watermark onwards.
70
70
71
71
## Supported scenarios:
72
72
The following scenarios are supported for cloud sync.
73
73
74
74
75
-
-**Existing hybrid customer with a new forest**: Azure AD Connect sync is used for primary forests. Cloud sync is used for provisioning from an AD forest (including disconnected). For more information see the tutorial [here](tutorial-existing-forest.md).
75
+
-**Existing hybrid customer with a new forest**: Azure AD Connect sync is used for primary forests. Cloud sync is used for provisioning from an AD forest (including disconnected). For more information, see the tutorial [here](tutorial-existing-forest.md).
-**New hybrid customer**: Azure AD Connect sync is not used. Cloud sync is used for provisioning from an AD forest. For more information see the tutorial [here](tutorial-single-forest.md).
78
+
-**New hybrid customer**: Azure AD Connect sync isn't used. Cloud sync is used for provisioning from an AD forest. For more information, see the tutorial [here](tutorial-single-forest.md).
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/how-to-accidental-deletes.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.topic: conceptual
10
-
ms.date: 09/10/2021
10
+
ms.date: 01/11/2023
11
11
ms.subservice: hybrid
12
12
ms.author: billmath
13
13
ms.collection: M365-identity-device-management
@@ -23,7 +23,7 @@ The following document describes the accidental deletion feature for Azure AD Co
23
23
24
24
To use this feature, you set the threshold for the number of objects that, if deleted, synchronization should stop. So if this number is reached, the synchronization will stop and a notification will be sent to the email that is specified. This notification will allow you to investigate what is going on.
25
25
26
-
For additional information and an example, see the following video.
26
+
For more information and an example, see the following video.
If you encounter an accidental delete you will see this on the status of your provisioning agent configuration. It will say **Delete threshold exceeded**.
47
+
If you encounter an accidental delete you'll see this on the status of your provisioning agent configuration. It will say **Delete threshold exceeded**.
0 commit comments