Skip to content

Commit 72483fd

Browse files
authored
Merge pull request #223658 from billmath/fresh1
freshness review
2 parents 7005e18 + 4569577 commit 72483fd

9 files changed

+29
-29
lines changed

articles/active-directory/cloud-sync/concept-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
13-
ms.date: 02/25/2021
13+
ms.date: 01/11/2023
1414
ms.subservice: hybrid
1515
ms.author: billmath
1616

articles/active-directory/cloud-sync/concept-how-it-works.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.custom: ignite-2022
1010
ms.topic: conceptual
11-
ms.date: 12/05/2019
11+
ms.date: 01/11/2023
1212
ms.subservice: hybrid
1313
ms.author: billmath
1414
ms.collection: M365-identity-device-management
@@ -23,59 +23,59 @@ ms.collection: M365-identity-device-management
2323
Cloud sync is built on top of the Azure AD services and has 2 key components:
2424

2525
- **Provisioning agent**: The Azure AD Connect cloud provisioning agent is the same agent as Workday inbound and built on the same server-side technology as app proxy and Pass Through Authentication. It requires an outbound connection only and agents are auto-updated.
26-
- **Provisioning service**: Same provisioning service as outbound provisioning and Workday inbound provisioning which uses a scheduler-based model. In case of cloud sync, the changes are provisioned every 2 mins.
26+
- **Provisioning service**: Same provisioning service as outbound provisioning and Workday inbound provisioning, which uses a scheduler-based model. Cloud sync provisions change every 2 mins.
2727

2828

2929
## Initial setup
30-
During initial setup, a few things are done that makes cloud sync happen. These are:
30+
During initial setup, a few things are done that makes cloud sync happen.
3131

3232
- **During agent installation**: You configure the agent for the AD domains you want to provision from. This configuration registers the domains in the hybrid identity service and establishes an outbound connection to the service bus listening for requests.
33-
- **When you enable provisioning**: You select the AD domain and enable provisioning which runs every 2 mins. Optionally you may deselect password hash sync and define notification email. You can also manage attribute transformation using Microsoft Graph APIs.
33+
- **When you enable provisioning**: You select the AD domain and enable provisioning, which runs every 2 mins. Optionally you may deselect password hash sync and define notification email. You can also manage attribute transformation using Microsoft Graph APIs.
3434

3535

3636
## Agent installation
37-
The following is a walk-through of what occurs when the cloud provisioning agent is installed.
37+
The following items occur when the cloud provisioning agent is installed.
3838

39-
- First, the Installer installs the Agent binaries and the Agent Service running under the Virtual Service Account (NETWORK SERVICE\AADProvisioningAgent). A virtual service account is a special type of account that does not have a password and is managed by Windows.
39+
- First, the Installer installs the Agent binaries and the Agent Service running under the Virtual Service Account (NETWORK SERVICE\AADProvisioningAgent). A virtual service account is a special type of account that doesn't have a password and is managed by Windows.
4040
- The Installer then starts the Wizard.
4141
- The Wizard will prompt for Azure AD credentials, will then authenticate, and retrieve a token.
4242
- The wizard then asks for the current machine Domain Administrators credentials.
4343
- Using these credentials, the agent general managed service account (GMSA) for this domain is either created or located and reused if it already exists.
4444
- The agent service is now reconfigured to run under the GMSA.
4545
- The wizard now asks for domain configuration along with the Enterprise Admin (EA)/Domain Admin(DA) Account for each domain you want the agent to service.
46-
- The GMSA account is then updated with permissions that enable it access to each domain entered above.
46+
- The GMSA account is then updated with permissions that enable it access to each domain entered during setup.
4747
- Next, the wizard triggers agent registration
4848
- The agent creates a certificate and using the Azure AD token, registers itself and the certificate with the Hybrid Identity Service(HIS) Registration Service
4949
- The Wizard triggers an AgentResourceGrouping call. This call to HIS Admin Service is to assign the agent to one or more AD Domains in the HIS configuration.
5050
- The wizard now restarts the agent service.
51-
- The agent calls a Bootstrap Service on restart (and every 10 mins afterwards) to check for configuration updates. The bootstrap service validates the agent identity. It also updates the last bootstrap time. This is important because if agents don't bootstrap, they are not getting updated Service Bus endpoints and may not be able to receive requests.
51+
- The agent calls a Bootstrap Service on restart (and every 10 mins afterwards) to check for configuration updates. The bootstrap service validates the agent identity. It also updates the last bootstrap time. This is important because if agents don't bootstrap, they aren't getting updated Service Bus endpoints and may not be able to receive requests.
5252

5353

5454
## What is System for Cross-domain Identity Management (SCIM)?
5555

56-
The [SCIM specification](https://tools.ietf.org/html/draft-scim-core-schema-01) is a standard that is used to automate the exchanging of user or group identity information between identity domains such as Azure AD. SCIM is becoming the de facto standard for provisioning and, when used in conjunction with federation standards like SAML or OpenID Connect, provides administrators an end-to-end standards-based solution for access management.
56+
The [SCIM specification](https://tools.ietf.org/html/draft-scim-core-schema-01) is a standard that is used to automate the exchanging of user or group identity information between identity domains such as Azure AD. SCIM is becoming the de facto standard for provisioning and, when used with federation standards like SAML or OpenID Connect, provides administrators an end-to-end standards-based solution for access management.
5757

5858
The Azure AD Connect cloud provisioning agent uses SCIM with Azure AD to provision and deprovision users and groups.
5959

6060
## Synchronization flow
6161
![provisioning](media/concept-how-it-works/provisioning-4.png)
62-
Once you have installed the agent and enabled provisioning, the following flow occurs.
62+
Once you've installed the agent and enabled provisioning, the following flow occurs.
6363

6464
1. Once configured, the Azure AD Provisioning service calls the Azure AD hybrid service to add a request to the Service bus. The agent constantly maintains an outbound connection to the Service Bus listening for requests and picks up the System for Cross-domain Identity Management (SCIM) request immediately.
6565
2. The agent breaks up the request into separate queries based on object type.
6666
3. AD returns the result to the agent and the agent filters this data before sending it to Azure AD.
6767
4. Agent returns the SCIM response to Azure AD. These responses are based on the filtering that happened within the agent. The agent uses scoping to filter the results.
6868
5. The provisioning service writes the changes to Azure AD.
69-
6. If this is a delta Sync as opposed to a full sync, then cookie/watermark is used. New queries will get changes from that cookie/watermark onwards.
69+
6. If a delta Sync occurs, as opposed to a full sync, then the cookie/watermark is used. New queries will get changes from that cookie/watermark onwards.
7070

7171
## Supported scenarios:
7272
The following scenarios are supported for cloud sync.
7373

7474

75-
- **Existing hybrid customer with a new forest**: Azure AD Connect sync is used for primary forests. Cloud sync is used for provisioning from an AD forest (including disconnected). For more information see the tutorial [here](tutorial-existing-forest.md).
75+
- **Existing hybrid customer with a new forest**: Azure AD Connect sync is used for primary forests. Cloud sync is used for provisioning from an AD forest (including disconnected). For more information, see the tutorial [here](tutorial-existing-forest.md).
7676

7777
![Existing hybrid](media/tutorial-existing-forest/existing-forest-new-forest-2.png)
78-
- **New hybrid customer**: Azure AD Connect sync is not used. Cloud sync is used for provisioning from an AD forest. For more information see the tutorial [here](tutorial-single-forest.md).
78+
- **New hybrid customer**: Azure AD Connect sync isn't used. Cloud sync is used for provisioning from an AD forest. For more information, see the tutorial [here](tutorial-single-forest.md).
7979

8080
![New customers](media/tutorial-single-forest/diagram-2.png)
8181

articles/active-directory/cloud-sync/how-to-accidental-deletes.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 09/10/2021
10+
ms.date: 01/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -23,7 +23,7 @@ The following document describes the accidental deletion feature for Azure AD Co
2323

2424
To use this feature, you set the threshold for the number of objects that, if deleted, synchronization should stop. So if this number is reached, the synchronization will stop and a notification will be sent to the email that is specified. This notification will allow you to investigate what is going on.
2525

26-
For additional information and an example, see the following video.
26+
For more information and an example, see the following video.
2727

2828
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWK5mV]
2929
@@ -36,23 +36,23 @@ To use the new feature, follow the steps below.
3636
2. Select **Azure AD Connect**.
3737
3. Select **Manage cloud sync**.
3838
4. Under **Configuration**, select your configuration.
39-
5. Under **Settings** fill in the following:
39+
5. Under **Settings** fill in the following information.
4040
- **Notification email** - email used for notifications
4141
- **Prevent accidental deletions** - check this box to enable the feature
4242
- **Accidental deletion threshold** - enter the number of objects to stop synchronization and send a notification
4343

4444
![Accidental deletes](media/how-to-accidental-deletes/accident-1.png)
4545

4646
## Recovering from an accidental delete instance
47-
If you encounter an accidental delete you will see this on the status of your provisioning agent configuration. It will say **Delete threshold exceeded**.
47+
If you encounter an accidental delete you'll see this on the status of your provisioning agent configuration. It will say **Delete threshold exceeded**.
4848

4949
![Accidental delete status](media/how-to-accidental-deletes/delete-1.png)
5050

51-
By clicking on **Delete threshold exceeded**, you will see the sync status info. This will provide additional details.
51+
By clicking on **Delete threshold exceeded**, you'll see the sync status info. This action will provide more details.
5252

5353
![Sync status](media/how-to-accidental-deletes/delete-2.png)
5454

55-
By right-clicking on the ellipses, you will get the following options:
55+
By right-clicking on the ellipses, you'll get the following options:
5656
- View provisioning log
5757
- View agent
5858
- Allow deletes
@@ -72,15 +72,15 @@ The **Allow deletes** action will delete the objects that triggered the accident
7272

7373
![Yes on confirmation](media/how-to-accidental-deletes/delete-4.png)
7474

75-
3. You will see confirmation that the deletions were accepted and the status will return to healthy with the next cycle.
75+
3. You'll see confirmation that the deletions were accepted and the status will return to healthy with the next cycle.
7676

7777
![Accept deletes](media/how-to-accidental-deletes/delete-8.png)
7878

7979
### Rejecting deletions
8080

81-
If you do not want to allow the deletions, you need to do the following:
81+
If you don't want to allow the deletions, you need to do the following:
8282
- investigate the source of the deletions
83-
- fix the issue (example, OU was moved out of scope accidentally and you have now re-added it back to the scope)
83+
- fix the issue (example, OU was moved out of scope accidentally and you've now re-added it back to the scope)
8484
- Run **Restart sync** on the agent configuration
8585

8686
## Next steps

articles/active-directory/cloud-sync/how-to-attribute-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 04/30/2021
10+
ms.date: 01/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

articles/active-directory/cloud-sync/how-to-automatic-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: how-to
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
13-
ms.date: 12/02/2019
13+
ms.date: 01/11/2023
1414
ms.subservice: hybrid
1515
ms.author: billmath
1616

articles/active-directory/cloud-sync/how-to-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 12/14/2021
10+
ms.date: 01/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

articles/active-directory/cloud-sync/how-to-expression-builder.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 04/19/2021
10+
ms.date: 01/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

articles/active-directory/cloud-sync/how-to-gmsa-cmdlets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 07/01/2022
10+
ms.date: 01/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

articles/active-directory/cloud-sync/how-to-inbound-synch-ms-graph.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 12/04/2020
10+
ms.date: 01/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)