Skip to content

Commit 727a5d4

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents d6b49c7 + 7c9b516 commit 727a5d4

File tree

220 files changed

+2966
-836
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

220 files changed

+2966
-836
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -932,6 +932,12 @@
932932
"branch": "v3",
933933
"branch_mapping": {}
934934
},
935+
{
936+
"path_to_root": "azure-cosmos-db-table-dotnet-v12",
937+
"url": "https://github.com/Azure-Samples/cosmos-db-table-api-dotnet-samples",
938+
"branch": "v12",
939+
"branch_mapping": {}
940+
},
935941
{
936942
"path_to_root": "azure-cosmos-mongodb-dotnet",
937943
"url": "https://github.com/Azure-Samples/cosmos-db-mongodb-api-dotnet-samples",
@@ -956,6 +962,7 @@
956962
".openpublishing.redirection.json",
957963
".openpublishing.redirection.azure-arc-data.json",
958964
".openpublishing.redirection.active-directory.json",
965+
".openpublishing.redirection.azure-attestation.json",
959966
".openpublishing.redirection.azure-blob.json",
960967
"articles/data-factory/.openpublishing.redirection.data-factory.json",
961968
".openpublishing.redirection.defender-for-cloud.json",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/attestation/audit-logs.md",
5+
"redirect_url": "/azure/attestation/view-logs",
6+
"redirect_document_id": true
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/virtual-machines/linux/find-unattached-nics.md",
5+
"redirect_url": "/previous-versions/azure/virtual-machines/linux/find-unattached-nics",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/germany/germany-developer-guide.md",
510
"redirect_url": "/previous-versions/azure/germany/germany-developer-guide",
8.31 KB
Loading
172 KB
Loading
8.55 KB
Loading
70.5 KB
Loading

articles/active-directory/app-provisioning/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,10 @@ items:
6969
href: export-import-provisioning-configuration.md
7070
- name: Provisioning reports
7171
href: ../reports-monitoring/concept-provisioning-logs.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
72+
- name: Workday provisioning scenarios
73+
items:
74+
- name: Retrieve pronoun information
75+
href: workday-retrieve-pronoun-information.md
7276
- name: Troubleshoot application provisioning
7377
items:
7478
- name: Known issues
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
title: Retrieve pronoun information from Workday
3+
description: Learn how to retrieve pronoun information from Workday
4+
services: active-directory
5+
author: kenwith
6+
manager: rkarlin
7+
ms.service: active-directory
8+
ms.subservice: app-provisioning
9+
ms.topic: reference
10+
ms.workload: identity
11+
ms.date: 07/05/2022
12+
ms.author: kenwith
13+
ms.reviewer: arvinh, chmutali
14+
---
15+
16+
# Configure Azure AD provisioning to retrieve pronoun information from Workday
17+
This article describes how you can customize the following two HR-driven provisioning apps to fetch pronoun information from Workday.
18+
19+
* [Workday to on-premises Active Directory user provisioning](../saas-apps/workday-inbound-tutorial.md)
20+
* [Workday to Azure Active Directory user provisioning](../saas-apps/workday-inbound-cloud-only-tutorial.md)
21+
22+
## About pronoun information in Workday
23+
Workday introduced the ability for workers to [display pronoun information](https://community.workday.com/node/731178) in their worker profile in Workday 2021 R1 release. The ability to fetch pronoun data using Workday Web Services (WWS) API call was introduced in [Get_Workers API version 38.1](https://community.workday.com/sites/default/files/file-hosting/productionapi/Human_Resources/v38.1/Get_Workers.html) in Workday 2022 R1 release.
24+
25+
>[!NOTE]
26+
>Links to certain Workday community notes and documents in this article require Workday community account credentials. Please check with your Workday administrator or partner to get the required access.
27+
28+
## Enabling pronoun data in Workday
29+
This section describes steps required to enable pronoun data in Workday. We recommend engaging your Workday administrator to complete the steps listed below.
30+
1. Ensure that pronoun display and sharing preferences are enabled as per Workday guidelines. Refer Workday documents:
31+
32+
[Steps: Set Up Gender Pronouns to Display on a Worker Profile * Human Capital Management * Reader * Administrator Guide (workday.com)](https://doc.workday.com/r/gJQvxHUyQOZv_31Vknf~3w/7gZPvVfbRhLiPissprv6lQ)
33+
34+
[Steps: Set Up Public Profile Preferences * Human Capital Management * Reader * Administrator Guide (workday.com)](https://doc.workday.com/r/gJQvxHUyQOZv_31Vknf~3w/FuENV1VTRTHWo_h93KIjJA)
35+
36+
1. Use Workday **Maintain Pronouns** task to define preferred pronoun data (HE/HIM, SHE/HER, and THEY/THEM) in your Workday tenant.
37+
1. Use Workday **Maintain Localization Settings task -> Personal Information** area to activate pronoun data for different countries.
38+
1. Select the Workday Integration System Security Group used with your Azure AD integration. Update the [domain permissions for the security group](../saas-apps/workday-inbound-tutorial.md#configuring-domain-security-policy-permissions), so it has GET access for the Workday domain **Reports: Public Profile**.
39+
>[!div class="mx-imgBorder"]
40+
>![Screenshot of permissions to setup in Workday.](./media/workday-pronoun-data/workday-pronoun-permissions.png)
41+
1. Activate Pending Security Policy changes.
42+
1. Select a worker in your Workday tenant for testing purposes. Set pronoun information for this worker using the **Edit Personal Information** task. Ensure that the worker has enabled pronoun display to all in their public profile preference.
43+
44+
>[!div class="mx-imgBorder"]
45+
>![Screenshot of enabling pronoun display option.](./media/workday-pronoun-data/enable-pronoun-display-preference.png)
46+
47+
1. Use Workday Studio or Postman to invoke [Get_Workers API version 38.1](https://community.workday.com/sites/default/files/file-hosting/productionapi/Human_Resources/v38.1/Get_Workers.html) for the test user using the Workday Azure AD integration system user. In the SOAP request header specify the option Include_Reference_Descriptors_In_Response.
48+
```
49+
<bsvc:Workday_Common_Header>
50+
<bsvc:Include_Reference_Descriptors_In_Response>true</bsvc:Include_Reference_Descriptors_In_Response>
51+
</bsvc:Workday_Common_Header>
52+
```
53+
1. In the Get_Workers response, you will now see pronoun information.
54+
55+
>[!div class="mx-imgBorder"]
56+
>![Screenshot of Workday Get Workers API response.](./media/workday-pronoun-data/get-workers-response-with-pronoun.png)
57+
58+
>[!NOTE]
59+
>If you are not able to retrieve pronoun data in the *Get_Workers* response, then troubleshoot Workday domain security permissions. Ensure your integration security group has permission to the segmented security group that grants access to the pronoun data.
60+
61+
Once you confirm that pronoun data is available in the *Get_Workers* response, go to the next step of updating your Azure AD provisioning app configuration.
62+
63+
## Updating Azure AD provisioning app to retrieve pronouns
64+
65+
To retrieve pronouns from Workday, you'll need to update your Azure AD provisioning app to query Workday using v38.1 of the Workday Web Services. We recommend testing this configuration first in your test/sandbox environment before implementing the change in production.
66+
67+
1. Sign-in to Azure portal as administrator.
68+
1. Open your *Workday to AD User provisioning* app OR *Workday to Azure AD User provisioning* app.
69+
1. In the **Admin Credentials** section, update the **Tenant URL** to include the Workday Web Service version v38.1 as shown below.
70+
71+
>[!div class="mx-imgBorder"]
72+
>![Screenshot of Azure portal provisioning app with Workday version.](./media/workday-pronoun-data/update-workday-version.png)
73+
74+
1. Open the **Attribute mappings** blade. Scroll down and click **Show advanced options**. Click on **Edit attribute list for Workday**.
75+
1. If your provisioning app is configured to use the default WWS API version v21.1, then [reference this article to review and update the XPATHs for each attribute](workday-attribute-reference.md#xpath-values-for-workday-web-services-wws-api-v30).
76+
1. Add a new attribute called **PreferredPronoun** with XPATH
77+
78+
`/wd:Worker/wd:Worker_Data/wd:Personal_Data/wd:Personal_Information_Data/wd:Pronoun_Reference/@wd:Descriptor`
79+
80+
1. Save your changes.
81+
1. You can now add a new attribute mapping to flow the Workday attribute **PreferredPronoun** to any attribute in AD/Azure AD.
82+
1. If you want to incorporate pronoun information as part of display name, you can update the attribute mapping for displayName attribute to use the below expression.
83+
84+
`Switch([PreferredPronoun], Join("", [PreferredNameData], " (", [PreferredPronoun], ")"), "", [PreferredNameData])`
85+
86+
1. If worker *Aaron Hall* has set his pronoun information in Workday as `HE/HIM`, then the above expression will set the display name in Azure AD as: *Aaron Hall (HE/HIM)*
87+
1. Save your changes.
88+
1. Test the configuration for one user with provisioning on demand.
89+
90+
## Next steps
91+
92+
* [Learn how to configure Workday to Active Directory provisioning](../saas-apps/workday-inbound-tutorial.md)
93+
* [Learn how to configure write back to Workday](../saas-apps/workday-writeback-tutorial.md)
94+
* [Learn more about supported Workday Attributes for inbound provisioning](workday-attribute-reference.md)

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 06/29/2022
9+
ms.date: 07/06/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -48,7 +48,7 @@ The sign-in frequency setting works with apps that have implemented OAuth2 or OI
4848
- Dynamics CRM Online
4949
- Azure portal
5050

51-
The sign-in frequency setting works with 3rd party SAML applications and apps that have implemented OAuth2 or OIDC protocols, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.
51+
The sign-in frequency setting works with third-party SAML applications and apps that have implemented OAuth2 or OIDC protocols, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.
5252

5353
### User sign-in frequency and multifactor authentication
5454

@@ -88,6 +88,9 @@ When administrators select **Every time**, it will require full reauthentication
8888
> [!NOTE]
8989
> An early preview version included the option to prompt for Secondary authentication methods only at reauthentication. This option is no longer supported and should not be used.
9090
91+
> [!WARNING]
92+
> Using require reauthentication every time with the sign-in risk grant control set to **No risk** isn’t supported and will result in poor user experience.
93+
9194
## Persistence of browsing sessions
9295

9396
A persistent browser session allows users to remain signed in after closing and reopening their browser window.
@@ -170,7 +173,7 @@ After administrators confirm your settings using [report-only mode](howto-condit
170173

171174
### Validation
172175

173-
Use the What-If tool to simulate a login from the user to the target application and other conditions based on how you configured your policy. The authentication session management controls show up in the result of the tool.
176+
Use the What-If tool to simulate a sign in from the user to the target application and other conditions based on how you configured your policy. The authentication session management controls show up in the result of the tool.
174177

175178
![Conditional Access What If tool results](media/howto-conditional-access-session-lifetime/conditional-access-what-if-tool-result.png)
176179

0 commit comments

Comments
 (0)