Skip to content

Commit 7518524

Browse files
Merge pull request #253831 from Harshita-130901/Hypervault-provisioning-tutorial
Update hypervault-provisioning-tutorial.md
2 parents 2fa2995 + 328d4ba commit 7518524

File tree

1 file changed

+7
-4
lines changed

1 file changed

+7
-4
lines changed

articles/active-directory/saas-apps/hypervault-provisioning-tutorial.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,11 @@ The scenario outlined in this tutorial assumes that you already have the followi
4242
<a name='step-2-configure-hypervault-to-support-provisioning-with-azure-ad'></a>
4343

4444
## Step 2: Configure Hypervault to support provisioning with Microsoft Entra ID
45-
Contact Hypervault support to configure Hypervault to support provisioning with Microsoft Entra ID.
45+
46+
1. Sign in into your Hypervault account as a manager.
47+
1. Navigate to the **Workspace Settings** page.
48+
1. Under the **Connect to Microsoft Azure** section, click **Enable User Provisioning**.
49+
1. Copy the Domain and Token values. You will need these values in step 5.
4650

4751
<a name='step-3-add-hypervault-from-the-azure-ad-application-gallery'></a>
4852

@@ -58,10 +62,9 @@ The Microsoft Entra provisioning service allows you to scope who is provisioned
5862

5963
* If you need more roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
6064

61-
6265
## Step 5: Configure automatic user provisioning to Hypervault
6366

64-
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users in TestApp based on user assignments in Microsoft Entra ID.
67+
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users in Hypervault based on user assignments in Microsoft Entra ID.
6568

6669
<a name='to-configure-automatic-user-provisioning-for-hypervault-in-azure-ad'></a>
6770

@@ -84,7 +87,7 @@ This section guides you through the steps to configure the Microsoft Entra provi
8487

8588
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
8689

87-
1. Under the **Admin Credentials** section, input your Hypervault Tenant URL and Secret Token. Click **Test Connection** to ensure Microsoft Entra ID can connect to Hypervault. If the connection fails, ensure your Hypervault account has Admin permissions and try again.
90+
1. Under the **Admin Credentials** section, input your Hypervault Tenant URL and Secret Token (generated in step 2). Click **Test Connection** to ensure Microsoft Entra ID can connect to Hypervault. If the connection fails, ensure your Hypervault account has Admin permissions and try again.
8891

8992
![Screenshot of Token.](common/provisioning-testconnection-tenanturltoken.png)
9093

0 commit comments

Comments
 (0)