|
| 1 | +--- |
| 2 | +title: 'Tutorial: Configure IDEO for automatic user provisioning with Azure Active Directory | Microsoft Docs' |
| 3 | +description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to IDEO. |
| 4 | +services: active-directory |
| 5 | +documentationcenter: '' |
| 6 | +author: zchia |
| 7 | +writer: zchia |
| 8 | +manager: beatrizd |
| 9 | + |
| 10 | +ms.assetid: de4f06a3-83e9-46ce-80ee-03d706b91c81 |
| 11 | +ms.service: active-directory |
| 12 | +ms.subservice: saas-app-tutorial |
| 13 | +ms.workload: identity |
| 14 | +ms.tgt_pltfrm: na |
| 15 | +ms.devlang: na |
| 16 | +ms.topic: article |
| 17 | +ms.date: 10/24/2019 |
| 18 | +ms.author: Zhchia |
| 19 | +--- |
| 20 | + |
| 21 | +# Tutorial: Configure IDEO for automatic user provisioning |
| 22 | + |
| 23 | +The objective of this tutorial is to demonstrate the steps to be performed in IDEO and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and de-provision users and/or groups to IDEO. |
| 24 | + |
| 25 | +> [!NOTE] |
| 26 | +> This tutorial describes a connector built on top of the Azure AD User Provisioning Service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md). |
| 27 | +> |
| 28 | +> This connector is currently in Public Preview. For more information on the general Microsoft Azure terms of use for Preview features, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). |
| 29 | +
|
| 30 | +## Prerequisites |
| 31 | + |
| 32 | +The scenario outlined in this tutorial assumes that you already have the following prerequisites: |
| 33 | + |
| 34 | +* An Azure AD tenant |
| 35 | +* [A IDEO tenant](https://www.shape.space/product/pricing) |
| 36 | +* An user account on IDEO | Shape with Admin permissions. |
| 37 | + |
| 38 | +## Assign users to IDEO |
| 39 | + |
| 40 | +Azure Active Directory uses a concept called assignments to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users and/or groups that have been assigned to an application in Azure AD are synchronized. |
| 41 | + |
| 42 | +Before configuring and enabling automatic user provisioning, you should decide which users and/or groups in Azure AD need access to IDEO. Once decided, you can assign these users and/or groups to IDEO by following the instructions here: |
| 43 | + |
| 44 | +* [Assign a user or group to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md) |
| 45 | + |
| 46 | +### Important tips for assigning users to IDEO |
| 47 | + |
| 48 | +* It is recommended that a single Azure AD user is assigned to IDEO to test the automatic user provisioning configuration. Additional users and/or groups may be assigned later. |
| 49 | + |
| 50 | +* When assigning a user to IDEO, you must select any valid application-specific role (if available) in the assignment dialog. Users with the **Default Access** role are excluded from provisioning. |
| 51 | + |
| 52 | +## Set up IDEO for provisioning |
| 53 | + |
| 54 | +Before configuring IDEO for automatic user provisioning with Azure AD, you will need to retrieve some provisioning information from IDEO. |
| 55 | + |
| 56 | +1. For **Secret Token ** contact IDEO support team at [email protected]. This value will be entered in the **Secret Token ** field in the Provisioning tab of your IDEO application in the Azure portal. |
| 57 | + |
| 58 | +## Add IDEO from the gallery |
| 59 | + |
| 60 | +To configure IDEO for automatic user provisioning with Azure AD, you need to add IDEO from the Azure AD application gallery to your list of managed SaaS applications. |
| 61 | + |
| 62 | +1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**. |
| 63 | + |
| 64 | +  |
| 65 | + |
| 66 | +2. Go to **Enterprise applications**, and then select **All applications**. |
| 67 | + |
| 68 | +  |
| 69 | + |
| 70 | +3. To add a new application, select the **New application** button at the top of the pane. |
| 71 | + |
| 72 | +  |
| 73 | + |
| 74 | +4. In the search box, enter **IDEO**, select **IDEO** in the results panel. |
| 75 | + |
| 76 | +  |
| 77 | + |
| 78 | +5. Select the **Sign-up for IDEO** button which will redirect you to IDEO's login page. |
| 79 | + |
| 80 | +  |
| 81 | + |
| 82 | +6. As IDEO is an OpenIDConnect app, choose to login to IDEO using your Microsoft work account. |
| 83 | + |
| 84 | +  |
| 85 | + |
| 86 | +7. After a successful authentication, accept the consent prompt for the consent page. The application will then be automatically added to your tenant and you will be redirected to your IDEO account. |
| 87 | + |
| 88 | +  |
| 89 | + |
| 90 | +## Configure automatic user provisioning to IDEO |
| 91 | + |
| 92 | +This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in IDEO based on user and/or group assignments in Azure AD. |
| 93 | + |
| 94 | +### To configure automatic user provisioning for IDEO in Azure AD: |
| 95 | + |
| 96 | +1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**. |
| 97 | + |
| 98 | +  |
| 99 | + |
| 100 | +2. In the applications list, select **IDEO**. |
| 101 | + |
| 102 | +  |
| 103 | + |
| 104 | +3. Select the **Provisioning** tab. |
| 105 | + |
| 106 | +  |
| 107 | + |
| 108 | +4. Set the **Provisioning Mode** to **Automatic**. |
| 109 | + |
| 110 | +  |
| 111 | + |
| 112 | +5. Under the **Admin Credentials** section, input `https://profile.ideo.com/api/scim/v2` in **Tenant URL**. Input the value that you retrieved from IDEO support team in **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to IDEO. If the connection fails, ensure your IDEO account has Admin permissions and try again. |
| 113 | + |
| 114 | +  |
| 115 | + |
| 116 | +6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**. |
| 117 | + |
| 118 | +  |
| 119 | + |
| 120 | +7. Click **Save**. |
| 121 | + |
| 122 | +8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to IDEO**. |
| 123 | + |
| 124 | +  |
| 125 | + |
| 126 | +9. Review the user attributes that are synchronized from Azure AD to IDEO in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in IDEO for update operations. Select the **Save** button to commit any changes. |
| 127 | + |
| 128 | +  |
| 129 | + |
| 130 | +10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md). |
| 131 | + |
| 132 | +11. To enable the Azure AD provisioning service for IDEO, change the **Provisioning Status** to **On** in the **Settings** section. |
| 133 | + |
| 134 | +  |
| 135 | + |
| 136 | +12. Define the users and/or groups that you would like to provision to IDEO by choosing the desired values in **Scope** in the **Settings** section. |
| 137 | + |
| 138 | +  |
| 139 | + |
| 140 | +13. When you are ready to provision, click **Save**. |
| 141 | + |
| 142 | +  |
| 143 | + |
| 144 | +This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity report, which describes all actions performed by the Azure AD provisioning service on IDEO. |
| 145 | + |
| 146 | +For more information on how to read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md). |
| 147 | + |
| 148 | +## Additional resources |
| 149 | + |
| 150 | +* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md) |
| 151 | +* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md) |
| 152 | + |
| 153 | +## Next steps |
| 154 | + |
| 155 | +* [Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md) |
| 156 | + |
| 157 | + |
0 commit comments