Skip to content

Commit 7de5043

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into varund-novena
2 parents 9aefa99 + 5dc58dc commit 7de5043

File tree

63 files changed

+2321
-685
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+2321
-685
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -594,7 +594,11 @@
594594
"redirect_document_id": false
595595
},
596596
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-device-mappings.md",
597-
"redirect_url": "/azure/healthcare-apis/iot/how-to-configure-device-mappings",
597+
"redirect_url": "/azure/healthcare-apis/iot/overview-of-device-mapping",
598+
"redirect_document_id": false
599+
},
600+
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-configure-device-mappings.md",
601+
"redirect_url": "/azure/healthcare-apis/iot/overview-of-device-mapping",
598602
"redirect_document_id": false
599603
},
600604
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-use-fhir-mappings.md",

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@ The cloud HR app to Active Directory user provisioning solution requires that yo
207207
To prepare the on-premises environment, the Azure AD Connect provisioning agent configuration wizard registers the agent with your Azure AD tenant, [opens ports](../app-proxy/application-proxy-add-on-premises-application.md#open-ports), [allows access to URLs](../app-proxy/application-proxy-add-on-premises-application.md#allow-access-to-urls), and supports [outbound HTTPS proxy configuration](../saas-apps/workday-inbound-tutorial.md#how-do-i-configure-the-provisioning-agent-to-use-a-proxy-server-for-outbound-http-communication).
208208

209209
The provisioning agent configures a [Global Managed Service Account (GMSA)](../cloud-sync/how-to-prerequisites.md#group-managed-service-accounts)
210-
to communicate with the Active Directory domains. If you want to use a non-GMSA service account for provisioning, you can [skip GMSA configuration](../cloud-sync/how-to-manage-registry-options.md#skip-gmsa-configuration) and specify your service account during configuration.
210+
to communicate with the Active Directory domains.
211211

212212
You can select domain controllers that should handle provisioning requests. If you have several geographically distributed domain controllers, install the provisioning agent in the same site as your preferred domain controllers. This positioning improves the reliability and performance of the end-to-end solution.
213213

@@ -249,7 +249,7 @@ This topology supports business requirements where attribute mapping and provisi
249249

250250
Use this topology to manage multiple independent child AD domains belonging to the same forest, if managers always exist in the same domain as the user and your unique ID generation rules for attributes like *userPrincipalName*, *samAccountName* and *mail* does not require a forest-wide lookup. It also offers the flexibility of delegating the administration of each provisioning job by domain boundary.
251251

252-
For example: In the diagram below, the provisioning apps are setup for each geographic region: North America (NA), Europe, Middle East and Africa (EMEA) and Asia Pacific (APAC). Depending on the location, users are provisioned to the respective AD domain. Delegated administration of the provisioning app is possible so that *EMEA administrators* can independently manage the provisioning configuration of users belonging to the EMEA region.
252+
For example: In the diagram below, the provisioning apps are set up for each geographic region: North America (NA), Europe, Middle East and Africa (EMEA) and Asia Pacific (APAC). Depending on the location, users are provisioned to the respective AD domain. Delegated administration of the provisioning app is possible so that *EMEA administrators* can independently manage the provisioning configuration of users belonging to the EMEA region.
253253

254254
:::image type="content" source="media/plan-cloud-hr-provision/topology-3-separate-apps-with-multiple-ad-domains-no-cross-domain.png" alt-text="Screenshot of separate apps to provision users from Cloud HR to multiple AD domains" lightbox="media/plan-cloud-hr-provision/topology-3-separate-apps-with-multiple-ad-domains-no-cross-domain.png":::
255255

@@ -266,7 +266,7 @@ For example: In the diagram below, the provisioning apps are setup for each geog
266266

267267
Use this topology to manage multiple independent child AD domains belonging to the same forest, if a user's manager may exist in the different domain and your unique ID generation rules for attributes like *userPrincipalName*, *samAccountName* and *mail* requires a forest-wide lookup.
268268

269-
For example: In the diagram below, the provisioning apps are setup for each geographic region: North America (NA), Europe, Middle East and Africa (EMEA) and Asia Pacific (APAC). Depending on the location, users are provisioned to the respective AD domain. Cross-domain manager references and forest-wide lookup is handled by enabling referral chasing on the provisioning agent.
269+
For example: In the diagram below, the provisioning apps are set up for each geographic region: North America (NA), Europe, Middle East and Africa (EMEA) and Asia Pacific (APAC). Depending on the location, users are provisioned to the respective AD domain. Cross-domain manager references and forest-wide lookup are handled by enabling referral chasing on the provisioning agent.
270270

271271
:::image type="content" source="media/plan-cloud-hr-provision/topology-4-separate-apps-with-multiple-ad-domains-cross-domain.png" alt-text="Screenshot of separate apps to provision users from Cloud HR to multiple AD domains with cross domain support" lightbox="media/plan-cloud-hr-provision/topology-4-separate-apps-with-multiple-ad-domains-cross-domain.png":::
272272

@@ -285,7 +285,7 @@ For example: In the diagram below, the provisioning apps are setup for each geog
285285

286286
Use this topology if you want to use a single provisioning app to manage users belonging to all your parent and child AD domains. This topology is recommended if provisioning rules are consistent across all domains and there is no requirement for delegated administration of provisioning jobs. This topology supports resolving cross-domain manager references and can perform forest-wide uniqueness check.
287287

288-
For example: In the diagram below, a single provisioning app manages users present in three different child domains grouped by region: North America (NA), Europe, Middle East and Africa (EMEA) and Asia Pacific (APAC). The attribute mapping for *parentDistinguishedName* is used to dynamically create a user in the appropriate child domain. Cross-domain manager references and forest-wide lookup is handled by enabling referral chasing on the provisioning agent.
288+
For example: In the diagram below, a single provisioning app manages users present in three different child domains grouped by region: North America (NA), Europe, Middle East and Africa (EMEA) and Asia Pacific (APAC). The attribute mapping for *parentDistinguishedName* is used to dynamically create a user in the appropriate child domain. Cross-domain manager references and forest-wide lookup are handled by enabling referral chasing on the provisioning agent.
289289

290290
:::image type="content" source="media/plan-cloud-hr-provision/topology-5-single-app-with-multiple-ad-domains-cross-domain.png" alt-text="Screenshot of single app to provision users from Cloud HR to multiple AD domains with cross domain support" lightbox="media/plan-cloud-hr-provision/topology-5-single-app-with-multiple-ad-domains-cross-domain.png":::
291291

articles/active-directory/cloud-sync/how-to-manage-registry-options.md

Lines changed: 1 addition & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: how-to
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
13-
ms.date: 01/11/2023
13+
ms.date: 04/03/2023
1414
ms.subservice: hybrid
1515
ms.reviewer: chmutali
1616
ms.author: billmath
@@ -62,29 +62,6 @@ Use the following steps to turn on referral chasing:
6262
1. Restart the Azure AD Connect Provisioning Service from the *Services* console.
6363
1. If you have deployed multiple provisioning agents, apply this registry change to all agents for consistency.
6464

65-
## Skip GMSA configuration
66-
With agent version 1.1.281.0+, by default, when you run the agent configuration wizard, you are prompted to setup [Group Managed Service Account (GMSA)](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview). The GMSA setup by the wizard is used at runtime for all sync and provisioning operations.
67-
68-
If you are upgrading from a prior version of the agent and have setup a custom service account with delegated OU-level permissions specific to your Active Directory topology, you may want to skip/postpone GMSA configuration and plan for this change.
69-
70-
> [!NOTE]
71-
> This guidance specifically applies to customers who have configured HR (Workday/SuccessFactors) inbound provisioning with agent versions prior to 1.1.281.0 and have setup a custom service account for agent operations. In the long run, we recommend switching to GMSA as a best practice.
72-
73-
In this scenario, you can still upgrade the agent binaries and skip the GMSA configuration using the following steps:
74-
75-
1. Log on as Administrator on the Windows server running the Azure AD Connect Provisioning Agent.
76-
1. Run the agent installer to install the new agent binaries. Close the agent configuration wizard which opens up automatically after the installation is successful.
77-
1. Use the *Run* menu item to open the registry editor (regedit.exe)
78-
1. Locate the key folder **HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Azure AD Connect Agents\Azure AD Connect Provisioning Agent**
79-
1. Right-click and select "New -> DWORD Value"
80-
1. Provide the name:
81-
`UseCredentials`
82-
1. Double-click on the **Value Name** and enter the value data as `1`.
83-
> [!div class="mx-imgBorder"]
84-
> ![Use Credentials](media/how-to-manage-registry-options/use-credentials.png)
85-
1. Restart the Azure AD Connect Provisioning Service from the *Services* console.
86-
1. If you have deployed multiple provisioning agents, apply this registry change to all agents for consistency.
87-
1. From the desktop short cut, run the agent configuration wizard. The wizard will skip the GMSA configuration.
8865

8966

9067
> [!NOTE]
65.8 KB
Loading

0 commit comments

Comments
 (0)