Skip to content

Commit 836d2d7

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 15fafee + 9df51b5 commit 836d2d7

File tree

223 files changed

+2250
-1600
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

223 files changed

+2250
-1600
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6310,11 +6310,6 @@
63106310
"redirect_url": "/azure/azure-monitor/agents/solution-agenthealth",
63116311
"redirect_document_id": false
63126312
},
6313-
{
6314-
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-hybrid-setup.md",
6315-
"redirect_url": "/azure/azure-monitor/containers/container-insights-enable-arc-enabled-clusters",
6316-
"redirect_document_id": false
6317-
},
63186313
{
63196314
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v3.md",
63206315
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
@@ -6324,11 +6319,6 @@
63246319
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v4.md",
63256320
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
63266321
"redirect_document_id": false
6327-
},
6328-
{
6329-
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-hybrid.md",
6330-
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6331-
"redirect_document_id": false
63326322
}
63336323
]
63346324
}

articles/active-directory/app-provisioning/inbound-provisioning-api-configure-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ If you're configuring inbound user provisioning to on-premises Active Directory,
3636

3737
## Create your API-driven provisioning app
3838

39-
1. Log in to the [Microsoft Entra portal](<https://entra.microsoft.com>).
39+
1. Log in to the [Microsoft Entra admin center](<https://entra.microsoft.com>).
4040
2. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
4141
3. Click on **New application** to create a new provisioning application.
4242
[![Screenshot of Entra Admin Center.](media/inbound-provisioning-api-configure-app/provisioning-entra-admin-center.png)](media/inbound-provisioning-api-configure-app/provisioning-entra-admin-center.png#lightbox)

articles/active-directory/app-provisioning/inbound-provisioning-api-curl-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ ms.reviewer: cmmdesai
4040
4141
## Verify processing of the bulk request payload
4242
43-
1. Log in to [Microsoft Entra portal](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
43+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
4444
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
4545
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
4646
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-custom-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You have configured API-driven provisioning app. You're provisioning app is succ
2828

2929
In this step, we'll add the two attributes "HireDate" and "JobCode" that are not part of the standard SCIM schema to the provisioning app and use them in the provisioning data flow.
3030

31-
1. Log in to Microsoft Entra portal with application administrator role.
31+
1. Log in to Microsoft Entra admin center with application administrator role.
3232
1. Go to **Enterprise applications** and open your API-driven provisioning app.
3333
1. Open the **Provisioning** blade.
3434
1. Click on the **Edit Provisioning** button.
@@ -44,7 +44,7 @@ In this step, we'll add the two attributes "HireDate" and "JobCode" that are not
4444
1. **Save** your changes
4545

4646
> [!NOTE]
47-
> If you'd like to add only a few additional attributes to the provisioning app, use Microsoft Entra Portal to extend the schema. If you'd like to add more custom attributes (let's say 20+ attributes), then we recommend using the [`UpdateSchema` mode of the CSV2SCIM PowerShell script](inbound-provisioning-api-powershell.md#extending-provisioning-job-schema) which automates the above manual process.
47+
> If you'd like to add only a few additional attributes to the provisioning app, use Microsoft Entra admin center to extend the schema. If you'd like to add more custom attributes (let's say 20+ attributes), then we recommend using the [`UpdateSchema` mode of the CSV2SCIM PowerShell script](inbound-provisioning-api-powershell.md#extending-provisioning-job-schema) which automates the above manual process.
4848
4949
## Step 2 - Map the custom attributes
5050

articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Depending on how your API client authenticates with Azure AD, you can select bet
2727
## Configure a service principal
2828
This configuration registers an app in Azure AD that represents the external API client and grants it permission to invoke the inbound provisioning API. The service principal client id and client secret can be used in the OAuth client credentials grant flow.
2929

30-
1. Log in to Microsoft Entra portal (https://entra.microsoft.com) with global administrator or application administrator login credentials.
30+
1. Log in to Microsoft Entra admin center (https://entra.microsoft.com) with global administrator or application administrator login credentials.
3131
1. Browse to **Azure Active Directory** -> **Applications** -> **App registrations**.
3232
1. Click on the option **New registration**.
3333
1. Provide an app name, select the default options, and click on **Register**.

articles/active-directory/app-provisioning/inbound-provisioning-api-graph-explorer.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,10 +48,10 @@ This tutorial describes how you can quickly test [API-driven inbound provisionin
4848

4949
## Verify processing of bulk request payload
5050

51-
You can verify the processing either from the Microsoft Entra portal or using Graph Explorer.
51+
You can verify the processing either from the Microsoft Entra admin center or using Graph Explorer.
5252

53-
### Verify processing from Microsoft Entra portal
54-
1. Log in to [Microsoft Entra portal](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
53+
### Verify processing from Microsoft Entra admin center
54+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
5555
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
5656
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
5757
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-postman.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,10 +62,10 @@ In this step, you'll configure the Postman app and invoke the API using the conf
6262
If the API invocation is successful, you see the message `202 Accepted.` Under Headers, the **Location** attribute points to the provisioning logs API endpoint.
6363

6464
## Verify processing of bulk request payload
65-
You can verify the processing either from the Microsoft Entra portal or using Postman.
65+
You can verify the processing either from the Microsoft Entra admin center or using Postman.
6666

67-
### Verify processing from Microsoft Entra portal
68-
1. Log in to [Microsoft Entra portal](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
67+
### Verify processing from Microsoft Entra admin center
68+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
6969
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
7070
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
7171
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ To illustrate the procedure, let's use the CSV file `Samples/csv-with-2-records.
180180

181181
This section explains how to send the generated bulk request payload to your inbound provisioning API endpoint.
182182

183-
1. Log in to your Entra portal as *Application Administrator* or *Global Administrator*.
183+
1. Log in to your Microsoft Entra admin center as *Application Administrator* or *Global Administrator*.
184184
1. Copy the `ServicePrincipalId` associated with your provisioning app from **Provisioning App** > **Properties** > **Object ID**.
185185

186186
:::image type="content" border="true" source="./media/inbound-provisioning-api-powershell/object-id.png" alt-text="Screenshot of the Object ID." lightbox="./media/inbound-provisioning-api-powershell/object-id.png":::
@@ -204,7 +204,7 @@ This section explains how to send the generated bulk request payload to your inb
204204
$ThumbPrint = $ClientCertificate.ThumbPrint
205205
```
206206
The generated certificate is stored **Current User\Personal\Certificates**. You can view it using the **Control Panel** -> **Manage user certificates** option.
207-
1. To associate this certificate with a valid service principal, log in to your Entra portal as *Application Administrator*.
207+
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as *Application Administrator*.
208208
1. Open [the service principal you configured](inbound-provisioning-api-grant-access.md#configure-a-service-principal) under **App Registrations**.
209209
1. Copy the **Object ID** from the **Overview** blade. Use the value to replace the string `<AppObjectId>`. Copy the **Application (client) Id**. We will use it later and it is referenced as `<AppClientId>`.
210210
1. Run the following command to upload your certificate to the registered service principal.
@@ -358,7 +358,7 @@ PS > CSV2SCIM.ps1 -Path <path-to-csv-file>
358358

359359
> [!NOTE]
360360
> The `AttributeMapping` and `ValidateAttributeMapping` command-line parameters refer to the mapping of CSV column attributes to the standard SCIM schema elements.
361-
It doesn't refer to the attribute mappings that you perform in the Entra portal provisioning app between source SCIM schema elements and target Azure AD/on-premises AD attributes.
361+
It doesn't refer to the attribute mappings that you perform in the Microsoft Entra admin center provisioning app between source SCIM schema elements and target Azure AD/on-premises AD attributes.
362362

363363
| Parameter | Description | Processing remarks |
364364
|----------|----------------|--------------------|

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: overview
99
ms.workload: identity
10-
ms.date: 03/14/2023
10+
ms.date: 08/14/2023
1111
ms.author: kenwith
1212
ms.reviewer: arvinh
1313
---
@@ -20,9 +20,17 @@ In Azure Active Directory (Azure AD), the term *app provisioning* refers to auto
2020

2121
Azure AD application provisioning refers to automatically creating user identities and roles in the applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into SaaS applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and many more.
2222

23-
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. Your application must support [SCIM](https://aka.ms/scimoverview). Or, you must build a SCIM gateway to connect to your legacy application. If so, you can use the Azure AD Provisioning agent to [directly connect](./on-premises-scim-provisioning.md) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](./on-premises-ldap-connector-configure.md) user store or a [SQL](./tutorial-ecma-sql-connector.md) database, Azure AD can support these applications as well.
24-
25-
App provisioning lets you:
23+
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. The table below provides a mapping of protocols to connectors supported.
24+
25+
|Protocol |Connector|
26+
|-----|-----|
27+
| SCIM | [SCIM - SaaS](use-scim-to-provision-users-and-groups.md) <br />[SCIM - On-prem / Private network](./on-premises-scim-provisioning.md) |
28+
| LDAP | [LDAP](./on-premises-ldap-connector-configure.md)|
29+
| SQL | [SQL](./tutorial-ecma-sql-connector.md) |
30+
| REST | [Web Services](./on-premises-web-services-connector.md)|
31+
| SOAP | [Web Services](./on-premises-web-services-connector.md)|
32+
| Flat-file| [PowerShell](./on-premises-powershell-connector.md) |
33+
| Custom | [Custom ECMA connectors](./on-premises-custom-connector.md) <br /> [Connectors and gateways built by partners](./partner-driven-integrations.md)|
2634

2735
- **Automate provisioning**: Automatically create new accounts in the right systems for new people when they join your team or organization.
2836
- **Automate deprovisioning**: Automatically deactivate accounts in the right systems when people leave the team or organization.

articles/active-directory/architecture/recoverability-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Create a process of predefined communications to make others aware of the issue
100100
Document the state of your tenant and its objects regularly. Then if a hard delete or misconfiguration occurs, you have a roadmap to recovery. The following tools can help you document your current state:
101101

102102
- [Microsoft Graph APIs](/graph/overview) can be used to export the current state of many Azure AD configurations.
103-
- [Azure AD Exporter](https://github.com/microsoft/azureadexporter) is a tool you can use to export your configuration settings.
103+
- [Entra Exporter](https://github.com/microsoft/entraexporter) is a tool you can use to export your configuration settings.
104104
- [Microsoft 365 Desired State Configuration](https://github.com/microsoft/Microsoft365DSC/wiki/What-is-Microsoft365DSC) is a module of the PowerShell Desired State Configuration framework. You can use it to export configurations for reference and application of the prior state of many settings.
105105
- [Conditional Access APIs](https://github.com/Azure-Samples/azure-ad-conditional-access-apis) can be used to manage your Conditional Access policies as code.
106106

0 commit comments

Comments
 (0)