Skip to content

Commit 8cbdffd

Browse files
authored
Merge pull request #211450 from MicrosoftDocs/main
9/15 OOB Publish
2 parents da2d11e + 59909f8 commit 8cbdffd

File tree

174 files changed

+2314
-1118
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

174 files changed

+2314
-1118
lines changed

.openpublishing.redirection.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29353,6 +29353,11 @@
2935329353
"source_path_from_root": "/articles/virtual-machines/linux/copy-files-to-linux-vm-using-scp.md",
2935429354
"redirect_url": "/azure/virtual-machines/copy-files-to-vm-using-scp",
2935529355
"redirect_document_id": false
29356-
}
29356+
},
29357+
{
29358+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/ha-setup-with-stonith.md",
29359+
"redirect_url": "/azure/virtual-machines/workloads/sap/ha-setup-with-fencing-device",
29360+
"redirect_document_id": false
29361+
},
2935729362
]
29358-
}
29363+
}
31.9 KB
Loading
34.5 KB
Loading
133 KB
Loading
93.8 KB
Loading
220 KB
Loading
Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title: Tutorial - Test your SCIM endpoint for compatibility with the Azure Active Directory (Azure AD) provisioning service.
3+
description: This tutorial describes how to use the Azure AD SCIM Validator to validate that your provisioning server is compatible with the Azure SCIM client.
4+
author: kenwith
5+
ms.author: kenwith
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: app-provisioning
9+
ms.workload: identity
10+
ms.topic: tutorial
11+
ms.date: 09/13/2022
12+
ms.custom: template-tutorial
13+
ms.reviewer: arvinh
14+
---
15+
16+
17+
# Tutorial: Validate a SCIM endpoint
18+
19+
This tutorial describes how to use the Azure AD SCIM Validator to validate that your provisioning server is compatible with the Azure SCIM client. The tutorial is intended for developers who want to build a SCIM compatible server to manage their identities with the Azure AD provisioning service.
20+
21+
In this tutorial, you learn how to:
22+
23+
> [!div class="checklist"]
24+
> * Select a testing method
25+
> * Configure the testing method
26+
> * Validate your SCIM endpoint
27+
28+
## Prerequisites
29+
30+
- An Azure Active Directory account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
31+
- A SCIM endpoint that conforms to the SCIM 2.0 standard and meets the provision service requirements. To learn more, see [Tutorial: Develop and plan provisioning for a SCIM endpoint in Azure Active Directory](use-scim-to-provision-users-and-groups.md).
32+
33+
34+
## Select a testing method
35+
The first step is to select a testing method to validate your SCIM endpoint.
36+
37+
1. Open your web browser and navigate to the SCIM Validator: [https://scimvalidator.microsoft.com/](https://scimvalidator.microsoft.com/).
38+
1. Select one of the three test options. You can use default attributes, automatically discover the schema, or upload a schema.
39+
40+
:::image type="content" source="./media/scim-validator-tutorial/scim-validator.png" alt-text="Screenshot of SCIM Validator main page." lightbox="./media/scim-validator-tutorial/scim-validator.png":::
41+
42+
**Use default attributes** - The system provides the default attributes, and you modify them to meet your need.
43+
44+
**Discover schema** - If your end point supports /Schema, this option will allow the tool to discover the supported attributes. We recommend this option as it reduces the overhead of updating your app as you build it out.
45+
46+
**Upload Azure AD Schema** - Upload the schema you've downloaded from your sample app on Azure AD.
47+
48+
49+
## Configure the testing method
50+
Now that you've selected a testing method, the next step is to configure it.
51+
52+
:::image type="content" source="./media/scim-validator-tutorial/scim-validator-attributes.png" alt-text="Screenshot of SCIM Validator attributes page." lightbox="./media/scim-validator-tutorial/scim-validator-attributes.png":::
53+
54+
1. If you're using the default attributes option, then fill in all of the indicated fields.
55+
2. If you're using the discover schema option, then enter the SCIM endpoint URL and token.
56+
3. If you're uploading a schema, then select your .json file to upload. The option accepts a .json file exported from your sample app on the Azure portal. To learn how to export a schema, see [How-to: Export provisioning configuration and roll back to a known good state](export-import-provisioning-configuration.md#export-your-provisioning-configuration).
57+
> [!NOTE]
58+
> To test *group attributes*, make sure to select **Enable Group Tests**.
59+
60+
4. Edit the list attributes as desired for both the user and group types using the ‘Add Attribute’ option at the end of the attribute list and minus (-) sign on the right side of the page.
61+
5. Select the joining property from both the user and group attributes list.
62+
> [!NOTE]
63+
> The joining property, also known as matching attribute, is an attribute that user and group resources can be uniquely queried on at the source and matched in the target system.
64+
65+
66+
## Validate your SCIM endpoint
67+
Finally, you need to test and validate your endpoint.
68+
69+
1. Select **Test Schema** to begin the test.
70+
1. Review the results with a summary of passed and failed tests.
71+
1. Select the **show details** tab and review and fix issues.
72+
1. Continue to test your schema until all tests pass.
73+
74+
:::image type="content" source="./media/scim-validator-tutorial/scim-validator-results.png" alt-text="Screenshot of SCIM Validator results page." lightbox="./media/scim-validator-tutorial/scim-validator-results.png":::
75+
76+
### Use Postman to test endpoints (optional)
77+
78+
In addition to using the SCIM Validator tool, you can also use Postman to validate an endpoint. This example provides a set of tests in Postman that validate CRUD (create, read, update, and delete) operations on users and groups, filtering, updates to group membership, and disabling users.
79+
80+
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *ControllerConstant.cs* in **AzureADProvisioningSCIMreference** > **ScimReferenceApi** > **Controllers**.
81+
82+
> [!NOTE]
83+
> You can only use HTTP endpoints for local tests. The Azure AD provisioning service requires that your endpoint support HTTPS.
84+
85+
1. Download [Postman](https://www.getpostman.com/downloads/) and start the application.
86+
1. Copy and paste this link into Postman to import the test collection: `https://aka.ms/ProvisioningPostman`.
87+
88+
![Screenshot that shows importing the test collection in Postman.](media/scim-validator-tutorial/postman-collection.png)
89+
90+
1. Create a test environment that has these variables:
91+
92+
|Environment|Variable|Value|
93+
|-|-|-|
94+
|Run the project locally by using IIS Express|||
95+
||**Server**|`localhost`|
96+
||**Port**|`:44359` *(don't forget the **`:`**)*|
97+
||**Api**|`scim`|
98+
|Run the project locally by using Kestrel|||
99+
||**Server**|`localhost`|
100+
||**Port**|`:5001` *(don't forget the **`:`**)*|
101+
||**Api**|`scim`|
102+
|Host the endpoint in Azure|||
103+
||**Server**|*(input your SCIM URL)*|
104+
||**Port**|*(leave blank)*|
105+
||**Api**|`scim`|
106+
107+
1. Use **Get Key** from the Postman collection to send a **GET** request to the token endpoint and retrieve a security token to be stored in the **token** variable for subsequent requests.
108+
109+
![Screenshot that shows the Postman Get Key folder.](media/scim-validator-tutorial/postman-get-key.png)
110+
111+
> [!NOTE]
112+
> To make a SCIM endpoint secure, you need a security token before you connect. The tutorial uses the `{host}/scim/token` endpoint to generate a self-signed token.
113+
114+
That's it! You can now run the **Postman** collection to test the SCIM endpoint functionality.
115+
116+
## Clean up resources
117+
118+
If you created any Azure resources in your testing that are no longer needed, don't forget to delete them.
119+
120+
## Known Issues with Azure AD SCIM Validator
121+
122+
- Soft deletes (disables) aren’t yet supported.
123+
- The time zone format is randomly generated and will fail for systems that try to validate it.
124+
- The preferred language format is randomly generated and will fail for systems that try to validate it.
125+
- The patch user remove attributes may attempt to remove mandatory/required attributes for certain systems. Such failures should be ignored.
126+
127+
128+
## Next steps
129+
- [Learn how to add an app that is not in the Azure AD app gallery](../manage-apps/overview-application-gallery.md)

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ items:
1919
href: use-scim-to-provision-users-and-groups.md
2020
- name: Develop a sample SCIM endpoint
2121
href: use-scim-to-build-users-and-groups-endpoints.md
22+
- name: Validate a SCIM endpoint
23+
href: scim-validator-tutorial.md
2224
- name: On-prem app provisioning tutorials
2325
items:
2426
- name: Provisioning to On-premises SCIM-enabled apps

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 3 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -132,50 +132,10 @@ The default token validation code is configured to use an Azure AD token and req
132132
}
133133
```
134134

135-
### Use Postman to test endpoints
136-
137-
After you deploy the SCIM endpoint, you can test to ensure that it's compliant with SCIM RFC. This example provides a set of tests in Postman that validate CRUD (create, read, update, and delete) operations on users and groups, filtering, updates to group membership, and disabling users.
138-
139-
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *ControllerConstant.cs* in **AzureADProvisioningSCIMreference** > **ScimReferenceApi** > **Controllers**.
140-
141-
> [!NOTE]
142-
> You can only use HTTP endpoints for local tests. The Azure AD provisioning service requires that your endpoint support HTTPS.
143-
144-
1. Download [Postman](https://www.getpostman.com/downloads/) and start the application.
145-
1. Copy and paste this link into Postman to import the test collection: `https://aka.ms/ProvisioningPostman`.
146-
147-
![Screenshot that shows importing the test collection in Postman.](media/use-scim-to-build-users-and-groups-endpoints/postman-collection.png)
148-
149-
1. Create a test environment that has these variables:
150-
151-
|Environment|Variable|Value|
152-
|-|-|-|
153-
|Run the project locally by using IIS Express|||
154-
||**Server**|`localhost`|
155-
||**Port**|`:44359` *(don't forget the **`:`**)*|
156-
||**Api**|`scim`|
157-
|Run the project locally by using Kestrel|||
158-
||**Server**|`localhost`|
159-
||**Port**|`:5001` *(don't forget the **`:`**)*|
160-
||**Api**|`scim`|
161-
|Host the endpoint in Azure|||
162-
||**Server**|*(input your SCIM URL)*|
163-
||**Port**|*(leave blank)*|
164-
||**Api**|`scim`|
165-
166-
1. Use **Get Key** from the Postman collection to send a **GET** request to the token endpoint and retrieve a security token to be stored in the **token** variable for subsequent requests.
167-
168-
![Screenshot that shows the Postman Get Key folder.](media/use-scim-to-build-users-and-groups-endpoints/postman-get-key.png)
169-
170-
> [!NOTE]
171-
> To make a SCIM endpoint secure, you need a security token before you connect. The tutorial uses the `{host}/scim/token` endpoint to generate a self-signed token.
172-
173-
That's it! You can now run the **Postman** collection to test the SCIM endpoint functionality.
174-
175135
## Next steps
176136

177137
To develop a SCIM-compliant user and group endpoint with interoperability for a client, see [SCIM client implementation](http://www.simplecloud.info/#Implementations2).
178138

179-
> [!div class="nextstepaction"]
180-
> [Tutorial: Develop and plan provisioning for a SCIM endpoint](use-scim-to-provision-users-and-groups.md)
181-
> [Tutorial: Configure provisioning for a gallery app](configure-automatic-user-provisioning-portal.md)
139+
- [Tutorial: Validate a SCIM endpoint](scim-validator-tutorial.md)
140+
- [Tutorial: Develop and plan provisioning for a SCIM endpoint](use-scim-to-provision-users-and-groups.md)
141+
- [Tutorial: Configure provisioning for a gallery app](configure-automatic-user-provisioning-portal.md)

articles/active-directory/authentication/tutorial-enable-azure-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ In this tutorial you learn how to:
3838

3939
To complete this tutorial, you need the following resources and privileges:
4040

41-
* A working Azure AD tenant with at least an Azure AD Premium P1 or trial license enabled.
41+
* A working Azure AD tenant with Azure AD Premium P1 or trial licenses enabled.
4242
* If you need to, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
4343

4444
* An account with *Conditional Access Administrator*, *Security Administrator*, or *Global Administrator* privileges. Some MFA settings can also be managed by an *Authentication Policy Administrator*. For more information, see [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).

0 commit comments

Comments
 (0)