Skip to content

Commit 8d62a2e

Browse files
author
Jill Grant
authored
Merge pull request #251826 from MicrosoftDocs/alexbuckgit/docutune-autopr-20230918-141307-7479199-ignore-build
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra (part 2) - app-provisioning
2 parents d5dc2df + f39e322 commit 8d62a2e

17 files changed

+268
-251
lines changed

articles/active-directory/app-provisioning/provisioning-agent-release-version-history.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Active Directory Connect Provisioning Agent - Version release history
3-
description: This article lists all releases of Azure Active Directory Connect Provisioning Agent and describes new features and fixed issues.
2+
title: Microsoft Entra Connect Provisioning Agent - Version release history
3+
description: This article lists all releases of Microsoft Entra Connect Provisioning Agent and describes new features and fixed issues.
44
services: active-directory
55
author: kenwith
66
manager: amycolannino
@@ -13,6 +13,6 @@ ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
1515

16-
# Azure Active Directory Connect Provisioning Agent: Version release history
16+
# Microsoft Entra Connect Provisioning Agent: Version release history
1717

1818
[!INCLUDE [cloud-sync-version-history.md](../../../includes/cloud-sync-version-history.md)]

articles/active-directory/app-provisioning/provisioning-workbook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ At the top of the workbook, using the drop-down, specify the source and target i
3838
Theses fields are the source and target of identities. The rest of the filters that appear are based on the selection of source and target.
3939
You can scope your search so that it is more granular using the additional fields. Use the table below as a reference for queries.
4040

41-
For example, if you wanted to see data from your cloud sync workflow, your source would be Active Directory and your target would be Azure AD.
41+
For example, if you wanted to see data from your cloud sync workflow, your source would be Active Directory and your target would be Microsoft Entra ID.
4242

4343

4444
>[!NOTE]

articles/active-directory/app-provisioning/sap-successfactors-attribute-reference.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: SAP SuccessFactors attribute reference for Azure Active Directory
3-
description: Learn which attributes from SuccessFactors are supported by SuccessFactors-HR driven provisioning in Azure Active Directory.
2+
title: SAP SuccessFactors attribute reference for Microsoft Entra ID
3+
description: Learn which attributes from SuccessFactors are supported by SuccessFactors-HR driven provisioning in Microsoft Entra ID.
44
services: active-directory
55
author: kenwith
66
manager: amycolannino
@@ -13,7 +13,7 @@ ms.author: kenwith
1313
ms.reviewer: chmutali
1414
---
1515

16-
# SAP SuccessFactors attribute reference for Azure Active Directory
16+
# SAP SuccessFactors attribute reference for Microsoft Entra ID
1717

1818
In this article, you'll find information on:
1919

@@ -25,7 +25,7 @@ In this article, you'll find information on:
2525
The table below captures the list of SuccessFactors attributes included by default in the following two provisioning apps:
2626

2727
- [SuccessFactors to Active Directory User Provisioning](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md)
28-
- [SuccessFactors to Azure AD User Provisioning](../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md)
28+
- [SuccessFactors to Microsoft Entra User Provisioning](../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md)
2929

3030
Please refer to the [SAP SuccessFactors integration reference](./sap-successfactors-integration-reference.md#retrieving-more-attributes) to extend the schema for additional attributes.
3131

@@ -113,7 +113,7 @@ Please refer to the [SAP SuccessFactors integration reference](./sap-successfact
113113

114114
## Default attribute mapping
115115

116-
The table below provides the default attribute mapping between SuccessFactors attributes listed above and AD/Azure AD attributes. In the Azure AD provisioning app "Mapping" blade, you can modify this default mapping to include attributes from the list above.
116+
The table below provides the default attribute mapping between SuccessFactors attributes listed above and AD/Azure AD attributes. In the Microsoft Entra provisioning app "Mapping" blade, you can modify this default mapping to include attributes from the list above.
117117

118118
| \# | SuccessFactors Entity | SuccessFactors Attribute | Default AD/Azure AD attribute mapping | Processing Remark |
119119
|----|----------------------------------------|--------------------------|-----------------------------------------|----------------------------------------------------------------------------------------------|

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 32 additions & 32 deletions
Large diffs are not rendered by default.

articles/active-directory/app-provisioning/scim-graph-scenarios.md

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Use SCIM, Microsoft Graph, and Azure Active Directory to provision users and enrich apps with data
3-
description: Using SCIM and the Microsoft Graph together to provision users and enrich your application with the data it needs in Azure Active Directory.
2+
title: Use SCIM, Microsoft Graph, and Microsoft Entra ID to provision users and enrich apps with data
3+
description: Using SCIM and the Microsoft Graph together to provision users and enrich your application with the data it needs in Microsoft Entra ID.
44
services: active-directory
55
author: kenwith
66
manager: amycolannino
@@ -16,27 +16,27 @@ ms.reviewer: arvinh
1616

1717
# Using SCIM and Microsoft Graph together to provision users and enrich your application with the data it needs
1818

19-
**Target audience:** This article is targeted towards developers building applications to be integrated with Azure Active Directory (Azure AD). If you're looking to use applications already integrated with Azure AD, such as Zoom, ServiceNow, and DropBox, you can skip this article and review the application specific [tutorials](../saas-apps/tutorial-list.md) or review [how the provisioning service works](./how-provisioning-works.md).
19+
**Target audience:** This article is targeted towards developers building applications to be integrated with Microsoft Entra ID. If you're looking to use applications already integrated with Microsoft Entra ID, such as Zoom, ServiceNow, and DropBox, you can skip this article and review the application specific [tutorials](../saas-apps/tutorial-list.md) or review [how the provisioning service works](./how-provisioning-works.md).
2020

2121
**Common scenarios**
2222

23-
Azure AD provides an out of the box service for provisioning and an extensible platform to build your applications on. The decision tree outlines how a developer would use [SCIM](https://aka.ms/scimoverview) and the [Microsoft Graph](/graph/overview) to automate provisioning.
23+
Microsoft Entra ID provides an out of the box service for provisioning and an extensible platform to build your applications on. The decision tree outlines how a developer would use [SCIM](https://aka.ms/scimoverview) and the [Microsoft Graph](/graph/overview) to automate provisioning.
2424

2525
> [!div class="checklist"]
2626
> * Automatically create users in my application
2727
> * Automatically remove users from my application when they shouldn't have access anymore
2828
> * Integrate my application with multiple identity providers for provisioning
2929
> * Enrich my application with data from Microsoft services such as Teams, Outlook, and Office.
30-
> * Automatically create, update, and delete users and groups in Azure AD and Active Directory
30+
> * Automatically create, update, and delete users and groups in Microsoft Entra ID and Active Directory
3131
3232
![SCIM Graph decision tree](./media/user-provisioning/scim-graph.png)
3333

3434
## Scenario 1: Automatically create users in my app
3535
Today, IT admins provision users by manually creating user accounts or periodically uploading CSV files into my application. The process is time consuming for customers and slows down adoption of my application. All I need is basic user information such as name, email, and userPrincipalName to create a user.
3636

3737
**Recommendation**:
38-
* If your customers use various IdPs and you do not want to maintain a sync engine to integrate with each, support a SCIM compliant [/Users](https://aka.ms/scimreferencecode) endpoint. Your customers will be able to easily use this endpoint to integrate with the Azure AD provisioning service and automatically create user accounts when they need access. You can build the endpoint once and it will be compatible with all IdPs. Check out the example request below for how a user would be created using SCIM.
39-
* If you require user data found on the user object in Azure AD and other data from across Microsoft, consider building a SCIM endpoint for user provisioning and calling into the Microsoft Graph to get the rest of the data.
38+
* If your customers use various IdPs and you do not want to maintain a sync engine to integrate with each, support a SCIM compliant [/Users](https://aka.ms/scimreferencecode) endpoint. Your customers will be able to easily use this endpoint to integrate with the Microsoft Entra provisioning service and automatically create user accounts when they need access. You can build the endpoint once and it will be compatible with all IdPs. Check out the example request below for how a user would be created using SCIM.
39+
* If you require user data found on the user object in Microsoft Entra ID and other data from across Microsoft, consider building a SCIM endpoint for user provisioning and calling into the Microsoft Graph to get the rest of the data.
4040

4141
```json
4242
POST /Users
@@ -62,7 +62,7 @@ POST /Users
6262
## Scenario 2: Automatically remove users from my app
6363
The customers using my application are security focused and have governance requirements to remove accounts when employees don't need them anymore. How can I automate deprovisioning from my application?
6464

65-
**Recommendation:** Support a SCIM compliant /Users endpoint. The Azure AD provisioning service will send requests to disable and delete when the user shouldn't have access anymore. We recommend supporting both disabling and deleting users. See the examples below for what a disable and delete request look like.
65+
**Recommendation:** Support a SCIM compliant /Users endpoint. The Microsoft Entra provisioning service will send requests to disable and delete when the user shouldn't have access anymore. We recommend supporting both disabling and deleting users. See the examples below for what a disable and delete request look like.
6666

6767
Disable user
6868
```json
@@ -86,16 +86,18 @@ DELETE /Users/5171a35d82074e068ce2 HTTP/1.1
8686
```
8787

8888
## Scenario 3: Automate managing group memberships in my app
89-
My application relies on groups for access to various resources, and customers want to reuse the groups that they have in Azure AD. How can I import groups from Azure AD and keep them updated as the memberships change?
89+
My application relies on groups for access to various resources, and customers want to reuse the groups that they have in Microsoft Entra ID. How can I import groups from Microsoft Entra ID and keep them updated as the memberships change?
9090

91-
**Recommendation:** Support a SCIM compliant /Groups [endpoint](https://aka.ms/scimreferencecode). The Azure AD provisioning service will take care of creating groups and managing membership updates in your application.
91+
**Recommendation:** Support a SCIM compliant /Groups [endpoint](https://aka.ms/scimreferencecode). The Microsoft Entra provisioning service will take care of creating groups and managing membership updates in your application.
9292

9393
## Scenario 4: Enrich my app with data from Microsoft services such as Teams, Outlook, and OneDrive
9494
My application is built into Microsoft Teams and relies on message data. In addition, we store files for users in OneDrive. How can I enrich my application with the data from these services and across Microsoft?
9595

9696
**Recommendation:** The [Microsoft Graph](/graph/) is your entry point to access Microsoft data. Each workload exposes APIs with the data that you need. The Microsoft graph can be used along with [SCIM provisioning](./use-scim-to-provision-users-and-groups.md) for the scenarios above. You can use SCIM to provision basic user attributes into your application while calling into graph to get any other data that you need.
9797

98-
## Scenario 5: Track changes in Microsoft services such as Teams, Outlook, and Azure AD
98+
<a name='scenario-5-track-changes-in-microsoft-services-such-as-teams-outlook-and-azure-ad'></a>
99+
100+
## Scenario 5: Track changes in Microsoft services such as Teams, Outlook, and Microsoft Entra ID
99101
I need to be able to track changes to Teams and Outlook messages and react to them in real time. How can I get these changes pushed to my application?
100102

101103
**Recommendation:** The Microsoft Graph provides [change notifications](/graph/webhooks) and [change tracking](/graph/delta-query-overview) for various resources. Note the following limitations of change notifications:
@@ -104,15 +106,17 @@ I need to be able to track changes to Teams and Outlook messages and react to th
104106
- Change notifications don't always contain the [resource data](/graph/webhooks-with-resource-data)
105107
For the reasons above, developers often use change notifications along with change tracking for synchronization scenarios.
106108

107-
## Scenario 6: Provision users and groups in Azure AD
108-
My application creates information about a user that customers need in Azure AD. This could be an HR application than manages hiring, a communications app that creates phone numbers for users, or some other app that generates data that would be valuable in Azure AD. How do I populate the user record in Azure AD with that data?
109+
<a name='scenario-6-provision-users-and-groups-in-azure-ad'></a>
110+
111+
## Scenario 6: Provision users and groups in Microsoft Entra ID
112+
My application creates information about a user that customers need in Microsoft Entra ID. This could be an HR application than manages hiring, a communications app that creates phone numbers for users, or some other app that generates data that would be valuable in Microsoft Entra ID. How do I populate the user record in Microsoft Entra ID with that data?
109113

110-
**Recommendation** The Microsoft graph exposes /Users and /Groups endpoints that you can integrate with today to provision users into Azure AD. Please note that Azure Active Directory doesn't support writing those users back into Active Directory.
114+
**Recommendation** The Microsoft graph exposes /Users and /Groups endpoints that you can integrate with today to provision users into Microsoft Entra ID. Please note that Microsoft Entra ID doesn't support writing those users back into Active Directory.
111115

112116
> [!NOTE]
113117
> Microsoft has a provisioning service that pulls in data from HR applications such as Workday and SuccessFactors. These integrations are built and managed by Microsoft. For onboarding a new HR application to our service, you can request it on [UserVoice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789).
114118
115119
## Related articles
116120

117121
- [Review the synchronization Microsoft Graph documentation](/graph/api/resources/synchronization-overview)
118-
- [Integrating a custom SCIM app with Azure AD](use-scim-to-provision-users-and-groups.md)
122+
- [Integrating a custom SCIM app with Microsoft Entra ID](use-scim-to-provision-users-and-groups.md)

articles/active-directory/app-provisioning/scim-validator-tutorial.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Tutorial - Test your SCIM endpoint for compatibility with the Azure Active Directory (Azure AD) provisioning service.
3-
description: This tutorial describes how to use the Azure AD SCIM Validator to validate that your provisioning server is compatible with the Azure SCIM client.
2+
title: Tutorial - Test your SCIM endpoint for compatibility with the Microsoft Entra provisioning service.
3+
description: This tutorial describes how to use the Microsoft Entra SCIM Validator to validate that your provisioning server is compatible with the Azure SCIM client.
44
author: kenwith
55
ms.author: kenwith
66
manager: amycolannino
@@ -16,7 +16,7 @@ ms.reviewer: arvinh
1616

1717
# Tutorial: Validate a SCIM endpoint
1818

19-
This tutorial describes how to use the Azure AD SCIM Validator to validate that your provisioning server is compatible with the Azure SCIM client. The tutorial is intended for developers who want to build a SCIM compatible server to manage their identities with the Azure AD provisioning service.
19+
This tutorial describes how to use the Microsoft Entra SCIM Validator to validate that your provisioning server is compatible with the Azure SCIM client. The tutorial is intended for developers who want to build a SCIM compatible server to manage their identities with the Microsoft Entra provisioning service.
2020

2121
In this tutorial, you learn how to:
2222

@@ -27,8 +27,8 @@ In this tutorial, you learn how to:
2727
2828
## Prerequisites
2929

30-
- An Azure Active Directory account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
31-
- A SCIM endpoint that conforms to the SCIM 2.0 standard and meets the provision service requirements. To learn more, see [Tutorial: Develop and plan provisioning for a SCIM endpoint in Azure Active Directory](use-scim-to-provision-users-and-groups.md).
30+
- A Microsoft Entra account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
31+
- A SCIM endpoint that conforms to the SCIM 2.0 standard and meets the provision service requirements. To learn more, see [Tutorial: Develop and plan provisioning for a SCIM endpoint in Microsoft Entra ID](use-scim-to-provision-users-and-groups.md).
3232

3333

3434
## Select a testing method
@@ -43,7 +43,7 @@ The first step is to select a testing method to validate your SCIM endpoint.
4343

4444
**Discover schema** - If your end point supports /Schema, this option lets the tool discover the supported attributes. We recommend this option as it reduces the overhead of updating your app as you build it out.
4545

46-
**Upload Azure AD Schema** - Upload the schema you've downloaded from your sample app on Azure AD.
46+
**Upload Microsoft Entra Schema** - Upload the schema you've downloaded from your sample app on Microsoft Entra ID.
4747

4848

4949
## Configure the testing method
@@ -80,7 +80,7 @@ In addition to using the SCIM Validator tool, you can also use Postman to valida
8080
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *ControllerConstant.cs* in **AzureADProvisioningSCIMreference** > **ScimReferenceApi** > **Controllers**.
8181

8282
> [!NOTE]
83-
> You can only use HTTP endpoints for local tests. The Azure AD provisioning service requires that your endpoint support HTTPS.
83+
> You can only use HTTP endpoints for local tests. The Microsoft Entra provisioning service requires that your endpoint support HTTPS.
8484
8585
1. Download [Postman](https://www.postman.com/downloads/) and start the application.
8686
1. Copy and paste this link into Postman to import the test collection: `https://aka.ms/ProvisioningPostman`.
@@ -117,7 +117,9 @@ That's it! You can now run the **Postman** collection to test the SCIM endpoint
117117

118118
If you created any Azure resources in your testing that are no longer needed, don't forget to delete them.
119119

120-
## Known Issues with Azure AD SCIM Validator
120+
<a name='known-issues-with-azure-ad-scim-validator'></a>
121+
122+
## Known Issues with Microsoft Entra SCIM Validator
121123

122124
- Soft deletes (disables) aren’t yet supported.
123125
- The time zone format is randomly generated and fails for systems that try to validate it.
@@ -126,4 +128,4 @@ If you created any Azure resources in your testing that are no longer needed, do
126128

127129

128130
## Next steps
129-
- [Learn how to add an app that's not in the Azure AD app gallery](../manage-apps/overview-application-gallery.md)
131+
- [Learn how to add an app that's not in the Microsoft Entra app gallery](../manage-apps/overview-application-gallery.md)

0 commit comments

Comments
 (0)