You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/how-provisioning-works.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,13 +74,13 @@ You can use scoping filters to define attribute-based rules that determine which
74
74
75
75
### B2B (guest) users
76
76
77
-
It's possible to use the Azure AD user provisioning service to provision B2B (or guest) users in Azure AD to SaaS applications.
77
+
It's possible to use the Azure AD user provisioning service to provision B2B (guest) users in Azure AD to SaaS applications.
78
78
However, for B2B users to sign in to the SaaS application using Azure AD, the SaaS application must have its SAML-based single sign-on capability configured in a specific way. For more information on how to configure SaaS applications to support sign-ins from B2B users, see [Configure SaaS apps for B2B collaboration](../external-identities/configure-saas-apps.md).
79
79
80
80
> [!NOTE]
81
-
> The userPrincipalName for a guest user is often displayed as "alias#EXT#@domain.com". When the userPrincipalName is included in your attribute mappings as a source attribute, the #EXT# is stripped from the userPrincipalName. If you require the #EXT# to be present, replace userPrincipalName with originalUserPrincipalName as the source attribute.
82
-
userPrincipalName = alias@domain.com
83
-
originalUserPrincipalName = alias#EXT#@domain.com
81
+
> The userPrincipalName for a B2B user represents the external user's email address alias@theirdomain as "alias_theirdomain#EXT#@yourdomain". When the userPrincipalName attribute is included in your attribute mappings as a source attribute, and a B2B user is being provisioned, the #EXT# and your domain is stripped from the userPrincipalName, so only their original alias@theirdomain is used for matching or provisioning. If you require the full user principal name including #EXT# and your domain to be present, replace userPrincipalName with originalUserPrincipalName as the source attribute. <br />
Copy file name to clipboardExpand all lines: articles/active-directory/governance/identity-governance-applications-existing-users.md
+36-8Lines changed: 36 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -226,25 +226,30 @@ The first time your organization uses these cmdlets for this scenario, you need
226
226
227
227
1. Retrieve the IDs of those users in Azure AD.
228
228
229
-
The following PowerShell script uses the `$dbusers`, `$db_match_column_name`, and `$azuread_match_attr_name` values specified earlier. It will query Azure AD to locate a user that has a matching value for each record in the source file. If there are many users in the database, this script might take several minutes to finish.
229
+
The following PowerShell script uses the `$dbusers`, `$db_match_column_name`, and `$azuread_match_attr_name` values specified earlier. It will query Azure AD to locate a user that has an attribute with a matching value for each record in the source file. If there are many users in the database, this script might take several minutes to finish. If you don't have an attribute in Azure AD that has the value, and need to use a `contains` or other filter expression, then you will need to customize this script and that in step 11 below to use a different filter expression.
230
230
231
231
```powershell
232
232
$dbu_not_queried_list = @()
233
233
$dbu_not_matched_list = @()
234
234
$dbu_match_ambiguous_list = @()
235
235
$dbu_query_failed_list = @()
236
236
$azuread_match_id_list = @()
237
+
$azuread_not_enabled_list = @()
238
+
$dbu_values = @()
239
+
$dbu_duplicate_list = @()
237
240
238
241
foreach ($dbu in $dbusers) {
239
242
if ($null -ne $dbu.$db_match_column_name -and $dbu.$db_match_column_name.Length -gt 0) {
@@ -284,7 +297,7 @@ The first time your organization uses these cmdlets for this scenario, you need
284
297
285
298
For example, someone's email address might have been changed in Azure AD without their corresponding `mail` property being updated in the application's data source. Or, the user might have already left the organization but is still in the application's data source. Or there might be a vendor or super-admin account in the application's data source that does not correspond to any specific person in Azure AD.
286
299
287
-
1. If there were users who couldn't be located in Azure AD, but you want to have their access reviewed or their attributes updated in the database, you need to create Azure AD users for them. You can create users in bulk by using either:
300
+
1. If there were users who couldn't be located in Azure AD, or weren't active and able to sign in, but you want to have their access reviewed or their attributes updated in the database, you need to update or create Azure AD users for them. You can create users in bulk by using either:
288
301
289
302
- A CSV file, as described in [Bulk create users in the Azure AD portal](../enterprise-users/users-bulk-add.md)
290
303
- The [New-MgUser](/powershell/module/microsoft.graph.users/new-mguser?view=graph-powershell-1.0#examples) cmdlet
@@ -299,17 +312,22 @@ The first time your organization uses these cmdlets for this scenario, you need
299
312
$dbu_match_ambiguous_list = @()
300
313
$dbu_query_failed_list = @()
301
314
$azuread_match_id_list = @()
315
+
$azuread_not_enabled_list = @()
316
+
$dbu_values = @()
317
+
$dbu_duplicate_list = @()
302
318
303
319
foreach ($dbu in $dbusers) {
304
320
if ($null -ne $dbu.$db_match_column_name -and $dbu.$db_match_column_name.Length -gt 0) {
@@ -465,6 +491,8 @@ When an application role assignment is created in Azure AD for a user to an appl
465
491
466
492
If you don't see users being provisioned, check the [troubleshooting guide for no users being provisioned](../app-provisioning/application-provisioning-config-problem-no-users-provisioned.md). If you see an error in the provisioning status and are provisioning to an on-premises application, check the [troubleshooting guide for on-premises application provisioning](../app-provisioning/on-premises-ecma-troubleshoot.md).
467
493
494
+
1. Check the [provisioning log](../reports-monitoring/concept-provisioning-logs.md). Filter the log to the status **Failure**. If there are failures with an ErrorCode of **DuplicateTargetEntries**, this indicates an ambiguity in your provisioning matching rules, and you'll need to update the Azure AD users or the mappings that are used for matching to ensure each Azure AD user matches one application user. Then filter the log to the action **Create** and status **Skipped**. If users were skipped with the SkipReason code of **NotEffectivelyEntitled**, this may indicate that the user accounts in Azure AD were not matched because the user account status was **Disabled**.
495
+
468
496
After the Azure AD provisioning service has matched the users based on the application role assignments you've created, subsequent changes will be sent to the application.
Copy file name to clipboardExpand all lines: articles/active-directory/roles/permissions-reference.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ This article lists the Azure AD built-in roles you can assign to allow managemen
43
43
> |[B2C IEF Keyset Administrator](#b2c-ief-keyset-administrator)| Can manage secrets for federation and encryption in the Identity Experience Framework (IEF). | aaf43236-0c0d-4d5f-883a-6955382ac081 |
44
44
> |[B2C IEF Policy Administrator](#b2c-ief-policy-administrator)| Can create and manage trust framework policies in the Identity Experience Framework (IEF). | 3edaf663-341e-4475-9f94-5c398ef6c070 |
45
45
> |[Billing Administrator](#billing-administrator)| Can perform common billing related tasks like updating payment information. | b0f54661-2d74-4c50-afa3-1ec803f12efe |
46
-
> |[Cloud App Security Administrator](#cloud-app-security-administrator)| Can manage all aspects of the Cloud App Security product. | 892c5842-a9a6-463a-8041-72aa08ca3cf6 |
46
+
> |[Cloud App Security Administrator](#cloud-app-security-administrator)| Can manage all aspects of the Defender for Cloud Apps product. | 892c5842-a9a6-463a-8041-72aa08ca3cf6 |
47
47
> |[Cloud Application Administrator](#cloud-application-administrator)| Can create and manage all aspects of app registrations and enterprise apps except App Proxy. | 158c047a-c907-4556-b7ef-446551a6b5f7 |
48
48
> |[Cloud Device Administrator](#cloud-device-administrator)| Limited access to manage devices in Azure AD. | 7698a772-787b-4ac8-901f-60d6b08affd2 |
49
49
> |[Compliance Administrator](#compliance-administrator)| Can read and manage compliance configuration and reports in Azure AD and Microsoft 365. | 17315797-102d-40b4-93e0-432062caca18 |
@@ -450,12 +450,12 @@ Makes purchases, manages subscriptions, manages support tickets, and monitors se
450
450
451
451
## Cloud App Security Administrator
452
452
453
-
Users with this role have full permissions in Cloud App Security. They can add administrators, add Microsoft Cloud App Security (MCAS) policies and settings, upload logs, and perform governance actions.
453
+
Users with this role have full permissions in Defender for Cloud Apps. They can add administrators, add Microsoft Defender for Cloud Apps policies and settings, upload logs, and perform governance actions.
454
454
455
455
> [!div class="mx-tableFixed"]
456
456
> | Actions | Description |
457
457
> | --- | --- |
458
-
> | microsoft.directory/cloudAppSecurity/allProperties/allTasks | Create and delete all resources, and read and update standard properties in Microsoft Cloud App Security|
458
+
> | microsoft.directory/cloudAppSecurity/allProperties/allTasks | Create and delete all resources, and read and update standard properties in Microsoft Defender for Cloud Apps|
459
459
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
460
460
461
461
## Cloud Application Administrator
@@ -590,7 +590,7 @@ In | Can do
590
590
> | Actions | Description |
591
591
> | --- | --- |
592
592
> | microsoft.directory/authorizationPolicy/standard/read | Read standard properties of authorization policy |
593
-
> | microsoft.directory/cloudAppSecurity/allProperties/allTasks | Create and delete all resources, and read and update standard properties in Microsoft Cloud App Security|
593
+
> | microsoft.directory/cloudAppSecurity/allProperties/allTasks | Create and delete all resources, and read and update standard properties in Microsoft Defender for Cloud Apps|
594
594
> | microsoft.azure.informationProtection/allEntities/allTasks | Manage all aspects of Azure Information Protection |
595
595
> | microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health |
596
596
> | microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets |
@@ -928,7 +928,7 @@ Users with this role have access to all administrative features in Azure Active
928
928
> | microsoft.directory/users/authenticationMethods/basic/update | Update basic properties of authentication methods for users |
929
929
> | microsoft.directory/authorizationPolicy/allProperties/allTasks | Manage all aspects of authorization policy |
930
930
> | microsoft.directory/bitlockerKeys/key/read | Read bitlocker metadata and key on devices |
931
-
> | microsoft.directory/cloudAppSecurity/allProperties/allTasks | Create and delete all resources, and read and update standard properties in Microsoft Cloud App Security|
931
+
> | microsoft.directory/cloudAppSecurity/allProperties/allTasks | Create and delete all resources, and read and update standard properties in Microsoft Defender for Cloud Apps|
> | microsoft.directory/connectors/allProperties/read | Read all properties of application proxy connectors |
934
934
> | microsoft.directory/connectorGroups/create | Create application proxy connector groups |
@@ -1087,7 +1087,7 @@ Users in this role can read settings and administrative information across Micro
1087
1087
> | microsoft.directory/users/authenticationMethods/standard/restrictedRead | Read standard properties of authentication methods that do not include personally identifiable information for users |
1088
1088
> | microsoft.directory/authorizationPolicy/standard/read | Read standard properties of authorization policy |
1089
1089
> | microsoft.directory/bitlockerKeys/key/read | Read bitlocker metadata and key on devices |
1090
-
> | microsoft.directory/cloudAppSecurity/allProperties/read | Read all properties for Cloud app security|
1090
+
> | microsoft.directory/cloudAppSecurity/allProperties/read | Read all properties for Defender for Cloud Apps|
1091
1091
> | microsoft.directory/connectors/allProperties/read | Read all properties of application proxy connectors |
1092
1092
> | microsoft.directory/connectorGroups/allProperties/read | Read all properties of application proxy connector groups |
1093
1093
> | microsoft.directory/contacts/allProperties/read | Read all properties for contacts |
0 commit comments