Skip to content

Commit 95eb802

Browse files
committed
updating
1 parent e6ecae1 commit 95eb802

File tree

2 files changed

+27
-33
lines changed

2 files changed

+27
-33
lines changed
27.4 KB
Loading

articles/active-directory/cloud-sync/tutorial-pilot-aadc-aadccp.md

Lines changed: 27 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ The following are prerequisites required for completing this tutorial
4949

5050
- A test environment with Azure AD Connect sync version 1.4.32.0 or later
5151
- An OU or group that is in scope of sync and can be used the pilot. We recommend starting with a small set of objects.
52-
- A server running Windows Server 2012 R2 or later that will host the provisioning agent.
52+
- A server running Windows Server 2016 or later that will host the provisioning agent.
5353
- Source anchor for Azure AD Connect sync should be either *objectGuid* or *ms-ds-consistencyGUID*
5454

5555
## Update Azure AD Connect
@@ -71,6 +71,7 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
7171
>If you are running your own custom scheduler for Azure AD Connect sync, then please disable the scheduler.
7272
7373
## Create custom user inbound rule
74+
In the Azure AD Connect Synchronization Rules editor, you need to create an inbound sync rule that filters out users in the OU you identified previously. The inbound sync rule is a join rule with a target attribute of cloudNoFlow. This rule tells Azure AD Connect not to synchronize attributes for these users. For more information, see [Migrating to cloud sync](migrate-azure-ad-connect-to-cloud-sync.md) documentation before attempting to migrate your production environment.
7475

7576
1. Launch the synchronization editor from the application menu in desktop as shown below:
7677

@@ -110,6 +111,7 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
110111
Same steps need to be followed for all object types (user, group and contact). Repeat steps per configured AD Connector / per AD forest.
111112

112113
## Create custom user outbound rule
114+
You'll also need an outbound sync rule with a link type of JoinNoFlow and the scoping filter that has the cloudNoFlow attribute set to True. This rule tells Azure AD Connect not to synchronize attributes for these users. For more information, see [Migrating to cloud sync](migrate-azure-ad-connect-to-cloud-sync.md) documentation before attempting to migrate your production environment.
113115

114116
1. Select **Outbound** from the drop-down list for Direction and select **Add rule**.
115117

@@ -151,46 +153,38 @@ If you're using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md
151153

152154
Use the following steps to configure provisioning:
153155

154-
1. Sign-in to the Azure AD portal.
155-
2. Select **Azure Active Directory**
156-
3. Select **Azure AD Connect**
157-
4. Select **Manage cloud sync**
158-
159-
![Screenshot showing "Manage cloud sync" link.](media/how-to-configure/manage-1.png)
160-
161-
5. Select **New Configuration**
162-
163-
![Screenshot of Azure AD Connect cloud sync screen with "New configuration" link highlighted.](media/tutorial-single-forest/configure-1.png)
164-
165-
6. On the configuration screen, enter a **Notification email**, move the selector to **Enable** and select **Save**.
166-
167-
![Screenshot of Configure screen with Notification email filled in and Enable selected.](media/tutorial-single-forest/configure-2.png)
156+
1. In the Azure portal, select **Azure Active Directory**.
157+
2. On the left, select **Azure AD Connect**.
158+
3. On the left, select **Cloud sync**.
159+
160+
:::image type="content" source="media/how-to-on-demand-provision/new-ux-1.png" alt-text="Screenshot of new UX screen." lightbox="media/how-to-on-demand-provision/new-ux-1.png":::
161+
162+
4. Select **New configuration**.
163+
:::image type="content" source="media/how-to-configure/new-ux-configure-1.png" alt-text="Screenshot of adding a configuration." lightbox="media/how-to-configure/new-ux-configure-1.png":::
164+
5. On the configuration screen, select your domain and whether to enable password hash sync. Click **Create**.
165+
166+
:::image type="content" source="media/how-to-configure/new-ux-configure-2.png" alt-text="Screenshot of a new configuration." lightbox="media/how-to-configure/new-ux-configure-2.png":::
168167

169-
7. Under **Configure**, select **All users** to change the scope of the configuration rule.
168+
6. The **Get started** screen will open.
170169

171-
![Screenshot of Configure screen with "All users" highlighted next to "Scope users".](media/how-to-configure/scope-2.png)
172-
173-
8. On the right, change the scope to include the specific OU you created "OU=CPUsers,DC=contoso,DC=com".
170+
:::image type="content" source="media/how-to-configure/new-ux-configure-3.png" alt-text="Screenshot of the getting started screen." lightbox="media/how-to-configure/new-ux-configure-3.png":::
174171

175-
![Screenshot of the Scope users screen highlighting the scope changed to the OU you created.](media/tutorial-existing-forest/scope-2.png)
176-
177-
9. Select **Done** and **Save**.
178-
10. The scope should now be set to one organizational unit.
172+
7. On the **Get started** screen, click either **Add scoping filters** next to the **Add scoping filters** icon or on the click **Scoping filters** on the left under **Manage**.
179173

180-
![Screenshot of Configure screen with "1 organizational unit" highlighted next to "Scope users".](media/tutorial-existing-forest/scope-3.png)
174+
:::image type="content" source="media/how-to-configure/new-ux-configure-5.png" alt-text="Screenshot of scoping filters." lightbox="media/how-to-configure/new-ux-configure-5.png":::
175+
176+
8. Select the scoping filter. For this tutorial select:
177+
- **Selected organizational units**: Scopes the configuration to apply to specific OUs.
178+
9. In the box, enter "OU=CPUsers,DC=contoso,DC=com".
179+
180+
:::image type="content" source="media/tutorial-migrate-aadc-aadccp/configure-1.png" alt-text="Screenshot of the scoping filter." lightbox="media/tutorial-migrate-aadc-aadccp/configure-1.png":::
181+
182+
10. Click **Add**. Click **Save**.
181183

182-
## Verify users are provisioned by cloud sync
183184

184-
You'll now verify that the users that you had in our on-premises directory have been synchronized and now exist in out Azure AD tenant. This process may take a few hours to complete. To verify users are provisioning by cloud sync, follow these steps:
185185

186-
1. Browse to the [Azure portal](https://portal.azure.com) and sign in with an account that has an Azure subscription.
187-
2. On the left, select **Azure Active Directory**
188-
3. Select on **Azure AD Connect**
189-
4. Select on **Manage cloud sync**
190-
5. Select on **Logs** button
191-
6. Search for a username to confirm that the user is provisioned by cloud sync
192186

193-
Additionally, you can verify that the user and group exist in Azure AD.
187+
194188

195189
## Start the scheduler
196190

0 commit comments

Comments
 (0)