Skip to content

Commit a317e70

Browse files
authored
Merge pull request #111911 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents d791f8f + f03b03a commit a317e70

File tree

151 files changed

+2072
-1292
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

151 files changed

+2072
-1292
lines changed

.openpublishing.redirection.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33548,8 +33548,13 @@
3354833548
},
3354933549
{
3355033550
"source_path": "articles/active-directory/pim-azure-resource.md",
33551-
"redirect_url": "/azure/role-based-access-control/pim-azure-resource",
33552-
"redirect_document_id": true
33551+
"redirect_url": "/azure/role-based-access-control/best-practices",
33552+
"redirect_document_id": false
33553+
},
33554+
{
33555+
"source_path": "articles/role-based-access-control/pim-azure-resource.md",
33556+
"redirect_url": "/azure/role-based-access-control/best-practices",
33557+
"redirect_document_id": false
3355333558
},
3355433559
{
3355533560
"source_path": "articles/active-directory/role-based-access-control-resource-provider-operations.md",

articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: No users are being provisioned to an Azure AD Gallery application
2+
title: Users are not being provisioned in my application
33
description: How to troubleshoot common issues faced when you don't see users appearing in an Azure AD Gallery Application you have configured for user provisioning with Azure AD
44
services: active-directory
55
documentationcenter: ''
@@ -12,19 +12,23 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: conceptual
15-
ms.date: 09/03/2019
15+
ms.date: 04/20/2020
1616
ms.author: mimart
1717
ms.reviewer: arvinh
1818
ms.collection: M365-identity-device-management
1919
---
2020

21-
# No users are being provisioned to an Azure AD Gallery application
21+
# No users are being provisioned
22+
>[!NOTE]
23+
>Starting 04/16/2020 we have changed the behavior for users assigned the default access role. Please see the section below for details.
24+
>
2225
After automatic provisioning has been configured for an application (including verifying that the app credentials provided to Azure AD to connect to the app are valid), then users and/or groups are provisioned to the app. Provisioning is determined by the following things:
2326

2427
- Which users and groups have been **assigned** to the application. Note that provisioning nested groups or Office 365 groups is not supported. For more information on assignment, see [Assign a user or group to an enterprise app in Azure Active Directory](../manage-apps/assign-user-or-group-access-portal.md).
2528
- Whether or not **attribute mappings** are enabled, and configured to sync valid attributes from Azure AD to the app. For more information on attribute mappings, see [Customizing User Provisioning Attribute Mappings for SaaS Applications in Azure Active Directory](customize-application-attributes.md).
2629
- Whether or not there is a **scoping filter** present that is filtering users based on specific attribute values. For more information on scoping filters, see [Attribute-based application provisioning with scoping filters](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
2730

31+
2832
If you observe that users are not being provisioned, consult the [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) in Azure AD. Search for log entries for a specific user.
2933

3034
You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs (preview)** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
@@ -53,7 +57,16 @@ When a user shows up as “skipped” in the provisioning logs, it is important
5357
- **The user is “not effectively entitled”.** If you see this specific error message, it is because there is a problem with the user assignment record stored in Azure AD. To fix this issue, unassign the user (or group) from the app, and reassign it again. For more information on assignment, see [Assign user or group access](../manage-apps/assign-user-or-group-access-portal.md).
5458
- **A required attribute is missing or not populated for a user.** An important thing to consider when setting up provisioning is to review and configure the attribute mappings and workflows that define which user (or group) properties flow from Azure AD to the application. This configuration includes setting the “matching property” that is used to uniquely identify and match users/groups between the two systems. For more information on this important process, see [Customizing User Provisioning Attribute Mappings for SaaS Applications in Azure Active Directory](customize-application-attributes.md).
5559
- **Attribute mappings for groups:** Provisioning of the group name and group details, in addition to the members, if supported for some applications. You can enable or disable this functionality by enabling or disabling the **Mapping** for group objects shown in the **Provisioning** tab. If provisioning groups is enabled, be sure to review the attribute mappings to ensure an appropriate field is being used for the “matching ID”. The matching ID can be the display name or email alias. The group and its members are not provisioned if the matching property is empty or not populated for a group in Azure AD.
60+
## Provisioning users assigned to the default access role
61+
The default role on an application from the gallery is called the "default access" role. Historically, users assigned to this role are not provisioned and are marked as skipped in the [provisioning logs](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-provisioning-logs) due to being "not effectively entitled."
62+
63+
**Behavior for provisioning configurations created after 04/16/2020:**
64+
Users assigned to the default access role will be evaluated the same as all other roles. A user that is assigned the default access will not be skipped as "not effectively entitled."
65+
66+
**Behavior for provisioning configurations created before 04/16/2020:**
67+
For the next 3 months, the behavior will continue as it is today. Users with the default access role will be skipped as not effectively entitled. After July 2020, the behavior will be uniform for all applications. We will not skip provisioning users with the default access role due to being "not effectively entitled." This change will be made by Microsoft, with no customer action required. If you would like to ensure that these users continue to be skipped, even after this change, please apply the appropriate scoping filters or unassign the user from the application to ensure they are out of scope.
5668

69+
For questions about these changes, please reach out to [email protected]
5770
## Next steps
5871

5972
[Azure AD Connect sync: Understanding Declarative Provisioning](../hybrid/concept-azure-ad-connect-sync-declarative-provisioning.md)

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 02/19/2020
13+
ms.date: 04/17/2020
1414
ms.author: ryanwi
1515
ms.custom: aaddev, identityplatformtop40
1616
ms.reviewer: hirsin, jlu, annaba
@@ -240,19 +240,25 @@ In this example, you create a policy that lets your users' sign in less frequent
240240
}')
241241
```
242242
243-
2. To create the policy, run the following command:
243+
1. To create the policy, run the following command:
244244
245245
```powershell
246246
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1, "MaxAgeSingleFactor":"until-revoked"}}') -DisplayName "OrganizationDefaultPolicyScenario" -IsOrganizationDefault $true -Type "TokenLifetimePolicy"
247247
```
248248
249-
3. To see your new policy, and to get the policy's **ObjectId**, run the following command:
249+
1. To remove any whitespace, run the following command:
250+
251+
```powershell
252+
Get-AzureADPolicy -id | set-azureadpolicy -Definition @($((Get-AzureADPolicy -id ).Replace(" ","")))
253+
```
254+
255+
1. To see your new policy, and to get the policy's **ObjectId**, run the following command:
250256
251257
```powershell
252258
Get-AzureADPolicy -Id $policy.Id
253259
```
254260
255-
2. Update the policy.
261+
1. Update the policy.
256262
257263
You might decide that the first policy you set in this example is not as strict as your service requires. To set your Single-Factor Refresh Token to expire in two days, run the following command:
258264
@@ -274,21 +280,21 @@ In this example, you create a policy that requires users to authenticate more fr
274280
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"AccessTokenLifetime":"02:00:00","MaxAgeSessionSingleFactor":"02:00:00"}}') -DisplayName "WebPolicyScenario" -IsOrganizationDefault $false -Type "TokenLifetimePolicy"
275281
```
276282
277-
2. To see your new policy, and to get the policy **ObjectId**, run the following command:
283+
1. To see your new policy, and to get the policy **ObjectId**, run the following command:
278284
279285
```powershell
280286
Get-AzureADPolicy -Id $policy.Id
281287
```
282288
283-
2. Assign the policy to your service principal. You also need to get the **ObjectId** of your service principal.
289+
1. Assign the policy to your service principal. You also need to get the **ObjectId** of your service principal.
284290
285291
1. Use the [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal) cmdlet to see all your organization's service principals or a single service principal.
286292
```powershell
287293
# Get ID of the service principal
288294
$sp = Get-AzureADServicePrincipal -Filter "DisplayName eq '<service principal display name>'"
289295
```
290296
291-
2. When you have the service principal, run the following command:
297+
1. When you have the service principal, run the following command:
292298
```powershell
293299
# Assign policy to a service principal
294300
Add-AzureADServicePrincipalPolicy -Id $sp.ObjectId -RefObjectId $policy.Id
@@ -305,13 +311,13 @@ In this example, you create a policy that requires users to authenticate less fr
305311
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"MaxInactiveTime":"30.00:00:00","MaxAgeMultiFactor":"until-revoked","MaxAgeSingleFactor":"180.00:00:00"}}') -DisplayName "WebApiDefaultPolicyScenario" -IsOrganizationDefault $false -Type "TokenLifetimePolicy"
306312
```
307313
308-
2. To see your new policy, run the following command:
314+
1. To see your new policy, run the following command:
309315
310316
```powershell
311317
Get-AzureADPolicy -Id $policy.Id
312318
```
313319
314-
2. Assign the policy to your web API. You also need to get the **ObjectId** of your application. Use the [Get-AzureADApplication](/powershell/module/azuread/get-azureadapplication) cmdlet to find your app's **ObjectId**, or use the [Azure portal](https://portal.azure.com/).
320+
1. Assign the policy to your web API. You also need to get the **ObjectId** of your application. Use the [Get-AzureADApplication](/powershell/module/azuread/get-azureadapplication) cmdlet to find your app's **ObjectId**, or use the [Azure portal](https://portal.azure.com/).
315321
316322
Get the **ObjectId** of your app and assign the policy:
317323
@@ -334,19 +340,19 @@ In this example, you create a few policies to learn how the priority system work
334340
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"MaxAgeSingleFactor":"30.00:00:00"}}') -DisplayName "ComplexPolicyScenario" -IsOrganizationDefault $true -Type "TokenLifetimePolicy"
335341
```
336342
337-
2. To see your new policy, run the following command:
343+
1. To see your new policy, run the following command:
338344
339345
```powershell
340346
Get-AzureADPolicy -Id $policy.Id
341347
```
342348
343-
2. Assign the policy to a service principal.
349+
1. Assign the policy to a service principal.
344350
345351
Now, you have a policy that applies to the entire organization. You might want to preserve this 30-day policy for a specific service principal, but change the organization default policy to the upper limit of "until-revoked."
346352
347353
1. To see all your organization's service principals, you use the [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal) cmdlet.
348354
349-
2. When you have the service principal, run the following command:
355+
1. When you have the service principal, run the following command:
350356
351357
```powershell
352358
# Get ID of the service principal
@@ -356,13 +362,13 @@ In this example, you create a few policies to learn how the priority system work
356362
Add-AzureADServicePrincipalPolicy -Id $sp.ObjectId -RefObjectId $policy.Id
357363
```
358364
359-
3. Set the `IsOrganizationDefault` flag to false:
365+
1. Set the `IsOrganizationDefault` flag to false:
360366
361367
```powershell
362368
Set-AzureADPolicy -Id $policy.Id -DisplayName "ComplexPolicyScenario" -IsOrganizationDefault $false
363369
```
364370
365-
4. Create a new organization default policy:
371+
1. Create a new organization default policy:
366372
367373
```powershell
368374
New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"MaxAgeSingleFactor":"until-revoked"}}') -DisplayName "ComplexPolicyScenarioTwo" -IsOrganizationDefault $true -Type "TokenLifetimePolicy"

articles/active-directory/managed-identities-azure-resources/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -136,13 +136,13 @@
136136
- name: Java
137137
href: https://github.com/Azure/azure-libraries-for-java#ready-to-run-code-samples-for-virtual-machines
138138
- name: Python
139-
href: /python/api/azure.mgmt.msi
139+
href: https://docs.microsoft.com/windows/python/
140140
- name: Ruby
141141
href: https://rubygems.org/gems/azure_mgmt_msi
142142
- name: Node.js
143-
href: /javascript/api/ms-rest-azure
143+
href: https://nodejs.org/en/docs/
144144
- name: Go
145-
href: https://godoc.org/github.com/Azure/azure-sdk-for-go/services/msi/mgmt/2015-08-31-preview/msi
145+
href: https://golang.org/doc/
146146

147147
- name: Resources
148148
items:

articles/active-directory/managed-identities-azure-resources/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
1212
ms.devlang:
1313
ms.topic: overview
1414
ms.custom: mvc
15-
ms.date: 03/25/2020
15+
ms.date: 04/18/2020
1616
ms.author: markvi
1717

1818
#As a developer, I'd like to securely manage the credentials that my application uses for authenticating to cloud services without having the credentials in my code or checked into source control.

0 commit comments

Comments
 (0)