You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md
+16-3Lines changed: 16 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: No users are being provisioned to an Azure AD Gallery application
2
+
title: Users are not being provisioned in my application
3
3
description: How to troubleshoot common issues faced when you don't see users appearing in an Azure AD Gallery Application you have configured for user provisioning with Azure AD
4
4
services: active-directory
5
5
documentationcenter: ''
@@ -12,19 +12,23 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: conceptual
15
-
ms.date: 09/03/2019
15
+
ms.date: 04/20/2020
16
16
ms.author: mimart
17
17
ms.reviewer: arvinh
18
18
ms.collection: M365-identity-device-management
19
19
---
20
20
21
-
# No users are being provisioned to an Azure AD Gallery application
21
+
# No users are being provisioned
22
+
>[!NOTE]
23
+
>Starting 04/16/2020 we have changed the behavior for users assigned the default access role. Please see the section below for details.
24
+
>
22
25
After automatic provisioning has been configured for an application (including verifying that the app credentials provided to Azure AD to connect to the app are valid), then users and/or groups are provisioned to the app. Provisioning is determined by the following things:
23
26
24
27
- Which users and groups have been **assigned** to the application. Note that provisioning nested groups or Office 365 groups is not supported. For more information on assignment, see [Assign a user or group to an enterprise app in Azure Active Directory](../manage-apps/assign-user-or-group-access-portal.md).
25
28
- Whether or not **attribute mappings** are enabled, and configured to sync valid attributes from Azure AD to the app. For more information on attribute mappings, see [Customizing User Provisioning Attribute Mappings for SaaS Applications in Azure Active Directory](customize-application-attributes.md).
26
29
- Whether or not there is a **scoping filter** present that is filtering users based on specific attribute values. For more information on scoping filters, see [Attribute-based application provisioning with scoping filters](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
27
30
31
+
28
32
If you observe that users are not being provisioned, consult the [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) in Azure AD. Search for log entries for a specific user.
29
33
30
34
You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory**>**Enterprise Apps**>**Provisioning logs (preview)** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
@@ -53,7 +57,16 @@ When a user shows up as “skipped” in the provisioning logs, it is important
53
57
-**The user is “not effectively entitled”.** If you see this specific error message, it is because there is a problem with the user assignment record stored in Azure AD. To fix this issue, unassign the user (or group) from the app, and reassign it again. For more information on assignment, see [Assign user or group access](../manage-apps/assign-user-or-group-access-portal.md).
54
58
-**A required attribute is missing or not populated for a user.** An important thing to consider when setting up provisioning is to review and configure the attribute mappings and workflows that define which user (or group) properties flow from Azure AD to the application. This configuration includes setting the “matching property” that is used to uniquely identify and match users/groups between the two systems. For more information on this important process, see [Customizing User Provisioning Attribute Mappings for SaaS Applications in Azure Active Directory](customize-application-attributes.md).
55
59
-**Attribute mappings for groups:** Provisioning of the group name and group details, in addition to the members, if supported for some applications. You can enable or disable this functionality by enabling or disabling the **Mapping** for group objects shown in the **Provisioning** tab. If provisioning groups is enabled, be sure to review the attribute mappings to ensure an appropriate field is being used for the “matching ID”. The matching ID can be the display name or email alias. The group and its members are not provisioned if the matching property is empty or not populated for a group in Azure AD.
60
+
## Provisioning users assigned to the default access role
61
+
The default role on an application from the gallery is called the "default access" role. Historically, users assigned to this role are not provisioned and are marked as skipped in the [provisioning logs](https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-provisioning-logs) due to being "not effectively entitled."
62
+
63
+
**Behavior for provisioning configurations created after 04/16/2020:**
64
+
Users assigned to the default access role will be evaluated the same as all other roles. A user that is assigned the default access will not be skipped as "not effectively entitled."
65
+
66
+
**Behavior for provisioning configurations created before 04/16/2020:**
67
+
For the next 3 months, the behavior will continue as it is today. Users with the default access role will be skipped as not effectively entitled. After July 2020, the behavior will be uniform for all applications. We will not skip provisioning users with the default access role due to being "not effectively entitled." This change will be made by Microsoft, with no customer action required. If you would like to ensure that these users continue to be skipped, even after this change, please apply the appropriate scoping filters or unassign the user from the application to ensure they are out of scope.
56
68
69
+
For questions about these changes, please reach out to [email protected]
57
70
## Next steps
58
71
59
72
[Azure AD Connect sync: Understanding Declarative Provisioning](../hybrid/concept-azure-ad-connect-sync-declarative-provisioning.md)
1. To see your new policy, and to get the policy's **ObjectId**, run the following command:
250
256
251
257
```powershell
252
258
Get-AzureADPolicy -Id $policy.Id
253
259
```
254
260
255
-
2. Update the policy.
261
+
1. Update the policy.
256
262
257
263
You might decide that the first policy you set in this example is not as strict as your service requires. To set your Single-Factor Refresh Token to expire in two days, run the following command:
258
264
@@ -274,21 +280,21 @@ In this example, you create a policy that requires users to authenticate more fr
2. To see your new policy, and to get the policy **ObjectId**, run the following command:
283
+
1. To see your new policy, and to get the policy **ObjectId**, run the following command:
278
284
279
285
```powershell
280
286
Get-AzureADPolicy -Id $policy.Id
281
287
```
282
288
283
-
2. Assign the policy to your service principal. You also need to get the **ObjectId** of your service principal.
289
+
1. Assign the policy to your service principal. You also need to get the **ObjectId** of your service principal.
284
290
285
291
1. Use the [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal) cmdlet to see all your organization's service principals or a single service principal.
286
292
```powershell
287
293
# Get ID of the service principal
288
294
$sp = Get-AzureADServicePrincipal -Filter "DisplayName eq '<service principal display name>'"
289
295
```
290
296
291
-
2. When you have the service principal, run the following command:
297
+
1. When you have the service principal, run the following command:
2. To see your new policy, run the following command:
314
+
1. To see your new policy, run the following command:
309
315
310
316
```powershell
311
317
Get-AzureADPolicy -Id $policy.Id
312
318
```
313
319
314
-
2. Assign the policy to your web API. You also need to get the **ObjectId** of your application. Use the [Get-AzureADApplication](/powershell/module/azuread/get-azureadapplication) cmdlet to find your app's **ObjectId**, or use the [Azure portal](https://portal.azure.com/).
320
+
1. Assign the policy to your web API. You also need to get the **ObjectId** of your application. Use the [Get-AzureADApplication](/powershell/module/azuread/get-azureadapplication) cmdlet to find your app's **ObjectId**, or use the [Azure portal](https://portal.azure.com/).
315
321
316
322
Get the **ObjectId** of your app and assign the policy:
317
323
@@ -334,19 +340,19 @@ In this example, you create a few policies to learn how the priority system work
2. To see your new policy, run the following command:
343
+
1. To see your new policy, run the following command:
338
344
339
345
```powershell
340
346
Get-AzureADPolicy -Id $policy.Id
341
347
```
342
348
343
-
2. Assign the policy to a service principal.
349
+
1. Assign the policy to a service principal.
344
350
345
351
Now, you have a policy that applies to the entire organization. You might want to preserve this 30-day policy for a specific service principal, but change the organization default policy to the upper limit of "until-revoked."
346
352
347
353
1. To see all your organization's service principals, you use the [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal) cmdlet.
348
354
349
-
2. When you have the service principal, run the following command:
355
+
1. When you have the service principal, run the following command:
350
356
351
357
```powershell
352
358
# Get ID of the service principal
@@ -356,13 +362,13 @@ In this example, you create a few policies to learn how the priority system work
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.subservice: msi
12
12
ms.devlang:
13
13
ms.topic: overview
14
14
ms.custom: mvc
15
-
ms.date: 03/25/2020
15
+
ms.date: 04/18/2020
16
16
ms.author: markvi
17
17
18
18
#As a developer, I'd like to securely manage the credentials that my application uses for authenticating to cloud services without having the credentials in my code or checked into source control.
0 commit comments