You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We've added a [UserJourney](userjourneys.md). The user journey specifies the business logic the end user goes through as Azure AD B2C processes a request. This user journey has only one step that issues a JTW token with the claims that you'll define in the next step.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/plan-auto-user-provisioning.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,14 +8,14 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 04/04/2022
11
+
ms.date: 04/12/2023
12
12
ms.author: kenwith
13
13
ms.reviewer: arvinh
14
14
---
15
15
16
16
# Plan an automatic user provisioning deployment in Azure Active Directory
17
17
18
-
Many organizations rely on software as a service (SaaS) applications such as ServiceNow, Zscaler, and Slack for end-user productivity. Historically IT staff have relied on manual provisioning methods such as uploading CSV files, or using custom scripts to securely manage user identities in each SaaS application. These processes are error prone, insecure, and hard to manage.
18
+
Many organizations rely on software as a service (SaaS) applications such as ServiceNow, Zscaler, and Slack for end-user productivity. Historically IT staff has relied on manual provisioning methods such as uploading CSV files, or using custom scripts to securely manage user identities in each SaaS application. These processes are error prone, insecure, and hard to manage.
19
19
20
20
Azure Active Directory (Azure AD) automatic user provisioning simplifies this process by securely automating the creation, maintenance, and removal of user identities in SaaS applications based on business rules. This automation allows you to effectively scale your identity management systems on both cloud-only and hybrid environments as you expand their dependency on cloud-based solutions.
21
21
@@ -33,7 +33,7 @@ The key benefits of enabling automatic user provisioning are:
33
33
34
34
***Manage risk**. You can increase security by automating changes based on employee status or group memberships that define roles and/or access.
35
35
36
-
***Address compliance and governance**. Azure AD supports native audit logs for every user provisioning request. Requests are executed in both the source and target systems. This enables you to track who has access to applications from a single screen.
36
+
***Address compliance and governance**. Azure AD supports native audit logs for every user provisioning request. Requests are executed in both the source and target systems. Audit logs let you track who has access to applications from a single screen.
37
37
38
38
***Reduce cost**. Automatic user provisioning reduces costs by avoiding inefficiencies and human error associated with manual provisioning. It reduces the need for custom-developed user provisioning solutions, scripts, and audit logs.
39
39
@@ -43,7 +43,7 @@ Azure AD provides self-service integration of any application using templates pr
43
43
44
44
#### Application licensing
45
45
46
-
You'll need the appropriate licenses for the application(s) you want to automatically provision. Discuss with the application owners whether the users assigned to the application have the proper licenses for their application roles. If Azure AD manages automatic provisioning based on roles, the roles assigned in Azure AD must align to application licenses. Incorrect licenses owned in the application may lead to errors during the provisioning/updating of a user.
46
+
You need the appropriate licenses for the application(s) you want to automatically provision. Discuss with the application owners whether the users assigned to the application have the proper licenses for their application roles. If Azure AD manages automatic provisioning based on roles, the roles assigned in Azure AD must align to application licenses. Incorrect licenses owned in the application may lead to errors during the provisioning/updating of a user.
47
47
48
48
### Terms
49
49
@@ -57,7 +57,7 @@ This article uses the following terms:
57
57
58
58
* Target system - The repository of users that the Azure AD provisions to. The Target system is typically a SaaS application such as ServiceNow, Zscaler, and Slack. The target system can also be an on-premises system such as AD.
59
59
60
-
*[System for Cross-domain Identity Management (SCIM)](https://aka.ms/scimoverview) - An open standard that allows for the automation of user provisioning. SCIM communicates user identity data between identity providers such as Microsoft, and service providers like Salesforce or other SaaS apps that require user identity information.
60
+
*[System for Cross-domain Identity Management (SCIM)](https://aka.ms/scimoverview) - An open standard that allows for the automation of user provisioning. SCIM communicates user identity data between identity providers and service providers. Microsoft is an example of an identity provider. Salesforce is an example of a service provider. Service providers require user identity information and an identity provider fulfills that need. SCIM is the mechanism the identity provider and service provider use to send information back and forth.
61
61
62
62
### Training resources
63
63
@@ -106,7 +106,7 @@ In this example, user creation occurs in Azure AD and the Azure AD provisioning
106
106
107
107
#### Automatic user provisioning for cloud HR applications
108
108
109
-
In this example, the users and or groups are created in a cloud HR application like such as Workday and SuccessFactors. The Azure AD provisioning service and Azure AD Connect provisioning agent provisions the user data from the cloud HR app tenant into AD. Once the accounts are updated in AD, it is synced with Azure AD through Azure AD Connect, and the email addresses and username attributes can be written back to the cloud HR app tenant.
109
+
In this example, the users and or groups are created in a cloud HR application like such as Workday and SuccessFactors. The Azure AD provisioning service and Azure AD Connect provisioning agent provisions the user data from the cloud HR app tenant into AD. Once the accounts are updated in AD, it's synced with Azure AD through Azure AD Connect, and the email addresses and username attributes can be written back to the cloud HR app tenant.
@@ -128,19 +128,19 @@ When technology projects fail, it's typically because of mismatched expectations
128
128
129
129
### Plan communications
130
130
131
-
Communication is critical to the success of any new service. Proactively communicate with your users how their experience will change, when it will change, and how to gain support if they experience issues.
131
+
Communication is critical to the success of any new service. Proactively communicate to your users about their experience, how the experience is changing, when to expect any change, and how to gain support if they experience issues.
132
132
133
133
### Plan a pilot
134
134
135
-
We recommend that the initial configuration of automatic user provisioning be in a test environment with a small subset of users before scaling it to all users in production. See [best practices](../fundamentals/active-directory-deployment-plans.md#best-practices-for-a-pilot) for running a pilot.
135
+
We recommend that the initial configuration of automatic user provisioning is in a test environment with a small subset of users before scaling it to all users in production. See [best practices](../fundamentals/active-directory-deployment-plans.md#best-practices-for-a-pilot) for running a pilot.
136
136
137
137
#### Best practices for a pilot
138
138
139
139
A pilot allows you to test with a small group before deploying a capability for everyone. Ensure that as part of your testing, each use case within your organization is thoroughly tested.
140
140
141
141
In your first wave, target IT, usability, and other appropriate users who can test and provide feedback. Use this feedback to further develop the communications and instructions you send to your users, and to give insights into the types of issues your support staff may see.
142
142
143
-
Widen the rollout to larger groups of users by increasing the scope of the group(s) targeted. This can be done through [dynamic group membership](../enterprise-users/groups-dynamic-membership.md), or by manually adding users to the targeted group(s).
143
+
Widen the rollout to larger groups of users by increasing the scope of the group(s) targeted. Increasing the scope of the group(s) is done through [dynamic group membership](../enterprise-users/groups-dynamic-membership.md), or by manually adding users to the targeted group(s).
144
144
145
145
## Plan application connections and administration
146
146
@@ -150,7 +150,7 @@ Use the Azure portal to view and manage all the applications that support provis
150
150
151
151
The actual steps required to enable and configure automatic provisioning vary depending on the application. If the application you wish to automatically provision is listed in the [Azure AD SaaS app gallery](../saas-apps/tutorial-list.md), then you should select the [app-specific integration tutorial](../saas-apps/tutorial-list.md) to configure its pre-integrated user provisioning connector.
152
152
153
-
If not, follow the steps below:
153
+
If not, follow the steps:
154
154
155
155
1.[Create a request](../manage-apps/v2-howto-app-gallery-listing.md) for a pre-integrated user provisioning connector. Our team will work with you and the application developer to onboard your application to our platform if it supports SCIM.
156
156
@@ -164,7 +164,7 @@ For more information, see [What applications and systems can I use with Azure AD
164
164
165
165
Setting up automatic user provisioning is a per-application process. For each application, you need to provide [administrator credentials](../app-provisioning/configure-automatic-user-provisioning-portal.md) to connect to the target system’s user management endpoint.
166
166
167
-
The image below shows one version of the required admin credentials:
167
+
The image shows one version of the required admin credentials:
168
168
169
169

170
170
@@ -235,7 +235,7 @@ It's common for a security review to be required as part of a deployment. If you
235
235
236
236
### Plan rollback
237
237
238
-
If the automatic user provisioning implementation fails to work as desired in the production environment, the following rollback steps below can assist you in reverting to a previous known good state:
238
+
If the automatic user provisioning implementation fails to work as desired in the production environment, the following rollback steps can assist you in reverting to a previous known good state:
239
239
240
240
1. Review the [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md) to determine what incorrect operations occurred on the affected users and/or groups.
241
241
@@ -251,7 +251,7 @@ Choose the steps that align to your solution requirements.
251
251
252
252
When the Azure AD provisioning service runs for the first time, the initial cycle against the source system and target systems creates a snapshot of all user objects for each target system.
253
253
254
-
When enabling automatic provisioning for an application, the initial cycle can take anywhere from 20 minutes to several hours. The duration depends on the size of the Azure AD directory and the number of users in scope for provisioning.
254
+
When you enable automatic provisioning for an application, the initial cycle takes anywhere from 20 minutes to several hours. The duration depends on the size of the Azure AD directory and the number of users in scope for provisioning.
255
255
256
256
The provisioning service stores the state of both systems after the initial cycle, improving performance of subsequent incremental cycles.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-app-passwords.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,8 +99,7 @@ By default, users can't create app passwords. The app passwords feature must be
99
99
100
100
When users complete their initial registration for Azure AD Multi-Factor Authentication, there's an option to create app passwords at the end of the registration process.
101
101
102
-
Users can also create app passwords after registration. For more information and detailed steps for your users, see the following resources:
103
-
*[What are app passwords in Azure AD Multi-Factor Authentication?](https://support.microsoft.com/account-billing/manage-app-passwords-for-two-step-verification-d6dc8c6d-4bf7-4851-ad95-6d07799387e9)
102
+
Users can also create app passwords after registration. For more information and detailed steps for your users, see the following resource:
104
103
*[Create app passwords from the Security info page](https://support.microsoft.com/account-billing/create-app-passwords-from-the-security-info-preview-page-d8bc744a-ce3f-4d4d-89c9-eb38ab9d4137)
description: Learn how to run a sample React SPA to sign in users
4
+
services: active-directory
5
+
author: kengaderdus
6
+
manager: mwongerapk
7
+
ms.author: kengaderdus
8
+
ms.service: active-directory
9
+
ms.workload: identity
10
+
ROBOTS: NOINDEX
11
+
ms.subservice: ciam
12
+
ms.topic: portal
13
+
ms.date: 04/12/2023
14
+
---
15
+
16
+
# Portal quickstart for React SPA
17
+
18
+
> [!div renderon="portal" class="sxs-lookup"]
19
+
> In this quickstart, you download and run a code sample that demonstrates how a React single-page application (SPA) can sign in users with Azure AD CIAM.
20
+
>
21
+
> ## Prerequisites
22
+
>
23
+
> * Azure subscription - [Create an Azure subscription for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F)
24
+
> *[Node.js](https://nodejs.org/en/download/)
25
+
> *[Visual Studio Code](https://code.visualstudio.com/download) or another code editor
26
+
>
27
+
> ## Download the code
28
+
>
29
+
> > [!div class="nextstepaction"]
30
+
> > [Download the code sample](https://github.com/Azure-Samples/ms-identity-ciam-javascript-tutorial/archive/react-quickstart.zip)
31
+
>
32
+
> ## Run the sample
33
+
>
34
+
> 1. Unzip the downloaded file.
35
+
>
36
+
> 1. Locate the folder that contains the `package.json` file in your terminal, then run the following command:
37
+
>
38
+
> ```console
39
+
> npm install && npm start
40
+
> ```
41
+
>
42
+
> 1. Open your browser and visit `http://locahost:3000`.
43
+
>
44
+
> 1. Select the **Sign-in** link on the navigation bar.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -171,7 +171,7 @@ For more information about Microsoft cloud settings for B2B collaboration., see:
171
171
### Modernizing Terms of Use Experiences
172
172
173
173
**Type:** Plan for Change
174
-
**Service category:**Access Reviews
174
+
**Service category:**Terms of use
175
175
**Product capability:** AuthZ/Access Delegation
176
176
177
177
Starting July 2023, we're modernizing the following Terms of Use end user experiences with an updated PDF viewer, and moving the experiences from https://account.activedirectory.windowsazure.com to https://myaccount.microsoft.com:
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-manage-inactive-user-accounts.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,6 @@ The following details relate to the `lastSignInDateTime` property.
57
57
58
58
- To read the property, you need to grant the app the following Microsoft Graph permissions:
59
59
- AuditLog.Read.All
60
-
- Directory.Read.All
61
60
- User.Read.All
62
61
63
62
- Each interactive sign-in that was successful results in an update of the underlying data store. Typically, successful sign-ins show up in the related sign-in report within 10 minutes.
0 commit comments