Skip to content

Commit a8861de

Browse files
authored
Merge pull request #251751 from kenwith/admin-center-app-provisioning-steps-5
Updates for newly branded portal.
2 parents 2f5bf7d + 1c76f57 commit a8861de

27 files changed

+71
-71
lines changed

articles/active-directory/app-provisioning/inbound-provisioning-api-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 06/22/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: chmutali
1414
---

articles/active-directory/app-provisioning/inbound-provisioning-api-curl-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 07/07/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---

articles/active-directory/app-provisioning/inbound-provisioning-api-faqs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 06/26/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: chmutali
1414
---
@@ -158,7 +158,7 @@ Yes, you can soft-delete a user by using the **DELETE** method in the bulk reque
158158
To prevent and recover from accidental deletions, we recommend [configuring accidental deletion threshold](accidental-deletions.md) in the provisioning app and [enabling the on-premises Active Directory recycle bin](../hybrid/connect/how-to-connect-sync-recycle-bin.md). In your provisioning app's **Attribute Mapping** blade, under **Target object actions** disable the **Delete** operation.
159159

160160
**Recovering deleted accounts**
161-
* If the target directory for the operation is Microsoft Entra ID, then the matched user is soft-deleted. The user can be seen on the Microsoft Azure portal **Deleted users** page for the next 30 days and can be restored during that time.
161+
* If the target directory for the operation is Microsoft Entra ID, then the matched user is soft-deleted. The user can be seen on the Microsoft Entra admin center **Deleted users** page for the next 30 days and can be restored during that time.
162162
* If the target directory for the operation is on-premises Active Directory, then the matched user is hard-deleted. If the **Active Directory Recycle Bin** is enabled, you can restore the deleted on-premises AD user object.
163163

164164
## Do we need to send all users from the HR system in every request?

articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ This configuration registers an app in Microsoft Entra ID that represents the ex
5151
This section describes how you can assign the necessary permissions to a managed identity.
5252

5353
1. Configure a [managed identity](../managed-identities-azure-resources/overview.md) for use with your Azure resource.
54-
1. Copy the name of your managed identity from the Azure portal. For example: The screenshot below shows the name of a system assigned managed identity associated with an Azure Logic Apps workflow called "CSV2SCIMBulkUpload".
54+
1. Copy the name of your managed identity from the Microsoft Entra admin center. For example: The screenshot below shows the name of a system assigned managed identity associated with an Azure Logic Apps workflow called "CSV2SCIMBulkUpload".
5555

5656
[![Screenshot of managed identity name.](media/inbound-provisioning-api-grant-access/managed-identity-name.png)](media/inbound-provisioning-api-grant-access/managed-identity-name.png#lightbox)
5757

articles/active-directory/app-provisioning/inbound-provisioning-api-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: troubleshooting
99
ms.workload: identity
10-
ms.date: 06/27/2023
10+
ms.date: 09/15/2023
1111
ms.author: kenwith
1212
ms.reviewer: chmutali
1313
---

articles/active-directory/app-provisioning/inbound-provisioning-api-logic-apps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 07/18/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -73,7 +73,7 @@ The Logic Apps deployment template published in the [Microsoft Entra inbound pro
7373
## Step 1: Create an Azure Storage account to host the CSV file
7474
The steps documented in this section are optional. If you already have an existing storage account or would like to read the CSV file from another source like SharePoint site or Blob storage, update the Logic App to use your connector of choice.
7575

76-
1. Log in to your Azure portal as administrator.
76+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
7777
1. Search for "Storage accounts" and create a new storage account.
7878
:::image type="content" source="media/inbound-provisioning-api-logic-apps/storage-accounts.png" alt-text="Screenshot of creating new storage account." lightbox="media/inbound-provisioning-api-logic-apps/storage-accounts.png":::
7979
1. Assign a resource group and give it a name.
@@ -89,7 +89,7 @@ The steps documented in this section are optional. If you already have an existi
8989

9090
## Step 2: Configure Azure Function CSV2JSON converter
9191

92-
1. In the browser associated with your Azure portal login, open the GitHub repository URL - https://github.com/joelbyford/CSVtoJSONcore.
92+
1. In the browser associated with your Azure portal, open the GitHub repository URL - https://github.com/joelbyford/CSVtoJSONcore.
9393
1. Click on the link "Deploy to Azure" to deploy this Azure Function to your Azure tenant.
9494
:::image type="content" source="media/inbound-provisioning-api-logic-apps/deploy-azure-function.png" alt-text="Screenshot of deploying Azure Function." lightbox="media/inbound-provisioning-api-logic-apps/deploy-azure-function.png":::
9595
1. Specify the resource group under which to deploy this Azure function.

articles/active-directory/app-provisioning/insufficient-access-rights-error-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: troubleshooting
99
ms.workload: identity
10-
ms.date: 06/27/2023
10+
ms.date: 09/15/2023
1111
ms.author: kenwith
1212
ms.reviewer: chmutali
1313
---

articles/active-directory/app-provisioning/isv-automatic-provisioning-multi-tenant-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: reference
1010
ms.workload: identity
11-
ms.date: 10/20/2022
11+
ms.date: 09/15/2023
1212
ms.author: kenwith
1313
ms.reviewer: zhchia, arvinh
1414
---
@@ -62,7 +62,7 @@ To help determine which integration option to use for your application, refer to
6262
| Access data beyond users and groups during provisioning Access to Microsoft 365 data (Teams, SharePoint, Email, Calendar, Documents, etc.)| X+|| X |
6363
| Create, read, and update users based on business rules||||
6464
| Delete users based on business rules||| X |
65-
| Manage automatic user provisioning for all applications from the Azure portal|| X||
65+
| Manage automatic user provisioning for all applications from the Microsoft Entra admin center|| X||
6666
| Support multiple identity providers|| X||
6767
| Support guest accounts (B2B)||||
6868
| Support non-enterprise accounts (B2C)| X|||

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ If a user and their manager are both in scope for provisioning, the service prov
155155

156156
#### Global Reader
157157

158-
The Global Reader role is unable to read the provisioning configuration. Create a custom role with the `microsoft.directory/applications/synchronization/standard/read` permission in order to read the provisioning configuration from the Azure portal.
158+
The Global Reader role is unable to read the provisioning configuration. Create a custom role with the `microsoft.directory/applications/synchronization/standard/read` permission in order to read the provisioning configuration from the Microsoft Entra admin center.
159159

160160
#### Microsoft Azure Government Cloud
161161
Credentials, including the secret token, notification email, and SSO certificate notification emails together have a 1KB limit in the Microsoft Azure Government Cloud.
@@ -195,7 +195,7 @@ The following attributes and objects aren't supported:
195195
The Microsoft Entra ECMA Connector Host currently doesn't support anchor attribute changes (renames) or target systems, which require multiple attributes to form an anchor.
196196

197197
#### Attribute discovery and mapping
198-
The attributes that the target application supports are discovered and surfaced in the Azure portal in **Attribute Mappings**. Newly added attributes will continue to be discovered. If an attribute type has changed, for example, string to Boolean, and the attribute is part of the mappings, the type won't change automatically in the Azure portal. Customers will need to go into advanced settings in mappings and manually update the attribute type.
198+
The attributes that the target application supports are discovered and surfaced in the Microsoft Entra admin center in **Attribute Mappings**. Newly added attributes will continue to be discovered. If an attribute type has changed, for example, string to Boolean, and the attribute is part of the mappings, the type won't change automatically in the Microsoft Entra admin center. Customers will need to go into advanced settings in mappings and manually update the attribute type.
199199

200200
#### Provisioning agent
201201
- The agent doesn't currently support auto update for the on-premises application provisioning scenario. We're actively working to close this gap and ensure that auto update is enabled by default and required for all customers.

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 11/04/2022
10+
ms.date: 09/15/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)