Skip to content

Commit b00a2d9

Browse files
authored
Merge pull request #180585 from MicrosoftDocs/master
11/19 PM Publish
2 parents 31e33a2 + 155bf1a commit b00a2d9

File tree

120 files changed

+2258
-1325
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

120 files changed

+2258
-1325
lines changed

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,14 @@ manager: karenh444
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 05/28/2021
10+
ms.date: 11/18/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

1616
# Azure AD on-premises application provisioning architecture
1717

18-
>[!IMPORTANT]
19-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability (GA).
20-
2118
## Overview
2219

2320
The following diagram shows an overview of how on-premises application provisioning works.
@@ -91,8 +88,8 @@ You can define one or more matching attribute(s) and prioritize them based on th
9188

9289

9390
## Agent best practices
94-
- Ensure the auto Azure AD Connect Provisioning Agent Auto Update service is running. It's enabled by default when you install the agent. Auto-update is required for Microsoft to support your deployment.
95-
- Avoid all forms of inline inspection on outbound TLS communications between agents and Azure. This type of inline inspection causes degradation to the communication flow.
91+
- Using the same agent for the on-prem provisioning feature along with Workday / SuccessFactors / Azure AD Connect Cloud Sync is currently unsupported. We are actively working to support on-prem provisioning on the same agent as the other provisioning scenarios.
92+
- - Avoid all forms of inline inspection on outbound TLS communications between agents and Azure. This type of inline inspection causes degradation to the communication flow.
9693
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
9794
- Reducing the distance between the two ends of the hop.
9895
- Choosing the right network to traverse. For example, traversing a private network rather than the public internet might be faster because of dedicated links.
@@ -112,10 +109,6 @@ For the latest GA version of the provisioning agent, see [Azure AD connect provi
112109
2. Go to **Control Panel** > **Uninstall or Change a Program**.
113110
3. Look for the version that corresponds to the entry for **Microsoft Azure AD Connect Provisioning Agent**.
114111

115-
### Does Microsoft automatically push provisioning agent updates?
116-
117-
Yes. Microsoft automatically updates the provisioning agent if the Windows service Microsoft Azure AD Connect Agent Updater is up and running. Ensuring that your agent is up to date is required for support to troubleshoot issues.
118-
119112
### Can I install the provisioning agent on the same server running Azure AD Connect or Microsoft Identity Manager?
120113

121114
Yes. You can install the provisioning agent on the same server that runs Azure AD Connect or Microsoft Identity Manager, but they aren't required.

articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,14 @@ manager: karenh444
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 10/21/2021
10+
ms.date: 11/19/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

1616
# Troubleshoot on-premises application provisioning
1717

18-
>[!IMPORTANT]
19-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
20-
2118
## Troubleshoot test connection issues
2219
After you configure the provisioning agent and ECMA host, it's time to test connectivity from the Azure Active Directory (Azure AD) provisioning service to the provisioning agent, the ECMA host, and the application. To perform this end-to-end test, select **Test connection** in the application in the Azure portal. When the test connection fails, try the following troubleshooting steps:
2320

articles/active-directory/app-provisioning/on-premises-migrate-microsoft-identity-manager.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenh444
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 11/11/2021
10+
ms.date: 11/17/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -16,9 +16,6 @@ ms.collection: M365-identity-device-management
1616

1717
# Export a Microsoft Identity Manager connector for use with the Azure AD ECMA Connector Host
1818

19-
>[!IMPORTANT]
20-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
21-
2219
You can import into the Azure Active Directory (Azure AD) ECMA Connector Host a configuration for a specific connector from a Forefront Identity Manager Synchronization Service or Microsoft Identity Manager Synchronization Service (MIM Sync) installation. The MIM Sync installation is only used for configuration, not for the ongoing synchronization from Azure AD.
2320

2421
>[!IMPORTANT]

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,13 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 10/16/2021
11+
ms.date: 11/17/2021
1212
ms.author: billmath
1313
ms.reviewer: arvinh
1414
---
1515

1616
# Azure AD on-premises application provisioning to SCIM-enabled apps
1717

18-
>[!IMPORTANT]
19-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
20-
2118
The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) client that can be used to automatically provision users into cloud or on-premises applications. This article outlines how you can use the Azure AD provisioning service to provision users into an on-premises application that's SCIM enabled. If you want to provision users into non-SCIM on-premises applications that use SQL as a data store, see the [Azure AD ECMA Connector Host Generic SQL Connector tutorial](tutorial-ecma-sql-connector.md). If you want to provision users into cloud apps such as DropBox and Atlassian, review the app-specific [tutorials](../../active-directory/saas-apps/tutorial-list.md).
2219

2320
![Diagram that shows SCIM architecture.](./media/on-premises-scim-provisioning/scim-4.png)
@@ -30,21 +27,19 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
3027
## On-premises app provisioning to SCIM-enabled apps
3128
To provision users to SCIM-enabled apps:
3229

33-
1. Add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
34-
1. Go to your app and select **Provisioning** > **Download the provisioning agent**.
35-
1. Select **On-Premises Connectivity**, and download the provisioning agent.
30+
1. [Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM endpoint is hosted on.
3631
1. Copy the agent onto the virtual machine or server that your SCIM endpoint is hosted on.
3732
1. Open the provisioning agent installer, agree to the terms of service, and select **Install**.
3833
1. Open the provisioning agent wizard, and select **On-premises provisioning** when prompted for the extension you want to enable.
3934
1. Provide credentials for an Azure AD administrator when you're prompted to authorize. Hybrid administrator or global administrator is required.
4035
1. Select **Confirm** to confirm the installation was successful.
41-
1. Go back to your application, and select **On-Premises Connectivity**.
36+
1. Navigate to the Azure Portal and add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
37+
1. Select **On-Premises Connectivity**, and download the provisioning agent. 1. Go back to your application, and select **On-Premises Connectivity**.
4238
1. Select the agent that you installed from the dropdown list, and select **Assign Agent(s)**.
43-
1. Wait 10 minutes or restart the Azure AD Connect Provisioning agent service on your server or VM.
44-
1. Provide the URL for your SCIM endpoint in the **Tenant URL** box. An example is https://localhost:8585/scim.
45-
39+
1. Wait 20 minutes prior to completing the next step, to provide time for the agent assignment to complete.
40+
1. Provide the URL for your SCIM endpoint in the **Tenant URL** box. An example is https://localhost:8585/scim.
4641
![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
47-
1. Select **Test Connection**, and save the credentials.
42+
1. Select **Test Connection**, and save the credentials. Use the steps [here](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-ecma-troubleshoot#troubleshoot-test-connection-issues) if you run into connectivity issues.
4843
1. Configure any [attribute mappings](customize-application-attributes.md) or [scoping](define-conditional-rules-for-provisioning-user-accounts.md) rules required for your application.
4944
1. Add users to scope by [assigning users and groups](../../active-directory/manage-apps/add-application-portal-assign-users.md) to the application.
5045
1. Test provisioning a few users [on demand](provision-on-demand.md).

articles/active-directory/app-provisioning/toc.yml

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,14 @@
1818
href: customize-application-attributes.md
1919
- name: App specific provisioning tutorials
2020
href: /azure/active-directory/saas-apps/tutorial-list
21-
- name: Provisioning to SQL based apps
22-
href: tutorial-ecma-sql-connector.md
21+
- name: On-prem app provisioning tutorials
22+
items:
23+
- name: Provisioning to On-premises SCIM-enabled apps
24+
href: on-premises-scim-provisioning.md
25+
- name: Provisioning to SQL based apps
26+
href: on-premises-sql-connector-configure.md
27+
- name: Provisioning to LDAP based apps
28+
href: on-premises-ldap-connector-configure.md
2329
- name: Concepts
2430
expanded: true
2531
items:
@@ -62,10 +68,6 @@
6268
href: export-import-provisioning-configuration.md
6369
- name: Provisioning reports
6470
href: ../reports-monitoring/concept-provisioning-logs.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
65-
- name: Automate configuration using MS Graph
66-
href: application-provisioning-configuration-api.md
67-
- name: Enable accidental deletions prevention
68-
href: accidental-deletions.md
6971
- name: Troubleshoot application provisioning
7072
items:
7173
- name: Known issues
@@ -82,16 +84,6 @@
8284
href: on-premises-ecma-troubleshoot.md
8385
- name: Provisioning logs
8486
href: ../reports-monitoring/concept-provisioning-logs.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
85-
- name: On-premises app provisioning
86-
items:
87-
- name: Provisioning to SQL based apps
88-
href: on-premises-sql-connector-configure.md
89-
- name: Generic LDAP Connector configuration
90-
href: on-premises-ldap-connector-configure.md
91-
- name: On-premises application provisioning to SCIM-enabled apps
92-
href: on-premises-scim-provisioning.md
93-
- name: Migrate connector from MIM Sync
94-
href: on-premises-migrate-microsoft-identity-manager.md
9587
- name: Troubleshoot HR provisioning
9688
items:
9789
- name: Attribute retrieval issues
@@ -104,14 +96,18 @@
10496
href: hr-manager-update-issues.md
10597
- name: HR writeback issues
10698
href: hr-writeback-issues.md
99+
- name: Enable accidental deletions prevention
100+
href: accidental-deletions.md
101+
- name: Automate configuration using MS Graph
102+
href: application-provisioning-configuration-api.md
107103
- name: Reference
108104
items:
105+
- name: Function reference for writing expressions for attribute mappings
106+
href: functions-for-customizing-application-data.md
109107
- name: SCIM 2.0 protocol compliance
110108
href: application-provisioning-config-problem-scim-compatibility.md
111109
- name: SCIM and Graph scenarios
112110
href: scim-graph-scenarios.md
113-
- name: Function reference for writing expressions for attribute mappings
114-
href: functions-for-customizing-application-data.md
115111
- name: Cloud HR provisioning
116112
items:
117113
- name: SuccessFactors attribute reference
@@ -120,6 +116,8 @@
120116
href: workday-attribute-reference.md
121117
- name: Provisioning Agent version history
122118
href: provisioning-agent-release-version-history.md
119+
- name: Migrate connector from MIM Sync
120+
href: on-premises-migrate-microsoft-identity-manager.md
123121
- name: Resources
124122
items:
125123
- name: Support and help options for developers

0 commit comments

Comments
 (0)