Skip to content

Commit b1908e9

Browse files
authored
Merge pull request #183059 from MicrosoftDocs/master
12/16 AM Publish
2 parents 2536d91 + cb985a3 commit b1908e9

File tree

317 files changed

+2044
-1215
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

317 files changed

+2044
-1215
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 13 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -92,11 +92,6 @@
9292
"redirect_url": "/azure/healthcare-apis/fhir/configure-private-link",
9393
"redirect_document_id": true
9494
},
95-
{
96-
"source_path_from_root": "/articles/healthcare-apis/convert-data.md",
97-
"redirect_url": "/azure/healthcare-apis/data-transformation/convert-data",
98-
"redirect_document_id": true
99-
},
10095
{
10196
"source_path_from_root": "/articles/healthcare-apis/customer-managed-key.md",
10297
"redirect_url": "/azure/healthcare-apis/fhir/customer-managed-key",
@@ -232,11 +227,6 @@
232227
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/configure-private-link",
233228
"redirect_document_id": true
234229
},
235-
{
236-
"source_path_from_root": "/articles/healthcare-apis/fhir/convert-data.md",
237-
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/convert-data",
238-
"redirect_document_id": true
239-
},
240230
{
241231
"source_path_from_root": "/articles/healthcare-apis/fhir/customer-managed-key.md",
242232
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/customer-managed-key",
@@ -373,23 +363,23 @@
373363
"redirect_document_id": true
374364
},
375365
{
376-
"source_path_from_root": "/articles/healthcare-apis/fhir/de-identified-export.md",
377-
"redirect_url": "/azure/healthcare-apis/data-transformation/de-identified-export",
366+
"source_path_from_root": "/articles/healthcare-apis/data-transformation/de-identified-export.md",
367+
"redirect_url": "/azure/healthcare-apis/fhir/de-identified-export",
378368
"redirect_document_id": true
379369
},
380370
{
381-
"source_path_from_root": "/articles/healthcare-apis/fhir/export-data.md",
382-
"redirect_url": "/azure/healthcare-apis/data-transformation/export-data",
371+
"source_path_from_root": "/articles/healthcare-apis/data-transformation/export-data.md",
372+
"redirect_url": "/azure/healthcare-apis/fhir/export-data",
383373
"redirect_document_id": true
384374
},
385375
{
386-
"source_path_from_root": "/articles/healthcare-apis/fhir/move-to-synapse.md",
387-
"redirect_url": "/azure/healthcare-apis/data-transformation/move-to-synapse",
376+
"source_path_from_root": "/articles/healthcare-apis/data-transformation/move-to-synapse.md",
377+
"redirect_url": "/azure/healthcare-apis/fhir/move-to-synapse",
388378
"redirect_document_id": true
389379
},
390380
{
391-
"source_path_from_root": "/articles/healthcare-apis/fhir/configure-export-data.md",
392-
"redirect_url": "/azure/healthcare-apis/data-transformation/configure-export-data",
381+
"source_path_from_root": "/articles/healthcare-apis/data-transformation/configure-export-data.md",
382+
"redirect_url": "/azure/healthcare-apis/fhir/configure-export-data",
393383
"redirect_document_id": true
394384
},
395385
{
@@ -491,6 +481,11 @@
491481
"source_path_from_root": "/articles/healthcare-apis/fhir/configure-azure-rbac-for-fhir.md",
492482
"redirect_url": "/azure/healthcare-apis/configure-azure-rbac",
493483
"redirect_document_id": false
484+
},
485+
{
486+
"source_path_from_root": "/articles/healthcare-apis/data-transformation/convert-data.md",
487+
"redirect_url": "/azure/healthcare-apis/fhir/convert-data",
488+
"redirect_document_id": true
494489
}
495490
]
496491
}

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 11/30/2021
4+
ms.date: 12/15/2021
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ items:
66
items:
77
- name: What is application provisioning?
88
href: user-provisioning.md
9+
- name: What is HR-driven provisioning?
10+
href: what-is-hr-driven-provisioning.md
911
- name: What's new in docs?
1012
href: whats-new-docs.md
1113
- name: Tutorials

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Ensure your client meets the following requirements:
103103
- TCP connectivity from the client to either the public or private IP of the VM (ProxyCommand or SSH forwarding to a machine with connectivity also works).
104104

105105
> [!IMPORTANT]
106-
> SSH clients based on PuTTy do not support openSSH certificates and cannot be used to login with Azure AD openSSH certiicate-based authentication.
106+
> SSH clients based on PuTTy do not support openSSH certificates and cannot be used to login with Azure AD openSSH certificate-based authentication.
107107
108108
## Enabling Azure AD login in for Linux VM in Azure
109109

articles/active-directory/governance/access-reviews-downloadable-review-history.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,7 @@ The reports provide details on a per-user basis showing the following:
5555
| Element name | Description |
5656
| --- | --- |
5757
| AccessReviewId | Review object id |
58+
| AccessReviewSeriesId | Object id of the review series, if the review is an instance of a recurring review. If a one-time review, the value will be am empty GUID. |
5859
| ReviewType | Review types include group, application, Azure AD role, Azure role, and access package|
5960
|ResourceDisplayName | Display Name of the resource being reviewed |
6061
| ResourceId | Id of the resource being reviewed |

articles/active-directory/governance/deploy-access-reviews.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -157,13 +157,13 @@ Typical targets for review include:
157157

158158
### Who will create and manage access reviews?
159159

160-
The administrative role required to create, manage, or read an access review depends on the type of resource being reviewed. The following table denotes the roles required for each resource type.
160+
The administrative role required to create, manage, or read an access review depends on the type of resource being reviewed. The following table denotes the roles required for each resource type. Custom roles with permission Microsoft.Authorization/* can create and manage reviews of any resource type, and custom roles with at least permissions Microsoft.Authorization/*/read can read reviews of any resource type.
161161

162162
| Resource type| Create and manage access reviews (creators)| Read access review results |
163163
| - | - | -|
164164
| Group or application| Global administrator <p>User administrator<p>Identity Governance administrator<p>Privileged Role administrator (only does reviews for Azure AD role-assignable groups)<p>Group owner ([if enabled by an admin]( create-access-review.md#allow-group-owners-to-create-and-manage-access-reviews-of-their-groups-preview))| Global administrator<p>Global reader<p>User administrator<p>Identity Governance administrator<p>Privileged Role administrator<p>Security reader<p>Group owner ([if enabled by an admin]( create-access-review.md#allow-group-owners-to-create-and-manage-access-reviews-of-their-groups-preview)) |
165165
|Azure AD roles| Global administrator <p>Privileged Role administrator| Global administrator<p>Global reader<p>User administrator<p>Privileged Role administrator<p> <p>Security reader |
166-
| Azure resource roles| Global administrator<p>Resource owner| Global administrator<p>Global reader<p>User administrator<p>Privileged Role administrator<p> <p>Security reader |
166+
| Azure resource roles| User Access Administrator (for the resource)<p>Resource owner| User Access Administrator (for the resource)<p>Resource owner<p>Reader (for the resource) |
167167
| Access package| Global administrator<p>User administrator<p>Identity Governance administrator| Global administrator<p>Global reader<p>User administrator<p>Identity Governance administrator<p> <p>Security reader |
168168

169169
For more information, see [Administrator role permissions in Azure AD](../roles/permissions-reference.md).
@@ -442,4 +442,4 @@ For more advanced queries and analysis of access reviews, and to track changes a
442442
Learn about the following related technologies:
443443

444444
* [What is Azure AD entitlement management?](entitlement-management-overview.md)
445-
* [What is Azure AD Privileged Identity Management?](../privileged-identity-management/pim-configure.md)
445+
* [What is Azure AD Privileged Identity Management?](../privileged-identity-management/pim-configure.md)
8.57 KB
Loading
42.1 KB
Loading
Lines changed: 144 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,144 @@
1+
---
2+
title: 'Tutorial: Configure Plandisc for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Plandisc.
4+
services: active-directory
5+
author: twimmers
6+
writer: twimmers
7+
manager: beatrizd
8+
ms.assetid: 16244680-205d-4763-960a-9bc7a6e915bc
9+
ms.service: active-directory
10+
ms.subservice: saas-app-tutorial
11+
ms.workload: identity
12+
ms.topic: tutorial
13+
ms.date: 12/09/2021
14+
ms.author: thwimmer
15+
---
16+
17+
# Tutorial: Configure Plandisc for automatic user provisioning
18+
19+
This tutorial describes the steps you need to do in both Plandisc and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Plandisc](https://plandisc.com) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
20+
21+
22+
## Capabilities supported
23+
> [!div class="checklist"]
24+
> * Create users in Plandisc
25+
> * Remove users in Plandisc when they do not require access anymore
26+
> * Keep user attributes synchronized between Azure AD and Plandisc
27+
> * [Single sign-on](../manage-apps/add-application-portal-setup-oidc-sso.md) to Plandisc (recommended).
28+
29+
## Prerequisites
30+
31+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
32+
33+
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
34+
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
35+
* A Plandisc Enterprise subscription
36+
* A user account in Plandisc with Admin permission
37+
38+
## Step 1. Plan your provisioning deployment
39+
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
40+
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
41+
1. Determine what data to [map between Azure AD and Plandisc](../app-provisioning/customize-application-attributes.md).
42+
43+
## Step 2. Configure Plandisc to support provisioning with Azure AD
44+
45+
1. Log in to [Plandisc](https://create.plandisc.com) and navigate to **Enterprise**
46+
47+
![Plandisc navigate Enterprise](media/plandisc-provisioning-tutorial/get-scim-token-from-plandisc-step-1.png)
48+
49+
1. Scroll down to see section **Manage users with SCIM** section.
50+
Here you'll find values to be entered in the Provisioning tab of your Plandisc application in the Azure portal.
51+
The **SCIM endpoint** is inserted into the Tenant URL field in the Azure portal.
52+
The **SCIM token** is inserted into the Secret Token field in the Azure portal.
53+
54+
![Copy SCIM token from Plandisc](media/plandisc-provisioning-tutorial/get-scim-token-from-plandisc-step-2.png)
55+
56+
## Step 3. Add Plandisc from the Azure AD application gallery
57+
58+
Add Plandisc from the Azure AD application gallery to start managing provisioning to Plandisc. If you have previously setup Plandisc for SSO, you can use the same application. However it's recommended you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
59+
60+
## Step 4. Define who will be in scope for provisioning
61+
62+
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user and group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
63+
64+
* When assigning users and groups to Plandisc, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add more roles.
65+
66+
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control it by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
67+
68+
69+
## Step 5. Configure automatic user provisioning to Plandisc
70+
71+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and groups in Plandisc based on user and group assignments in Azure AD.
72+
73+
### To configure automatic user provisioning for Plandisc in Azure AD:
74+
75+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
76+
77+
![Enterprise applications blade](common/enterprise-applications.png)
78+
79+
1. In the applications list, select **Plandisc**.
80+
81+
![The Plandisc link in the Applications list](common/all-applications.png)
82+
83+
1. Select the **Provisioning** tab.
84+
85+
![Provisioning tab](common/provisioning.png)
86+
87+
1. Set the **Provisioning Mode** to **Automatic**.
88+
89+
![Provisioning tab automatic](common/provisioning-automatic.png)
90+
91+
1. In the **Admin Credentials** section, input your Plandisc Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Plandisc. If the connection fails, ensure your Plandisc account has Admin permissions and try again.
92+
93+
![Token](common/provisioning-testconnection-tenanturltoken.png)
94+
95+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
96+
97+
![Notification Email](common/provisioning-notification-email.png)
98+
99+
1. Select **Save**.
100+
101+
1. In the **Mappings** section, select **Synchronize Azure Active Directory Users to Plandisc**.
102+
103+
1. Review the user attributes that are synchronized from Azure AD to Plandisc in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Plandisc for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the Plandisc API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
104+
105+
|Attribute|Type|Supported for filtering|Required by Plandisc|
106+
|---|---|---|---|
107+
|userName|String|&check;|&check;
108+
|active|Boolean||&check;
109+
|emails[type eq "work"].value|String||&check;
110+
|displayName|String||&check;
111+
|externalId|String||&check;
112+
|preferredLanguage|String|
113+
114+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
115+
116+
1. To enable the Azure AD provisioning service for Plandisc, change the **Provisioning Status** to **On** in the **Settings** section.
117+
118+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
119+
120+
1. Define the users and groups that you would like to provision to Plandisc by choosing the desired values in **Scope** in the **Settings** section.
121+
122+
![Provisioning Scope](common/provisioning-scope.png)
123+
124+
1. When you're ready to provision, click **Save**.
125+
126+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
127+
128+
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to complete than next cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
129+
130+
## Step 6. Monitor your deployment
131+
Once you've configured provisioning, use the following resources to monitor your deployment:
132+
133+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
134+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion
135+
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
136+
137+
## More resources
138+
139+
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
140+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
141+
142+
## Next steps
143+
144+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

0 commit comments

Comments
 (0)