You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -30,28 +30,24 @@ You use accidental deletions to specify a deletion threshold. Anything above the
30
30
31
31
To enable accidental deletion prevention:
32
32
33
-
1. In the Azure portal, select **Azure Active Directory**.
34
-
35
33
::: zone pivot="app-provisioning"
36
-
2. Select **Enterprise applications** and then select your application.
37
-
38
-
3. Select **Provisioning** and then on the provisioning page select **Edit provisioning**.
34
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
35
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
36
+
1. Select your application.
37
+
1. Select **Provisioning** and then on the provisioning page select **Edit provisioning**.
39
38
::: zone-end
40
39
41
40
::: zone pivot="cross-tenant-synchronization"
42
-
2. Select **Cross-tenant synchronization** > **Configurations** and then select your configuration.
43
-
44
-
3. Select **Provisioning**.
41
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
42
+
1. Browse to **Identity** > **External Identities** > **Cross-tenant synchronization** > **Configurations** and then select your configuration.
43
+
1. Select **Provisioning**.
45
44
::: zone-end
46
45
47
-
4. Under **Settings**, select the **Prevent accidental deletions** check box and specify a deletion
46
+
1. Under **Settings**, select the **Prevent accidental deletions** check box and specify a deletion
48
47
threshold.
49
-
50
-
5. Ensure the **Notification Email** address is completed.
51
-
48
+
1. Ensure the **Notification Email** address is completed.
52
49
If the deletion threshold is met, an email is sent.
53
-
54
-
6. Select **Save** to save the changes.
50
+
1. Select **Save** to save the changes.
55
51
56
52
When the deletion threshold is met, the job goes into quarantine, and a notification email is sent. The quarantined job can then be allowed or rejected. To learn more about quarantine behavior, see [Application provisioning in quarantine status](application-provisioning-quarantine-status.md).
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 10/06/2022
11
+
ms.date: 09/15/2023
12
12
ms.author: kenwith
13
13
ms.reviewer: arvinh
14
14
---
@@ -25,7 +25,7 @@ After automatic provisioning has been configured for an application (including v
25
25
26
26
If you observe that users are not being provisioned, consult the [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) in Azure AD. Search for log entries for a specific user.
27
27
28
-
You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory**>**Enterprise Apps**>**Provisioning logs (preview)** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
28
+
You can access the provisioning logs in the Microsoft Entra admin center by browsing to **Identity** > **Applications** >**Enterprise applications**>**Provisioning logs**. You can also select a specific application and then select **Provisioning logs** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
29
29
30
30
The provisioning logs record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning, querying the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison.
31
31
@@ -36,7 +36,7 @@ Below is a list of the general problem areas that you can drill into if you have
36
36
-[Provisioning logs say users are skipped and not provisioned, even though they are assigned](#provisioning-logs-say-users-are-skipped-and-not-provisioned-even-though-they-are-assigned)
37
37
38
38
## Provisioning service does not appear to start
39
-
If you set the **Provisioning Status** to be **On** in the **Azure Active Directory >Enterprise Apps>\[Application Name\]>Provisioning** section of the Azure portal. However no other status details are shown on that page after subsequent reloads, it is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs (preview)** described above to determine what operations the service is performing, and if there are any errors.
39
+
If you set the **Provisioning Status** to be **On** in the **Enterprise applications>\[Application Name\]>Provisioning** section of the Microsoft Entra admin center. However no other status details are shown on that page after subsequent reloads, it is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs (preview)** described above to determine what operations the service is performing, and if there are any errors.
40
40
41
41
>[!NOTE]
42
42
>An initial cycle can take anywhere from 20 minutes to several hours, depending on the size of the Azure AD directory and the number of users in scope for provisioning. Subsequent syncs after the initial cycle are faster, as the provisioning service stores watermarks that represent the state of both systems after the initial cycle. The initial cycle improves performance of subsequent syncs.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility.md
+14-11Lines changed: 14 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: reference
11
-
ms.date: 10/06/2022
11
+
ms.date: 09/15/2023
12
12
ms.author: kenwith
13
13
ms.reviewer: arvinh
14
14
---
@@ -236,11 +236,12 @@ Below are sample requests to help outline what the sync engine currently sends v
236
236
## Upgrading from the older customappsso job to the SCIM job
237
237
Following the steps below will delete your existing customappsso job and create a new SCIM job.
238
238
239
-
1. Sign in to the [Azure portal](https://portal.azure.com).
240
-
2. In the **Azure Active Directory > Enterprise Applications** section of the Azure portal, locate and select your existing SCIM application.
241
-
3. In the **Properties** section of your existing SCIM app, copy the **Object ID**.
242
-
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
243
-
5. In the Graph Explorer, run the command below to locate the ID of your provisioning job. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
239
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
240
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
241
+
1. Locate and select your existing SCIM application.
242
+
1. In the **Properties** section of your existing SCIM app, copy the **Object ID**.
243
+
1. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
244
+
1. In the Graph Explorer, run the command below to locate the ID of your provisioning job. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
@@ -275,11 +276,13 @@ Following the steps below will delete your existing customappsso job and create
275
276
## Downgrading from the SCIM job to the customappsso job (not recommended)
276
277
We allow you to downgrade back to the old behavior but don't recommend it as the customappsso does not benefit from some of the updates we make, and may not be supported forever.
277
278
278
-
1. Sign in to the [Azure portal](https://portal.azure.com).
279
-
2. In the **Azure Active Directory > Enterprise Applications > Create application** section of the Azure portal, create a new **Non-gallery** application.
280
-
3. In the **Properties** section of your new custom app, copy the **Object ID**.
281
-
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
282
-
5. In the Graph Explorer, run the command below to initialize the provisioning configuration for your app.
279
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
280
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
281
+
282
+
1. In the **Create application** section, create a new **Non-gallery** application.
283
+
1. In the **Properties** section of your new custom app, copy the **Object ID**.
284
+
1. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
285
+
1. In the Graph Explorer, run the command below to initialize the provisioning configuration for your app.
283
286
Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-config-problem.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,24 +8,24 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: troubleshooting
11
-
ms.date: 10/06/2022
11
+
ms.date: 09/15/2023
12
12
ms.author: kenwith
13
13
ms.reviewer: asteen, arvinh
14
14
---
15
15
16
16
# Problem configuring user provisioning to an Azure AD Gallery application
17
17
18
-
Configuring [automatic user provisioning](user-provisioning.md) for an app (where supported), requires that specific instructions be followed to prepare the application for automatic provisioning. Then you can use the Azure portal to configure the provisioning service to synchronize user accounts to the application.
18
+
Configuring [automatic user provisioning](user-provisioning.md) for an app (where supported), requires that specific instructions be followed to prepare the application for automatic provisioning. Then you can use the Microsoft Entra admin center to configure the provisioning service to synchronize user accounts to the application.
19
19
20
20
You should always start by finding the setup tutorial specific to setting up provisioning for your application. Then follow those steps to configure both the app and Azure AD to create the provisioning connection. A list of app tutorials can be found at [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](../saas-apps/tutorial-list.md).
21
21
22
22
## How to see if provisioning is working
23
23
24
24
Once the service is configured, most insights into the operation of the service can be drawn from two places:
25
25
26
-
-**Provisioning logs (preview)** – The [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning. Query the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison. You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory**>**Enterprise Apps**>**Provisioning logs (preview)** in the **Activity** section.
26
+
-**Provisioning logs (preview)** – The [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning. Query the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison. You can access the provisioning logs in the Microsoft Entra admin center by selecting **Identity** > **Applications** >**Enterprise applications**>**Provisioning logs** in the **Activity** section.
27
27
28
-
-**Current status –** A summary of the last provisioning run for a given app can be seen in the **Azure Active Directory >Enterprise Apps >\[Application Name\]>Provisioning** section, at the bottom of the screen under the service settings. The Current Status section shows whether a provisioning cycle has started provisioning user accounts. You can watch the progress of the cycle, see how many users and groups have been provisioned, and see how many roles are created. If there are any errors, details can be found in the [Provisioning logs (../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
28
+
-**Current status –** A summary of the last provisioning run for a given app can be seen in the **Identity** > **Applications** > **Enterprise applications** >\[Application Name\]> **Provisioning** section, at the bottom of the screen under the service settings. The Current Status section shows whether a provisioning cycle has started provisioning user accounts. You can watch the progress of the cycle, see how many users and groups have been provisioned, and see how many roles are created. If there are any errors, details can be found in the [Provisioning logs (../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
29
29
30
30
## General problem areas with provisioning to consider
31
31
@@ -37,7 +37,7 @@ Below is a list of the general problem areas that you can drill into if you have
37
37
38
38
## Provisioning service does not appear to start
39
39
40
-
If you set the **Provisioning Status** to be **On** in the **Azure Active Directory >Enterprise Apps >\[Application Name\]>Provisioning** section of the Azure portal. However no other status details are shown on that page after subsequent reloads. It is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs** described above to determine what operations the service is performing, and if there are any errors.
40
+
If you set the **Provisioning Status** to be **On** in the **Identity** > **Applications** > **Enterprise applications** > [Application Name\]> **Provisioning** section of the Microsoft Entra admin center. However no other status details are shown on that page after subsequent reloads. It is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs** described above to determine what operations the service is performing, and if there are any errors.
41
41
42
42
>[!NOTE]
43
43
>An initial cycle can take anywhere from 20 minutes to several hours, depending on the size of the Azure AD directory and the number of users in scope for provisioning. Subsequent syncs after the initial cycle be faster, as the provisioning service stores watermarks that represent the state of both systems after the initial cycle, improving performance of subsequent syncs.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-configuration-api.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,14 +8,14 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 10/06/2022
11
+
ms.date: 09/15/2023
12
12
ms.author: kenwith
13
13
ms.reviewer: arvinh
14
14
---
15
15
16
16
# Configure provisioning using Microsoft Graph APIs
17
17
18
-
The Azure portal is a convenient way to configure provisioning for individual apps one at a time. But if you're creating several—or even hundreds—of instances of an application, it can be easier to automate app creation and configuration with the Microsoft Graph APIs. This article outlines how to automate provisioning configuration through APIs. This method is commonly used for applications like [Amazon Web Services](../saas-apps/amazon-web-service-tutorial.md#configure-azure-ad-sso).
18
+
The Microsoft Entra admin center is a convenient way to configure provisioning for individual apps one at a time. But if you're creating several—or even hundreds—of instances of an application, it can be easier to automate app creation and configuration with the Microsoft Graph APIs. This article outlines how to automate provisioning configuration through APIs. This method is commonly used for applications like [Amazon Web Services](../saas-apps/amazon-web-service-tutorial.md#configure-azure-ad-sso).
19
19
20
20
**Overview of steps for using Microsoft Graph APIs to automate provisioning configuration**
Test the connection with the third-party application. The following example is for an application that requires a client secret and secret token. Each application has its own requirements. Applications often use a base address in place of a client secret. To determine what credentials your app requires, go to the provisioning configuration page for your application, and in developer mode, click **test connection**. The network traffic will show the parameters used for credentials. For a full list of credentials, see [synchronizationJob: validateCredentials](/graph/api/synchronization-synchronizationjob-validatecredentials?tabs=http&view=graph-rest-beta&preserve-view=true). Most applications, such as Azure Databricks, rely on a BaseAddress and SecretToken. The BaseAddress is referred to as a tenant URL in the Azure portal.
216
+
Test the connection with the third-party application. The following example is for an application that requires a client secret and secret token. Each application has its own requirements. Applications often use a base address in place of a client secret. To determine what credentials your app requires, go to the provisioning configuration page for your application, and in developer mode, click **test connection**. The network traffic will show the parameters used for credentials. For a full list of credentials, see [synchronizationJob: validateCredentials](/graph/api/synchronization-synchronizationjob-validatecredentials?tabs=http&view=graph-rest-beta&preserve-view=true). Most applications, such as Azure Databricks, rely on a BaseAddress and SecretToken. The BaseAddress is referred to as a tenant URL in the Microsoft Entra admin center.
Copy file name to clipboardExpand all lines: articles/active-directory/app-proxy/application-proxy-configure-custom-home-page.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ You can set the home page URL either through the Microsoft Entra admin center or
47
47
48
48
To change the home page URL of your app through the Microsoft Entra admin center, follow these steps:
49
49
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
50
-
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses
50
+
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
51
51
1. Browse to **Identity** > **Applications** > **App registrations**. The list of registered apps appears.
52
52
1. Choose your app from the list. A page showing the details of the registered app appears.
0 commit comments