Skip to content

Commit b24108b

Browse files
authored
Merge pull request #251717 from kenwith/admin-center-app-provisioning-steps-3
Updates instructions for new branding portal.
2 parents 3761f4c + 352ceae commit b24108b

9 files changed

+40
-41
lines changed

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 11 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 05/12/2023
11+
ms.date: 09/15/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
zone_pivot_groups: app-provisioning-cross-tenant-synchronization
@@ -30,28 +30,24 @@ You use accidental deletions to specify a deletion threshold. Anything above the
3030

3131
To enable accidental deletion prevention:
3232

33-
1. In the Azure portal, select **Azure Active Directory**.
34-
3533
::: zone pivot="app-provisioning"
36-
2. Select **Enterprise applications** and then select your application.
37-
38-
3. Select **Provisioning** and then on the provisioning page select **Edit provisioning**.
34+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
35+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
36+
1. Select your application.
37+
1. Select **Provisioning** and then on the provisioning page select **Edit provisioning**.
3938
::: zone-end
4039

4140
::: zone pivot="cross-tenant-synchronization"
42-
2. Select **Cross-tenant synchronization** > **Configurations** and then select your configuration.
43-
44-
3. Select **Provisioning**.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
42+
1. Browse to **Identity** > **External Identities** > **Cross-tenant synchronization** > **Configurations** and then select your configuration.
43+
1. Select **Provisioning**.
4544
::: zone-end
4645

47-
4. Under **Settings**, select the **Prevent accidental deletions** check box and specify a deletion
46+
1. Under **Settings**, select the **Prevent accidental deletions** check box and specify a deletion
4847
threshold.
49-
50-
5. Ensure the **Notification Email** address is completed.
51-
48+
1. Ensure the **Notification Email** address is completed.
5249
If the deletion threshold is met, an email is sent.
53-
54-
6. Select **Save** to save the changes.
50+
1. Select **Save** to save the changes.
5551

5652
When the deletion threshold is met, the job goes into quarantine, and a notification email is sent. The quarantined job can then be allowed or rejected. To learn more about quarantine behavior, see [Application provisioning in quarantine status](application-provisioning-quarantine-status.md).
5753

articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 10/06/2022
11+
ms.date: 09/15/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -25,7 +25,7 @@ After automatic provisioning has been configured for an application (including v
2525

2626
If you observe that users are not being provisioned, consult the [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) in Azure AD. Search for log entries for a specific user.
2727

28-
You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs (preview)** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
28+
You can access the provisioning logs in the Microsoft Entra admin center by browsing to **Identity** > **Applications** > **Enterprise applications** > **Provisioning logs**. You can also select a specific application and then select **Provisioning logs** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
2929

3030
The provisioning logs record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning, querying the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison.
3131

@@ -36,7 +36,7 @@ Below is a list of the general problem areas that you can drill into if you have
3636
- [Provisioning logs say users are skipped and not provisioned, even though they are assigned](#provisioning-logs-say-users-are-skipped-and-not-provisioned-even-though-they-are-assigned)
3737

3838
## Provisioning service does not appear to start
39-
If you set the **Provisioning Status** to be **On** in the **Azure Active Directory > Enterprise Apps > \[Application Name\] >Provisioning** section of the Azure portal. However no other status details are shown on that page after subsequent reloads, it is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs (preview)** described above to determine what operations the service is performing, and if there are any errors.
39+
If you set the **Provisioning Status** to be **On** in the **Enterprise applications > \[Application Name\] >Provisioning** section of the Microsoft Entra admin center. However no other status details are shown on that page after subsequent reloads, it is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs (preview)** described above to determine what operations the service is performing, and if there are any errors.
4040

4141
>[!NOTE]
4242
>An initial cycle can take anywhere from 20 minutes to several hours, depending on the size of the Azure AD directory and the number of users in scope for provisioning. Subsequent syncs after the initial cycle are faster, as the provisioning service stores watermarks that represent the state of both systems after the initial cycle. The initial cycle improves performance of subsequent syncs.

articles/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 10/06/2022
11+
ms.date: 09/15/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -236,11 +236,12 @@ Below are sample requests to help outline what the sync engine currently sends v
236236
## Upgrading from the older customappsso job to the SCIM job
237237
Following the steps below will delete your existing customappsso job and create a new SCIM job.
238238

239-
1. Sign in to the [Azure portal](https://portal.azure.com).
240-
2. In the **Azure Active Directory > Enterprise Applications** section of the Azure portal, locate and select your existing SCIM application.
241-
3. In the **Properties** section of your existing SCIM app, copy the **Object ID**.
242-
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
243-
5. In the Graph Explorer, run the command below to locate the ID of your provisioning job. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
239+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
240+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
241+
1. Locate and select your existing SCIM application.
242+
1. In the **Properties** section of your existing SCIM app, copy the **Object ID**.
243+
1. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
244+
1. In the Graph Explorer, run the command below to locate the ID of your provisioning job. Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
244245

245246
`GET https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs`
246247

@@ -275,11 +276,13 @@ Following the steps below will delete your existing customappsso job and create
275276
## Downgrading from the SCIM job to the customappsso job (not recommended)
276277
We allow you to downgrade back to the old behavior but don't recommend it as the customappsso does not benefit from some of the updates we make, and may not be supported forever.
277278

278-
1. Sign in to the [Azure portal](https://portal.azure.com).
279-
2. In the **Azure Active Directory > Enterprise Applications > Create application** section of the Azure portal, create a new **Non-gallery** application.
280-
3. In the **Properties** section of your new custom app, copy the **Object ID**.
281-
4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
282-
5. In the Graph Explorer, run the command below to initialize the provisioning configuration for your app.
279+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
280+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
281+
282+
1. In the **Create application** section, create a new **Non-gallery** application.
283+
1. In the **Properties** section of your new custom app, copy the **Object ID**.
284+
1. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added.
285+
1. In the Graph Explorer, run the command below to initialize the provisioning configuration for your app.
283286
Replace "[object-id]" with the service principal ID (object ID) copied from the third step.
284287

285288
`POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs`

articles/active-directory/app-provisioning/application-provisioning-config-problem.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,24 +8,24 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 10/06/2022
11+
ms.date: 09/15/2023
1212
ms.author: kenwith
1313
ms.reviewer: asteen, arvinh
1414
---
1515

1616
# Problem configuring user provisioning to an Azure AD Gallery application
1717

18-
Configuring [automatic user provisioning](user-provisioning.md) for an app (where supported), requires that specific instructions be followed to prepare the application for automatic provisioning. Then you can use the Azure portal to configure the provisioning service to synchronize user accounts to the application.
18+
Configuring [automatic user provisioning](user-provisioning.md) for an app (where supported), requires that specific instructions be followed to prepare the application for automatic provisioning. Then you can use the Microsoft Entra admin center to configure the provisioning service to synchronize user accounts to the application.
1919

2020
You should always start by finding the setup tutorial specific to setting up provisioning for your application. Then follow those steps to configure both the app and Azure AD to create the provisioning connection. A list of app tutorials can be found at [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](../saas-apps/tutorial-list.md).
2121

2222
## How to see if provisioning is working
2323

2424
Once the service is configured, most insights into the operation of the service can be drawn from two places:
2525

26-
- **Provisioning logs (preview)** – The [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning. Query the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison. You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs (preview)** in the **Activity** section.
26+
- **Provisioning logs (preview)** – The [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) record all the operations performed by the provisioning service, including querying Azure AD for assigned users that are in scope for provisioning. Query the target app for the existence of those users, comparing the user objects between the system. Then add, update, or disable the user account in the target system based on the comparison. You can access the provisioning logs in the Microsoft Entra admin center by selecting **Identity** > **Applications** > **Enterprise applications** > **Provisioning logs** in the **Activity** section.
2727

28-
- **Current status –** A summary of the last provisioning run for a given app can be seen in the **Azure Active Directory > Enterprise Apps > \[Application Name\] >Provisioning** section, at the bottom of the screen under the service settings. The Current Status section shows whether a provisioning cycle has started provisioning user accounts. You can watch the progress of the cycle, see how many users and groups have been provisioned, and see how many roles are created. If there are any errors, details can be found in the [Provisioning logs (../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
28+
- **Current status –** A summary of the last provisioning run for a given app can be seen in the **Identity** > **Applications** > **Enterprise applications** > \[Application Name\] > **Provisioning** section, at the bottom of the screen under the service settings. The Current Status section shows whether a provisioning cycle has started provisioning user accounts. You can watch the progress of the cycle, see how many users and groups have been provisioned, and see how many roles are created. If there are any errors, details can be found in the [Provisioning logs (../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
2929

3030
## General problem areas with provisioning to consider
3131

@@ -37,7 +37,7 @@ Below is a list of the general problem areas that you can drill into if you have
3737

3838
## Provisioning service does not appear to start
3939

40-
If you set the **Provisioning Status** to be **On** in the **Azure Active Directory > Enterprise Apps > \[Application Name\] >Provisioning** section of the Azure portal. However no other status details are shown on that page after subsequent reloads. It is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs** described above to determine what operations the service is performing, and if there are any errors.
40+
If you set the **Provisioning Status** to be **On** in the **Identity** > **Applications** > **Enterprise applications** > [Application Name\] > **Provisioning** section of the Microsoft Entra admin center. However no other status details are shown on that page after subsequent reloads. It is likely that the service is running but has not completed an initial cycle yet. Check the **Provisioning logs** described above to determine what operations the service is performing, and if there are any errors.
4141

4242
>[!NOTE]
4343
>An initial cycle can take anywhere from 20 minutes to several hours, depending on the size of the Azure AD directory and the number of users in scope for provisioning. Subsequent syncs after the initial cycle be faster, as the provisioning service stores watermarks that represent the state of both systems after the initial cycle, improving performance of subsequent syncs.

articles/active-directory/app-provisioning/application-provisioning-configuration-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 10/06/2022
11+
ms.date: 09/15/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
1515

1616
# Configure provisioning using Microsoft Graph APIs
1717

18-
The Azure portal is a convenient way to configure provisioning for individual apps one at a time. But if you're creating several—or even hundreds—of instances of an application, it can be easier to automate app creation and configuration with the Microsoft Graph APIs. This article outlines how to automate provisioning configuration through APIs. This method is commonly used for applications like [Amazon Web Services](../saas-apps/amazon-web-service-tutorial.md#configure-azure-ad-sso).
18+
The Microsoft Entra admin center is a convenient way to configure provisioning for individual apps one at a time. But if you're creating several—or even hundreds—of instances of an application, it can be easier to automate app creation and configuration with the Microsoft Graph APIs. This article outlines how to automate provisioning configuration through APIs. This method is commonly used for applications like [Amazon Web Services](../saas-apps/amazon-web-service-tutorial.md#configure-azure-ad-sso).
1919

2020
**Overview of steps for using Microsoft Graph APIs to automate provisioning configuration**
2121

@@ -213,7 +213,7 @@ Content-type: application/json
213213

214214
### Test the connection to the application
215215

216-
Test the connection with the third-party application. The following example is for an application that requires a client secret and secret token. Each application has its own requirements. Applications often use a base address in place of a client secret. To determine what credentials your app requires, go to the provisioning configuration page for your application, and in developer mode, click **test connection**. The network traffic will show the parameters used for credentials. For a full list of credentials, see [synchronizationJob: validateCredentials](/graph/api/synchronization-synchronizationjob-validatecredentials?tabs=http&view=graph-rest-beta&preserve-view=true). Most applications, such as Azure Databricks, rely on a BaseAddress and SecretToken. The BaseAddress is referred to as a tenant URL in the Azure portal.
216+
Test the connection with the third-party application. The following example is for an application that requires a client secret and secret token. Each application has its own requirements. Applications often use a base address in place of a client secret. To determine what credentials your app requires, go to the provisioning configuration page for your application, and in developer mode, click **test connection**. The network traffic will show the parameters used for credentials. For a full list of credentials, see [synchronizationJob: validateCredentials](/graph/api/synchronization-synchronizationjob-validatecredentials?tabs=http&view=graph-rest-beta&preserve-view=true). Most applications, such as Azure Databricks, rely on a BaseAddress and SecretToken. The BaseAddress is referred to as a tenant URL in the Microsoft Entra admin center.
217217

218218
#### Request
219219
```msgraph-interactive

articles/active-directory/app-proxy/application-proxy-configure-complex-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/22/2022
11+
ms.date: 09/15/2023
1212
ms.author: dhruvinshah
1313
ms.reviewer: dhruvinshah
1414
---

articles/active-directory/app-proxy/application-proxy-configure-custom-home-page.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ You can set the home page URL either through the Microsoft Entra admin center or
4747

4848
To change the home page URL of your app through the Microsoft Entra admin center, follow these steps:
4949
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
50-
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses
50+
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
5151
1. Browse to **Identity** > **Applications** > **App registrations**. The list of registered apps appears.
5252
1. Choose your app from the list. A page showing the details of the registered app appears.
5353
1. Under **Manage**, select **Branding**.

0 commit comments

Comments
 (0)