Skip to content

Commit b63752d

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 6aa8416 + b7b0d9f commit b63752d

File tree

80 files changed

+1204
-641
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+1204
-641
lines changed
Lines changed: 160 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,160 @@
1+
---
2+
title: 'Tutorial: Configure Elium for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to Elium.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: zchia
7+
writer: zchia
8+
manager: beatrizd
9+
10+
ms.assetid: fb48deae-4653-448a-ba2f-90258edab3a7
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: article
17+
ms.date: 08/19/2019
18+
ms.author: Zhchia
19+
---
20+
21+
# Tutorial: Configure Elium for automatic user provisioning
22+
23+
The objective of this tutorial is to demonstrate the steps to be performed in Elium and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and de-provision users and/or groups to Elium.
24+
25+
> [!NOTE]
26+
> This tutorial describes a connector built on top of the Azure AD User Provisioning Service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
27+
>
28+
> This connector is currently in Public Preview. For more information on the general Microsoft Azure terms of use for Preview features, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
29+
30+
## Prerequisites
31+
32+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
33+
34+
* An Azure AD tenant.
35+
* [A Elium tenant](https://www.elium.com/pricing/)
36+
* A user account in Elium with Admin permissions.
37+
38+
## Assigning users to Elium
39+
40+
Azure Active Directory uses a concept called *assignments* to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users and/or groups that have been assigned to an application in Azure AD are synchronized.
41+
42+
Before configuring and enabling automatic user provisioning, you should decide which users and/or groups in Azure AD need access to Elium. Once decided, you can assign these users and/or groups to Elium by following the instructions here:
43+
* [Assign a user or group to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md)
44+
45+
## Important tips for assigning users to Elium
46+
47+
* It is recommended that a single Azure AD user is assigned to Elium to test the automatic user provisioning configuration. Additional users and/or groups may be assigned later.
48+
49+
* When assigning a user to Elium, you must select any valid application-specific role (if available) in the assignment dialog. Users with the **Default Access** role are excluded from provisioning.
50+
51+
## Set up Elium for provisioning
52+
53+
Before configuring Elium for automatic user provisioning with Azure AD, you will need to enable SCIM provisioning on Elium.
54+
55+
1. Login into Elium. Navigate to **My Profile** > **Settings**.
56+
57+
![Elium](media/Elium-provisioning-tutorial/setting.png)
58+
59+
2. On the Bottom-left corner Under ADVANCED Select **Security**.
60+
61+
![Elium](media/Elium-provisioning-tutorial/security.png)
62+
63+
3. Copy the **Secret token**. This value will be entered in the **Secret Token** field in the Provisioning tab of your Elium application in the Azure portal.
64+
65+
![Elium](media/Elium-provisioning-tutorial/token.png)
66+
67+
68+
## Add Elium from the gallery
69+
70+
To configure Elium for automatic user provisioning with Azure AD, you need to add Elium from the Azure AD application gallery to your list of managed SaaS applications.
71+
72+
**To add Elium from the Azure AD application gallery, perform the following steps:**
73+
74+
1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**.
75+
76+
![The Azure Active Directory button](common/select-azuread.png)
77+
78+
2. Go to **Enterprise applications**, and then select **All applications**.
79+
80+
![The Enterprise applications blade](common/enterprise-applications.png)
81+
82+
3. To add a new application, select the **New application** button at the top of the pane.
83+
84+
![The New application button](common/add-new-app.png)
85+
86+
4. In the search box, enter **Elium**, select **Elium** in the results panel, and then click the **Add** button to add the application.
87+
88+
![Elium in the results list](common/search-new-app.png)
89+
90+
## Configuring automatic user provisioning to Elium
91+
92+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Elium based on user and/or group assignments in Azure AD.
93+
94+
> [!TIP]
95+
> You may also choose to enable SAML-based single sign-on for Elium, following the instructions provided in the [Elium Single sign-on tutorial](Elium-tutorial.md). Single sign-on can be configured independently of automatic user provisioning, though these two features compliment each other
96+
97+
### To configure automatic user provisioning for Elium in Azure AD:
98+
99+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
100+
101+
![Enterprise applications blade](common/enterprise-applications.png)
102+
103+
2. In the applications list, select **Elium**.
104+
105+
![The Elium link in the Applications list](common/all-applications.png)
106+
107+
3. Select the **Provisioning** tab.
108+
109+
![Provisioning tab](common/provisioning.png)
110+
111+
4. Set the **Provisioning Mode** to **Automatic**.
112+
113+
![Provisioning tab](common/provisioning-automatic.png)
114+
115+
5. Under the Admin Credentials section, input `<tenantURL>/scim/v2` where **{TeanantURL}** is the value retrieved earlier from the Elium Admin Console. Input the **Secret token** value in **Secret Token** Click **Test connection** to ensure Azure AD can connect to Elium. If the connection fails, ensure your Elium has admin permissions and try again.
116+
117+
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
118+
119+
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
120+
121+
![Notification Email](common/provisioning-notification-email.png)
122+
123+
7. Click **Save**.
124+
125+
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Elium**.
126+
127+
![Elium user Mappings](media/Elium-provisioning-tutorial/usermapping.png)
128+
129+
9. Review the user attributes that are synchronized from Azure AD to Elium in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Elium for update operations. Select the **Save** button to commit any changes.
130+
131+
![Elium user Attributes](media/Elium-provisioning-tutorial/userattribute.png)
132+
133+
134+
11. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
135+
136+
12. To enable the Azure AD provisioning service for Elium, change the **Provisioning Status** to **On** in the **Settings** section.
137+
138+
![Provisioning Status toggled On](common/provisioning-toggle-on.png)
139+
140+
13. Define the users and/or groups that you would like to provision to Elium by choosing the desired values in **Scope** in the **Settings** section.
141+
142+
![Provisioning Scope](common/provisioning-scope.png)
143+
144+
14. When you are ready to provision, click **Save**.
145+
146+
![Saving provisioning configuration](common/provisioning-configuration-save.png)
147+
148+
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs. For more information on how long it will take for users and/or groups to provision, see [How long will it take to provision users](../manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md#how-long-will-it-take-to-provision-users).
149+
150+
You can use the **Current Status** section to monitor progress and follow links to your provisioning activity report, which describes all actions performed by the Azure AD provisioning service on Elium. For more information, see [Check the status of user provisioning](../manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md). To read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
151+
152+
153+
## Additional resources
154+
155+
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md).
156+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
157+
158+
## Next steps
159+
160+
* [Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md)
Lines changed: 168 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,168 @@
1+
---
2+
title: 'Tutorial: Configure Foodee for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to Foodee.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: zchia
7+
writer: zchia
8+
manager: beatrizd
9+
10+
ms.assetid: fb48deae-4653-448a-ba2f-90258edab3a7
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: article
17+
ms.date: 08/30/2019
18+
ms.author: Zhchia
19+
---
20+
21+
# Tutorial: Configure Foodee for automatic user provisioning
22+
23+
The objective of this tutorial is to demonstrate the steps to be performed in Foodee and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and de-provision users and/or groups to Foodee.
24+
25+
> [!NOTE]
26+
> This tutorial describes a connector built on top of the Azure AD User Provisioning Service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
27+
>
28+
> This connector is currently in Public Preview. For more information on the general Microsoft Azure terms of use for Preview features, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
29+
30+
## Prerequisites
31+
32+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
33+
34+
* An Azure AD tenant.
35+
* [A Foodee tenant](https://Foodee.com/pricing/)
36+
* A user account in Foodee with Admin permissions.
37+
38+
## Assigning users to Foodee
39+
40+
Azure Active Directory uses a concept called *assignments* to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users and/or groups that have been assigned to an application in Azure AD are synchronized.
41+
42+
Before configuring and enabling automatic user provisioning, you should decide which users and/or groups in Azure AD need access to Foodee. Once decided, you can assign these users and/or groups to Foodee by following the instructions here:
43+
* [Assign a user or group to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md)
44+
45+
## Important tips for assigning users to Foodee
46+
47+
* It is recommended that a single Azure AD user is assigned to Foodee to test the automatic user provisioning configuration. Additional users and/or groups may be assigned later.
48+
49+
* When assigning a user to Foodee, you must select any valid application-specific role (if available) in the assignment dialog. Users with the **Default Access** role are excluded from provisioning.
50+
51+
## Setup Foodee for provisioning
52+
53+
Before configuring Foodee for automatic user provisioning with Azure AD, you will need to enable SCIM provisioning on Foodee.
54+
55+
1. Log in into [Foodee](https://www.food.ee/login/). Click on your **Tenant ID**
56+
57+
![Foodee](media/Foodee-provisioning-tutorial/tenant.png)
58+
59+
2. Under Enterprise portal > Select **Single Sign On**.
60+
61+
![Foodee](media/Foodee-provisioning-tutorial/scim.png)
62+
63+
3. Copy the **API Token**. These values will be entered in the **Secret Token** field in the Provisioning tab of your Foodee application in the Azure portal.
64+
65+
![Foodee](media/Foodee-provisioning-tutorial/token.png)
66+
67+
68+
## Add Foodee from the gallery
69+
70+
To configure Foodee for automatic user provisioning with Azure AD, you need to add Foodee from the Azure AD application gallery to your list of managed SaaS applications.
71+
72+
**To add Foodee from the Azure AD application gallery, perform the following steps:**
73+
74+
1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**.
75+
76+
![The Azure Active Directory button](common/select-azuread.png)
77+
78+
2. Go to **Enterprise applications**, and then select **All applications**.
79+
80+
![The Enterprise applications blade](common/enterprise-applications.png)
81+
82+
3. To add a new application, select the **New application** button at the top of the pane.
83+
84+
![The New application button](common/add-new-app.png)
85+
86+
4. In the search box, enter **Foodee**, select **Foodee** in the results panel, and then click the **Add** button to add the application.
87+
88+
![Foodee in the results list](common/search-new-app.png)
89+
90+
## Configuring automatic user provisioning to Foodee
91+
92+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Foodee based on user and/or group assignments in Azure AD.
93+
94+
> [!TIP]
95+
> You may also choose to enable SAML-based single sign-on for Foodee, following the instructions provided in the [Foodee Single sign-on tutorial](Foodee-tutorial.md). Single sign-on can be configured independently of automatic user provisioning, though these two features complement each other.
96+
97+
### To configure automatic user provisioning for Foodee in Azure AD:
98+
99+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
100+
101+
![Enterprise applications blade](common/enterprise-applications.png)
102+
103+
2. In the applications list, select **Foodee**.
104+
105+
![The Foodee link in the Applications list](common/all-applications.png)
106+
107+
3. Select the **Provisioning** tab.
108+
109+
![Provisioning tab](common/provisioning.png)
110+
111+
4. Set the **Provisioning Mode** to **Automatic**.
112+
113+
![Provisioning tab](common/provisioning-automatic.png)
114+
115+
5. Under the Admin Credentials section, input the ` https://concierge.food.ee/scim/v2` and **API Token** values retrieved earlier in **Tenant URL** and **Secret Token** respectively. Click **Test Connection** to ensure Azure AD can connect to Foodee. If the connection fails, ensure your Foodee account has Admin permissions and try again.
116+
117+
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
118+
119+
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
120+
121+
![Notification Email](common/provisioning-notification-email.png)
122+
123+
7. Click **Save**.
124+
125+
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Foodee**.
126+
127+
![Foodee User Mappings](media/Foodee-provisioning-tutorial/usermapping.png)
128+
129+
9. Review the user attributes that are synchronized from Azure AD to Foodee in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Foodee for update operations. Select the **Save** button to commit any changes.
130+
131+
![Foodee User Attributes](media/Foodee-provisioning-tutorial/userattribute.png)
132+
133+
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to **Foodee**
134+
135+
![Foodee User Attributes](media/Foodee-provisioning-tutorial/groupmapping.png)
136+
137+
11. Review the user attributes that are synchronized from Azure AD to Foodee in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the group accounts in Foodee for update operations. Select the **Save** button to commit any changes.
138+
139+
![Foodee User Attributes](media/Foodee-provisioning-tutorial/groupattribute.png)
140+
141+
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
142+
143+
13. To enable the Azure AD provisioning service for Foodee, change the **Provisioning Status** to **On** in the **Settings** section.
144+
145+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
146+
147+
14. Define the users and/or groups that you would like to provision to Foodee by choosing the desired values in **Scope** in the **Settings** section.
148+
149+
![Provisioning Scope](common/provisioning-scope.png)
150+
151+
15. When you are ready to provision, click **Save**.
152+
153+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
154+
155+
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs. For more information on how long it will take for users and/or groups to provision, see [How long will it take to provision users](../manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md#how-long-will-it-take-to-provision-users).
156+
157+
You can use the **Current Status** section to monitor progress and follow links to your provisioning activity report, which describes all actions performed by the Azure AD provisioning service on Foodee. For more information, see [Check the status of user provisioning](../manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md). To read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
158+
159+
160+
161+
## Additional resources
162+
163+
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
164+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
165+
166+
## Next steps
167+
168+
* [Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md)
2.7 KB
Loading
8.68 KB
Loading
16.6 KB
Loading
39.6 KB
Loading
9.69 KB
Loading
12.8 KB
Loading
20 KB
Loading
18.4 KB
Loading

0 commit comments

Comments
 (0)