Skip to content

Commit bba9884

Browse files
authored
Merge pull request #100304 from MicrosoftDocs/master
1/07 AM Publish
2 parents f214986 + 3d9e55c commit bba9884

File tree

60 files changed

+1450
-775
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+1450
-775
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18550,6 +18550,11 @@
1855018550
"redirect_url": "/azure/service-fabric/service-fabric-tutorial-deploy-app-to-party-cluster",
1855118551
"redirect_document_id": false
1855218552
},
18553+
{
18554+
"source_path": "articles/migrate/troubleshooting-general.md",
18555+
"redirect_url": "troubleshoot-general",
18556+
"redirect_document_id": false
18557+
},
1855318558
{
1855418559
"source_path": "articles/migrate/preserve-drive-letter-protected-virtual-machines-failed-migrated-azure.md",
1855518560
"redirect_url": "prepare-for-migration",

articles/active-directory/manage-apps/how-provisioning-works.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,7 @@ You can customize the default attribute-mappings according to your business need
5858

5959
When you configure provisioning to a SaaS application, one of the types of attribute mappings that you can specify is an expression mapping. For these mappings, you must write a script-like expression that allows you to transform your users’ data into formats that are more acceptable for the SaaS application. For details, see [Writing expressions for attribute mappings](functions-for-customizing-application-data.md).
6060

61+
## Scoping
6162
### Assignment-based scoping
6263

6364
For outbound provisioning from Azure AD to a SaaS application, relying on [user or group assignments](assign-user-or-group-access-portal.md) is the most common way to determine which users are in scope for provisioning. Because user assignments are also used for enabling single sign-on, the same method can be used for managing both access and provisioning. Assignment-based scoping doesn't apply to inbound provisioning scenarios such as Workday and Successfactors.

articles/active-directory/saas-apps/google-apps-provisioning-tutorial.md

Lines changed: 29 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,8 @@ ms.service: active-directory
1111
ms.subservice: saas-app-tutorial
1212
ms.workload: identity
1313
ms.tgt_pltfrm: na
14-
ms.devlang: na
1514
ms.topic: article
16-
ms.date: 03/27/2019
15+
ms.date: 01/06/2020
1716
ms.author: jeedes
1817

1918
ms.collection: M365-identity-device-management
@@ -61,18 +60,18 @@ Before configuring G Suite for automatic user provisioning with Azure AD, you wi
6160

6261
![Select security.][10]
6362

64-
2. On the **Security** page, select **API Reference**.
63+
1. On the **Security** page, select **API Reference**.
6564

6665
![Select API Reference.][15]
6766

68-
3. Select **Enable API access**.
67+
1. Select **Enable API access**.
6968

7069
![Select API Reference.][16]
7170

7271
> [!IMPORTANT]
7372
> For every user that you intend to provision to G Suite, their user name in Azure AD **must** be tied to a custom domain. For example, user names that look like [email protected] are not accepted by G Suite. On the other hand, [email protected] is accepted. You can change an existing user's domain by following the instructions [here](https://docs.microsoft.com/azure/active-directory/fundamentals/add-custom-domain).
7473
75-
4. Once you have added and verified your desired custom domains with Azure AD, you must verify them again with G Suite. To verify domains in G Suite, refer to the following steps:
74+
1. Once you have added and verified your desired custom domains with Azure AD, you must verify them again with G Suite. To verify domains in G Suite, refer to the following steps:
7675

7776
a. In the [G Suite Admin Console](https://admin.google.com/), select **Domains**.
7877

@@ -90,11 +89,11 @@ Before configuring G Suite for automatic user provisioning with Azure AD, you wi
9089

9190
e. Repeat the preceding steps for any additional domains that you intend to add to G Suite.
9291

93-
5. Next, determine which admin account you want to use to manage user provisioning in G Suite. Navigate to **Admin Roles**.
92+
1. Next, determine which admin account you want to use to manage user provisioning in G Suite. Navigate to **Admin Roles**.
9493

9594
![Select Google Apps][26]
96-
97-
6. For the **Admin role** of that account, edit the **Privileges** for that role. Make sure to enable all **Admin API Privileges** so that this account can be used for provisioning.
95+
96+
1. For the **Admin role** of that account, edit the **Privileges** for that role. Make sure to enable all **Admin API Privileges** so that this account can be used for provisioning.
9897

9998
![Select Google Apps][27]
10099

@@ -106,15 +105,15 @@ To configure G Suite for automatic user provisioning with Azure AD, you will nee
106105

107106
![The Azure Active Directory button](common/select-azuread.png)
108107

109-
2. Go to **Enterprise applications**, and then select **All applications**.
108+
1. Go to **Enterprise applications**, and then select **All applications**.
110109

111110
![The Enterprise applications blade](common/enterprise-applications.png)
112111

113-
3. To add a new application, select the **New application** button at the top of the pane.
112+
1. To add a new application, select the **New application** button at the top of the pane.
114113

115114
![The New application button](common/add-new-app.png)
116115

117-
4. In the search box, enter **G Suite**, select **G Suite** in the results panel, and then click the **Add** button to add the application.
116+
1. In the search box, enter **G Suite**, select **G Suite** in the results panel, and then click the **Add** button to add the application.
118117

119118
![G Suite in the results list](common/search-new-app.png)
120119

@@ -134,66 +133,69 @@ This section guides you through the steps to configure the Azure AD provisioning
134133

135134
![Enterprise applications blade](common/enterprise-applications.png)
136135

137-
2. In the applications list, select **G Suite**.
136+
1. In the applications list, select **G Suite**.
138137

139138
![The G Suite link in the Applications list](common/all-applications.png)
140139

141-
3. Select the **Provisioning** tab.
140+
1. Select the **Provisioning** tab.
142141

143142
![Provisioning tab](common/provisioning.png)
144143

145-
4. Set the **Provisioning Mode** to **Automatic**.
144+
1. Set the **Provisioning Mode** to **Automatic**.
146145

147146
![Provisioning tab](common/provisioning-automatic.png)
148147

149-
5. Under the **Admin Credentials** section, select **Authorize**. It opens a Google authorization dialog box in a new browser window.
148+
1. Under the **Admin Credentials** section, select **Authorize**. It opens a Google authorization dialog box in a new browser window.
150149

151150
![G Suite Authorize](media/google-apps-provisioning-tutorial/authorize.png)
152151

153-
6. Confirm that you want to give Azure AD permissions to make changes to your G Suite tenant. Select **Accept**.
152+
1. Confirm that you want to give Azure AD permissions to make changes to your G Suite tenant. Select **Accept**.
154153

155154
![Confirm permissions.][28]
156155

157-
7. In the Azure portal, select **Test Connection** to ensure that Azure AD can connect to your app. If the connection fails, ensure that your G Suite account has Team Admin permissions. Then try the **Authorize** step again.
156+
1. In the Azure portal, select **Test Connection** to ensure that Azure AD can connect to your app. If the connection fails, ensure that your G Suite account has Team Admin permissions. Then try the **Authorize** step again.
158157

159-
8. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
158+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
160159

161160
![Notification Email](common/provisioning-notification-email.png)
162161

163-
8. Click **Save**.
162+
1. Click **Save**.
164163

165-
9. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to G Suite**.
164+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to G Suite**.
166165

167166
![G Suite User Mappings](media/google-apps-provisioning-tutorial/usermappings.png)
168167

169-
10. Review the user attributes that are synchronized from Azure AD to G Suite in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in G Suite for update operations. Select the **Save** button to commit any changes.
168+
1. Review the user attributes that are synchronized from Azure AD to G Suite in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in G Suite for update operations. Select the **Save** button to commit any changes.
170169

171170
![G Suite User Attributes](media/google-apps-provisioning-tutorial/userattributes.png)
172171

173-
11. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to G Suite**.
172+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to G Suite**.
174173

175174
![G Suite Group Mappings](media/google-apps-provisioning-tutorial/groupmappings.png)
176175

177-
12. Review the group attributes that are synchronized from Azure AD to G Suite in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in G Suite for update operations. Select the **Save** button to commit any changes. The UI displays the default set of attribute mappings between Azure AD and G Suite. You can choose to add additional attributes such as Org Unit by clicking add new mapping.
176+
1. Review the group attributes that are synchronized from Azure AD to G Suite in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in G Suite for update operations. Select the **Save** button to commit any changes. The UI displays the default set of attribute mappings between Azure AD and G Suite. You can choose to add additional attributes such as Org Unit by clicking add new mapping.
178177

179178
![G Suite Group Attributes](media/google-apps-provisioning-tutorial/groupattributes.png)
180179

181-
13. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
180+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
182181

183-
14. To enable the Azure AD provisioning service for G Suite, change the **Provisioning Status** to **On** in the **Settings** section.
182+
1. To enable the Azure AD provisioning service for G Suite, change the **Provisioning Status** to **On** in the **Settings** section.
184183

185184
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
186185

187-
15. Define the users and/or groups that you would like to provision to G Suite by choosing the desired values in **Scope** in the **Settings** section.
186+
1. Define the users and/or groups that you would like to provision to G Suite by choosing the desired values in **Scope** in the **Settings** section.
188187

189188
![Provisioning Scope](common/provisioning-scope.png)
190189

191-
16. When you are ready to provision, click **Save**.
190+
1. When you are ready to provision, click **Save**.
192191

193192
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
194193

195194
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity report, which describes all actions performed by the Azure AD provisioning service on G Suite.
196195

196+
> [!NOTE]
197+
> If the users already have an existing personal/consumer account using the email address of the Azure AD user, then it may cause some issue which could be resolved by using the Google Transfer Tool prior to performing the directory sync.
198+
197199
For more information on how to read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
198200

199201
## Additional resources
@@ -208,7 +210,6 @@ For more information on how to read the Azure AD provisioning logs, see [Reporti
208210

209211
* [Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md)
210212

211-
212213
<!--Image references-->
213214

214215
[10]: ./media/google-apps-provisioning-tutorial/gapps-security.png
-3.51 KB
Loading
-967 Bytes
Loading
-5.84 KB
Loading
-3.36 KB
Loading
-9.87 KB
Loading
1.41 KB
Loading

articles/app-service/containers/tutorial-ruby-postgres-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ When the Azure Database for PostgreSQL server is created, the Azure CLI shows in
146146
In the Cloud Shell, create a firewall rule for your Postgres server to allow client connections by using the [`az postgres server firewall-rule create`](/cli/azure/postgres/server/firewall-rule?view=azure-cli-latest#az-postgres-server-firewall-rule-create) command. When both starting IP and end IP are set to 0.0.0.0, the firewall is only opened for other Azure resources. Substitute a unique server name for the *\<postgres-server-name>* placeholder.
147147

148148
```azurecli-interactive
149-
az postgres server firewall-rule create --resource-group myResourceGroup --server <postgres-server-name> --name AllowAllIps --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255
149+
az postgres server firewall-rule create --resource-group myResourceGroup --server <postgres-server-name> --name AllowAllIps --start-ip-address 0.0.0.0 --end-ip-address 0.0.0.0
150150
```
151151

152152
> [!TIP]
@@ -506,4 +506,4 @@ Advance to the next tutorial to learn how to map a custom DNS name to your app.
506506
Or, check out other resources:
507507

508508
> [!div class="nextstepaction"]
509-
> [Configure Ruby app](configure-language-ruby.md)
509+
> [Configure Ruby app](configure-language-ruby.md)

0 commit comments

Comments
 (0)