You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/how-provisioning-works.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,6 +58,7 @@ You can customize the default attribute-mappings according to your business need
58
58
59
59
When you configure provisioning to a SaaS application, one of the types of attribute mappings that you can specify is an expression mapping. For these mappings, you must write a script-like expression that allows you to transform your users’ data into formats that are more acceptable for the SaaS application. For details, see [Writing expressions for attribute mappings](functions-for-customizing-application-data.md).
60
60
61
+
## Scoping
61
62
### Assignment-based scoping
62
63
63
64
For outbound provisioning from Azure AD to a SaaS application, relying on [user or group assignments](assign-user-or-group-access-portal.md) is the most common way to determine which users are in scope for provisioning. Because user assignments are also used for enabling single sign-on, the same method can be used for managing both access and provisioning. Assignment-based scoping doesn't apply to inbound provisioning scenarios such as Workday and Successfactors.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/google-apps-provisioning-tutorial.md
+29-28Lines changed: 29 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,8 @@ ms.service: active-directory
11
11
ms.subservice: saas-app-tutorial
12
12
ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
-
ms.devlang: na
15
14
ms.topic: article
16
-
ms.date: 03/27/2019
15
+
ms.date: 01/06/2020
17
16
ms.author: jeedes
18
17
19
18
ms.collection: M365-identity-device-management
@@ -61,18 +60,18 @@ Before configuring G Suite for automatic user provisioning with Azure AD, you wi
61
60
62
61
![Select security.][10]
63
62
64
-
2. On the **Security** page, select **API Reference**.
63
+
1. On the **Security** page, select **API Reference**.
65
64
66
65
![Select API Reference.][15]
67
66
68
-
3. Select **Enable API access**.
67
+
1. Select **Enable API access**.
69
68
70
69
![Select API Reference.][16]
71
70
72
71
> [!IMPORTANT]
73
72
> For every user that you intend to provision to G Suite, their user name in Azure AD **must** be tied to a custom domain. For example, user names that look like [email protected] are not accepted by G Suite. On the other hand, [email protected] is accepted. You can change an existing user's domain by following the instructions [here](https://docs.microsoft.com/azure/active-directory/fundamentals/add-custom-domain).
74
73
75
-
4. Once you have added and verified your desired custom domains with Azure AD, you must verify them again with G Suite. To verify domains in G Suite, refer to the following steps:
74
+
1. Once you have added and verified your desired custom domains with Azure AD, you must verify them again with G Suite. To verify domains in G Suite, refer to the following steps:
76
75
77
76
a. In the [G Suite Admin Console](https://admin.google.com/), select **Domains**.
78
77
@@ -90,11 +89,11 @@ Before configuring G Suite for automatic user provisioning with Azure AD, you wi
90
89
91
90
e. Repeat the preceding steps for any additional domains that you intend to add to G Suite.
92
91
93
-
5. Next, determine which admin account you want to use to manage user provisioning in G Suite. Navigate to **Admin Roles**.
92
+
1. Next, determine which admin account you want to use to manage user provisioning in G Suite. Navigate to **Admin Roles**.
94
93
95
94
![Select Google Apps][26]
96
-
97
-
6. For the **Admin role** of that account, edit the **Privileges** for that role. Make sure to enable all **Admin API Privileges** so that this account can be used for provisioning.
95
+
96
+
1. For the **Admin role** of that account, edit the **Privileges** for that role. Make sure to enable all **Admin API Privileges** so that this account can be used for provisioning.
98
97
99
98
![Select Google Apps][27]
100
99
@@ -106,15 +105,15 @@ To configure G Suite for automatic user provisioning with Azure AD, you will nee
106
105
107
106

108
107
109
-
2. Go to **Enterprise applications**, and then select **All applications**.
108
+
1. Go to **Enterprise applications**, and then select **All applications**.
5. Under the **Admin Credentials** section, select **Authorize**. It opens a Google authorization dialog box in a new browser window.
148
+
1. Under the **Admin Credentials** section, select **Authorize**. It opens a Google authorization dialog box in a new browser window.
150
149
151
150

152
151
153
-
6. Confirm that you want to give Azure AD permissions to make changes to your G Suite tenant. Select **Accept**.
152
+
1. Confirm that you want to give Azure AD permissions to make changes to your G Suite tenant. Select **Accept**.
154
153
155
154
![Confirm permissions.][28]
156
155
157
-
7. In the Azure portal, select **Test Connection** to ensure that Azure AD can connect to your app. If the connection fails, ensure that your G Suite account has Team Admin permissions. Then try the **Authorize** step again.
156
+
1. In the Azure portal, select **Test Connection** to ensure that Azure AD can connect to your app. If the connection fails, ensure that your G Suite account has Team Admin permissions. Then try the **Authorize** step again.
158
157
159
-
8. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
158
+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
9. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to G Suite**.
164
+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to G Suite**.
166
165
167
166

168
167
169
-
10. Review the user attributes that are synchronized from Azure AD to G Suite in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in G Suite for update operations. Select the **Save** button to commit any changes.
168
+
1. Review the user attributes that are synchronized from Azure AD to G Suite in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in G Suite for update operations. Select the **Save** button to commit any changes.
170
169
171
170

172
171
173
-
11. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to G Suite**.
172
+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to G Suite**.
174
173
175
174

176
175
177
-
12. Review the group attributes that are synchronized from Azure AD to G Suite in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in G Suite for update operations. Select the **Save** button to commit any changes. The UI displays the default set of attribute mappings between Azure AD and G Suite. You can choose to add additional attributes such as Org Unit by clicking add new mapping.
176
+
1. Review the group attributes that are synchronized from Azure AD to G Suite in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in G Suite for update operations. Select the **Save** button to commit any changes. The UI displays the default set of attribute mappings between Azure AD and G Suite. You can choose to add additional attributes such as Org Unit by clicking add new mapping.
178
177
179
178

180
179
181
-
13. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
180
+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
182
181
183
-
14. To enable the Azure AD provisioning service for G Suite, change the **Provisioning Status** to **On** in the **Settings** section.
182
+
1. To enable the Azure AD provisioning service for G Suite, change the **Provisioning Status** to **On** in the **Settings** section.
184
183
185
184

186
185
187
-
15. Define the users and/or groups that you would like to provision to G Suite by choosing the desired values in **Scope** in the **Settings** section.
186
+
1. Define the users and/or groups that you would like to provision to G Suite by choosing the desired values in **Scope** in the **Settings** section.
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity report, which describes all actions performed by the Azure AD provisioning service on G Suite.
196
195
196
+
> [!NOTE]
197
+
> If the users already have an existing personal/consumer account using the email address of the Azure AD user, then it may cause some issue which could be resolved by using the Google Transfer Tool prior to performing the directory sync.
198
+
197
199
For more information on how to read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
198
200
199
201
## Additional resources
@@ -208,7 +210,6 @@ For more information on how to read the Azure AD provisioning logs, see [Reporti
208
210
209
211
*[Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md)
Copy file name to clipboardExpand all lines: articles/app-service/containers/tutorial-ruby-postgres-app.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -146,7 +146,7 @@ When the Azure Database for PostgreSQL server is created, the Azure CLI shows in
146
146
In the Cloud Shell, create a firewall rule for your Postgres server to allow client connections by using the [`az postgres server firewall-rule create`](/cli/azure/postgres/server/firewall-rule?view=azure-cli-latest#az-postgres-server-firewall-rule-create) command. When both starting IP and end IP are set to 0.0.0.0, the firewall is only opened for other Azure resources. Substitute a unique server name for the *\<postgres-server-name>* placeholder.
147
147
148
148
```azurecli-interactive
149
-
az postgres server firewall-rule create --resource-group myResourceGroup --server <postgres-server-name> --name AllowAllIps --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255
149
+
az postgres server firewall-rule create --resource-group myResourceGroup --server <postgres-server-name> --name AllowAllIps --start-ip-address 0.0.0.0 --end-ip-address 0.0.0.0
150
150
```
151
151
152
152
> [!TIP]
@@ -506,4 +506,4 @@ Advance to the next tutorial to learn how to map a custom DNS name to your app.
0 commit comments