You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.author: billmath
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
-
# Azure AD on-premises application identity provisioning architecture (preview)
16
+
# Azure AD on-premises application identity provisioning architecture
17
17
18
18
## Overview
19
19
@@ -95,7 +95,7 @@ You can define one or more matching attribute(s) and prioritize them based on th
95
95
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
96
96
- Reducing the distance between the two ends of the hop.
97
97
- Choosing the right network to traverse. For example, traversing a private network rather than the public internet might be faster because of dedicated links.
98
-
- The agent and ECMA Host rely on a certificate for communication. The self-signed certificate generated by the ECMA host should only be used for testing purposes. The self-signed certificate expires in two years by default and cannot be revoked. Microsoft recommends using a certificiate from a trusted CA for production use cases.
98
+
- The agent and ECMA Host rely on a certificate for communication. The self-signed certificate generated by the ECMA host should only be used for testing purposes. The self-signed certificate expires in two years by default and cannot be revoked. Microsoft recommends using a certificate from a trusted CA for production use cases.
Copy file name to clipboardExpand all lines: includes/active-directory-app-provisioning-ldap.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ Before deploying the connector to an existing directory server, you'll need to d
70
70
|-----|-----|-----|
71
71
| hostname of the directory server | Configuration wizard **Connectivity** page |`APP3`|
72
72
| port number of the directory server| Configuration wizard **Connectivity** page | 636. For LDAP over SSL or TLS (LDAPS), use port 636. For `Start TLS`, use port 389. |
73
-
| account for the connector to identify itself to the directory server |Configuration wizard **Connectivity** page |`CN=svcAccount,CN=ServiceAccounts,CN=App,DC=contoso,DC=lab`|
73
+
| account for the connector to identify itself to the directory server |Configuration wizard **Connectivity** page |`CN=svcAccountLDAP,CN=ServiceAccounts,CN=App,DC=contoso,DC=lab`|
74
74
| password for the connector to authenticate itself to the directory server |Configuration wizard **Connectivity** page ||
75
75
| structural object class for a user in the directory server | Configuration wizard **Object Types** page |`User`|
76
76
| auxiliary object classes for a user in the directory server | Azure portal **Provisioning** page attribute mappings | No auxiliary classes are used in this example |
@@ -244,7 +244,9 @@ Depending on the options you select, some of the wizard screens might not be ava
244
244
Once all the relevant attributes have been added, select **Next**.
245
245
246
246
16. On the **Deprovisioning** page, under **Disable flow**, select **Delete**. If `Set attribute value` is chosen, the attributes selected on the previous page won't be available to select on the Deprovisioning page.
247
-
17. Select **Finish**.
247
+
>[!NOTE]
248
+
>If you use the **Set attribute value** be aware that only boolean values are allowed.
249
+
15. Select **Finish**.
248
250
249
251
## Ensure ECMA2Host service is running
250
252
1. On the server running the Azure AD ECMA Connector Host, select **Start**.
Copy file name to clipboardExpand all lines: includes/active-directory-app-provisioning-sql.md
+24-7Lines changed: 24 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -333,14 +333,18 @@ In the last step of the SQL connection settings, configure how attributes are su
333
333
|Autogenerated|Checked|
334
334
335
335
15. The ECMA connector host discovers the attributes supported by the target database. You can choose which of those attributes you want to expose to Azure AD. These attributes can then be configured in the Azure portal for provisioning. On the **Select Attributes** page, add all the attributes in the dropdown list one at a time.
336
+
337
+
The **Attribute** dropdown list shows any attribute that was discovered in the target database and *wasn't* chosen on the previous **Select Attributes** page. Once all the relevant attributes have been added, select **Next**.
338
+
336
339
337
-
[](.\media\active-directory-app-provisioning-sql\conn-13.png#lightbox)
340
+
:::image type="content" source="media/active-directory-app-provisioning-sql/attribute-1.png" alt-text="Screenshot of attribute dropdown list." lightbox="media/active-directory-app-provisioning-sql/attribute-1.png":::
338
341
339
-
The **Attribute** dropdown list shows any attribute that was discovered in the target database and *wasn't* chosen on the previous **Select Attributes** page. Once all the relevant attributes have been added, select **Next**.
340
342
341
343
16. On the **Deprovisioning** page, under **Disable flow**, select **Delete**. The attributes selected on the previous page won't be available to select on the Deprovisioning page. Select **Finish**.
342
-
343
-
[](.\media\active-directory-app-provisioning-sql\conn-14.png#lightbox)
344
+
>[!NOTE]
345
+
>If you use the **Set attribute value** be aware that only boolean values are allowed.
346
+
347
+
[](.\media\active-directory-app-provisioning-sql\conn-14.png#lightbox)
344
348
345
349
346
350
## 7. Ensure the ECMA2Host service is running
@@ -399,7 +403,20 @@ You'll use the Azure portal to configure the mapping between the Azure AD user's
399
403

400
404
401
405
1. To confirm that the schema of the database is available in Azure AD, select the **Show advanced options** checkbox and select **Edit attribute list for ScimOnPremises**. Ensure that all the attributes selected in the configuration wizard are listed. If not, then wait several minutes for the schema to refresh, and then reload the page. Once you see the attributes listed, then cancel from this page to return to the mappings list.
402
-
4. Select **Add New Mapping**, and repeat the next step for each mapping.
406
+
2. Now, on the click on the **userPrincipalName** PLACEHOLDER mapping. This mapping is added by default when you first configure on-premises provisioning.
407
+
408
+
:::image type="content" source="media/active-directory-app-provisioning-sql/configure-11.png" alt-text="Screenshot of placeholder." lightbox="media/active-directory-app-provisioning-sql/configure-11.png":::
:::image type="content" source="media/active-directory-app-provisioning-sql/attribute-2.png" alt-text="Screenshot of changing value." lightbox="media/active-directory-app-provisioning-sql/attribute-2.png":::
416
+
417
+
418
+
4. Now select **Add New Mapping**, and repeat the next step for each mapping.
419
+
403
420
404
421
[](.\media\active-directory-app-provisioning-sql\configure-11.png#lightbox)
405
422
@@ -410,10 +427,10 @@ You'll use the Azure portal to configure the mapping between the Azure AD user's
0 commit comments