Skip to content

Commit c1b9c81

Browse files
Merge pull request #218062 from billmath/onpremGA
staging
2 parents cede628 + 4c046cd commit c1b9c81

File tree

6 files changed

+32
-13
lines changed

6 files changed

+32
-13
lines changed

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Azure AD on-premises application identity provisioning architecture (preview)
16+
# Azure AD on-premises application identity provisioning architecture
1717

1818
## Overview
1919

@@ -95,7 +95,7 @@ You can define one or more matching attribute(s) and prioritize them based on th
9595
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
9696
- Reducing the distance between the two ends of the hop.
9797
- Choosing the right network to traverse. For example, traversing a private network rather than the public internet might be faster because of dedicated links.
98-
- The agent and ECMA Host rely on a certificate for communication. The self-signed certificate generated by the ECMA host should only be used for testing purposes. The self-signed certificate expires in two years by default and cannot be revoked. Microsoft recommends using a certificiate from a trusted CA for production use cases.
98+
- The agent and ECMA Host rely on a certificate for communication. The self-signed certificate generated by the ECMA host should only be used for testing purposes. The self-signed certificate expires in two years by default and cannot be revoked. Microsoft recommends using a certificate from a trusted CA for production use cases.
9999

100100

101101
## Provisioning agent questions

articles/active-directory/app-provisioning/on-premises-ldap-connector-prepare-directory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -212,11 +212,11 @@ New-ADUser -name "svcAccountLDAP" -accountpassword (ConvertTo-SecureString -AsP
212212
Write-Output "Creating service account"
213213
214214
# Enable the new service account
215-
Enable-ADAccount -Identity "CN=svcAccount,CN=ServiceAccounts,CN=App,DC=contoso,DC=lab" -Server "APP3:389"
215+
Enable-ADAccount -Identity "CN=svcAccountLDAP,CN=ServiceAccounts,CN=App,DC=contoso,DC=lab" -Server "APP3:389"
216216
Write-Output "Enabling service account"
217217
218218
# Add the service account to the Administrators role
219-
Get-ADGroup -Server "APP3:389" -SearchBase "CN=Administrators,CN=Roles,CN=App,DC=contoso,DC=lab" -Filter "name -like 'Administrators'" | Add-ADGroupMember -Members "CN=svcAccount,CN=ServiceAccounts,CN=App,DC=contoso,DC=lab"
219+
Get-ADGroup -Server "APP3:389" -SearchBase "CN=Administrators,CN=Roles,CN=App,DC=contoso,DC=lab" -Filter "name -like 'Administrators'" | Add-ADGroupMember -Members "CN=svcAccountLDAP,CN=ServiceAccounts,CN=App,DC=contoso,DC=lab"
220220
Write-Output "Adding service accounnt to Administrators role"
221221
222222

includes/active-directory-app-provisioning-ldap.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Before deploying the connector to an existing directory server, you'll need to d
7070
|-----|-----|-----|
7171
| hostname of the directory server | Configuration wizard **Connectivity** page | `APP3` |
7272
| port number of the directory server| Configuration wizard **Connectivity** page | 636. For LDAP over SSL or TLS (LDAPS), use port 636. For `Start TLS`, use port 389. |
73-
| account for the connector to identify itself to the directory server |Configuration wizard **Connectivity** page | `CN=svcAccount,CN=ServiceAccounts,CN=App,DC=contoso,DC=lab`|
73+
| account for the connector to identify itself to the directory server |Configuration wizard **Connectivity** page | `CN=svcAccountLDAP,CN=ServiceAccounts,CN=App,DC=contoso,DC=lab`|
7474
| password for the connector to authenticate itself to the directory server |Configuration wizard **Connectivity** page | |
7575
| structural object class for a user in the directory server | Configuration wizard **Object Types** page | `User` |
7676
| auxiliary object classes for a user in the directory server | Azure portal **Provisioning** page attribute mappings | No auxiliary classes are used in this example |
@@ -244,7 +244,9 @@ Depending on the options you select, some of the wizard screens might not be ava
244244
Once all the relevant attributes have been added, select **Next**.
245245
246246
16. On the **Deprovisioning** page, under **Disable flow**, select **Delete**. If `Set attribute value` is chosen, the attributes selected on the previous page won't be available to select on the Deprovisioning page.
247-
17. Select **Finish**.
247+
>[!NOTE]
248+
>If you use the **Set attribute value** be aware that only boolean values are allowed.
249+
15. Select **Finish**.
248250
249251
## Ensure ECMA2Host service is running
250252
1. On the server running the Azure AD ECMA Connector Host, select **Start**.

includes/active-directory-app-provisioning-sql.md

Lines changed: 24 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -333,14 +333,18 @@ In the last step of the SQL connection settings, configure how attributes are su
333333
|Autogenerated|Checked|
334334

335335
15. The ECMA connector host discovers the attributes supported by the target database. You can choose which of those attributes you want to expose to Azure AD. These attributes can then be configured in the Azure portal for provisioning. On the **Select Attributes** page, add all the attributes in the dropdown list one at a time.
336+
337+
The **Attribute** dropdown list shows any attribute that was discovered in the target database and *wasn't* chosen on the previous **Select Attributes** page. Once all the relevant attributes have been added, select **Next**.
338+
336339

337-
[![Screenshot that shows the Select Attributes page.](.\media\active-directory-app-provisioning-sql\conn-13.png)](.\media\active-directory-app-provisioning-sql\conn-13.png#lightbox)
340+
:::image type="content" source="media/active-directory-app-provisioning-sql/attribute-1.png" alt-text="Screenshot of attribute dropdown list." lightbox="media/active-directory-app-provisioning-sql/attribute-1.png":::
338341

339-
The **Attribute** dropdown list shows any attribute that was discovered in the target database and *wasn't* chosen on the previous **Select Attributes** page. Once all the relevant attributes have been added, select **Next**.
340342

341343
16. On the **Deprovisioning** page, under **Disable flow**, select **Delete**. The attributes selected on the previous page won't be available to select on the Deprovisioning page. Select **Finish**.
342-
343-
[![Screenshot that shows the Deprovisioning page.](.\media\active-directory-app-provisioning-sql\conn-14.png)](.\media\active-directory-app-provisioning-sql\conn-14.png#lightbox)
344+
>[!NOTE]
345+
>If you use the **Set attribute value** be aware that only boolean values are allowed.
346+
347+
[![Screenshot that shows the Deprovisioning page.](.\media\active-directory-app-provisioning-sql\conn-14.png)](.\media\active-directory-app-provisioning-sql\conn-14.png#lightbox)
344348

345349

346350
## 7. Ensure the ECMA2Host service is running
@@ -399,7 +403,20 @@ You'll use the Azure portal to configure the mapping between the Azure AD user's
399403
![Screenshot that shows provisioning a user.](.\media\active-directory-app-provisioning-sql\configure-10.png)
400404

401405
1. To confirm that the schema of the database is available in Azure AD, select the **Show advanced options** checkbox and select **Edit attribute list for ScimOnPremises**. Ensure that all the attributes selected in the configuration wizard are listed. If not, then wait several minutes for the schema to refresh, and then reload the page. Once you see the attributes listed, then cancel from this page to return to the mappings list.
402-
4. Select **Add New Mapping**, and repeat the next step for each mapping.
406+
2. Now, on the click on the **userPrincipalName** PLACEHOLDER mapping. This mapping is added by default when you first configure on-premises provisioning.
407+
408+
:::image type="content" source="media/active-directory-app-provisioning-sql/configure-11.png" alt-text="Screenshot of placeholder." lightbox="media/active-directory-app-provisioning-sql/configure-11.png":::
409+
Change the value to match the following:
410+
411+
|Mapping type|Source attribute|Target attribute|
412+
|-----|-----|-----|
413+
|Direct|userPrincipalName|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:ContosoLogin|
414+
415+
:::image type="content" source="media/active-directory-app-provisioning-sql/attribute-2.png" alt-text="Screenshot of changing value." lightbox="media/active-directory-app-provisioning-sql/attribute-2.png":::
416+
417+
418+
4. Now select **Add New Mapping**, and repeat the next step for each mapping.
419+
403420

404421
[![Screenshot that shows Add New Mapping.](.\media\active-directory-app-provisioning-sql\configure-11.png)](.\media\active-directory-app-provisioning-sql\configure-11.png#lightbox)
405422

@@ -410,10 +427,10 @@ You'll use the Azure portal to configure the mapping between the Azure AD user's
410427
|Mapping type|Source attribute|Target attribute|
411428
|-----|-----|-----|
412429
|Direct|userPrincipalName|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:ContosoLogin|
413-
|Direct|objectID|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:AzureID|
430+
|Direct|objectId|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:AzureID|
414431
|Direct|mail|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:Email|
415432
|Direct|givenName|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:FirstName|
416-
|Direct|surName|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:LastName|
433+
|Direct|surname|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:LastName|
417434
|Direct|mailNickname|urn:ietf:params:scim:schemas:extension:ECMA2Host:2.0:User:textID|
418435

419436
6. Once all of the mappings have been added, select **Save**.
32.9 KB
Loading
20.4 KB
Loading

0 commit comments

Comments
 (0)