Skip to content

Commit c3577c4

Browse files
committed
Fixed links after changes to the article.
1 parent 4faeb8b commit c3577c4

File tree

4 files changed

+11
-9
lines changed

4 files changed

+11
-9
lines changed

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,11 @@ You also need a valid Azure AD Premium P1 or higher subscription license for eve
7676

7777
### Prerequisites
7878

79-
- Azure AD global administrator access to configure the Azure AD Connect provisioning agent.
79+
- Azure AD [hybrid identity administrator](../users-groups-roles/directory-assign-admin-roles#hybrid-identity-administrator) to configure the Azure AD Connect provisioning agent.
80+
- Azure AD [application administrator](../users-groups-roles/directory-assign-admin-roles#application-administrator) role to configure the provisioning app in the Azure portal
8081
- A test and production instance of the cloud HR app.
8182
- Administrator permissions in the cloud HR app to create a system integration user and make changes to test employee data for testing purposes.
82-
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the [Azure AD Connect provisioning agent](https://go.microsoft.com/fwlink/?linkid=847801).
83+
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the Azure AD Connect provisioning agent
8384
- [Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) for synchronizing users between Active Directory and Azure AD.
8485

8586
### Training resources
@@ -243,7 +244,7 @@ By default, the attribute in the cloud HR app that represents the unique employe
243244

244245
You can set multiple matching attributes and assign matching precedence. They're evaluated on matching precedence. As soon as a match is found, no further matching attributes are evaluated.
245246

246-
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#planning-workday-to-active-directory-user-attribute-mapping-and-transformations)) for a list of custom attributes to map.
247+
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration)) for a list of custom attributes to map.
247248

248249
### Determine user account status
249250

articles/active-directory/saas-apps/workday-inbound-cloud-only-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Please refer to the [cloud HR deployment plan](../app-provisioning/plan-cloud-hr
7575

7676
## Configure integration system user in Workday
7777

78-
Refer to the section [configure integration system user](workday-inbound-tutorial.md/#configure-integration-system-user-in-workday) for creating a Workday integration system user account with permissions to retrieve worker data.
78+
Refer to the section [configure integration system user](workday-inbound-tutorial.md#configure-integration-system-user-in-workday) for creating a Workday integration system user account with permissions to retrieve worker data.
7979

8080
## Configure user provisioning from Workday to Azure AD
8181

@@ -120,7 +120,7 @@ The following sections describe steps for configuring user provisioning from Wor
120120
> [!NOTE]
121121
> If no version information is specified in the URL, the app uses Workday Web Services (WWS) v21.1 and no changes are required to the default XPATH API expressions shipped with the app. To use a specific WWS API version, specify version number in the URL <br>
122122
> Example: `https://wd3-impl-services1.workday.com/ccx/service/contoso4/Human_Resources/v34.0` <br>
123-
> <br> If you are using a WWS API v30.0+, before turning on the provisioning job, please update the **XPATH API expressions** under **Attribute Mapping -> Advanced Options -> Edit attribute list for Workday** referring to the section [Managing your configuration](#managing-your-configuration) and [Workday attribute reference](../app-provisioning/workday-attribute-reference.md#xpath-values-for-workday-web-services-wws-api-v30).
123+
> <br> If you are using a WWS API v30.0+, before turning on the provisioning job, please update the **XPATH API expressions** under **Attribute Mapping -> Advanced Options -> Edit attribute list for Workday** referring to the section [Managing your configuration](workday-inbound-tutorial.md#managing-your-configuration) and [Workday attribute reference](../app-provisioning/workday-attribute-reference.md#xpath-values-for-workday-web-services-wws-api-v30).
124124
125125
* **Notification Email –** Enter your email address, and check the "send email if failure occurs" checkbox.
126126

@@ -169,7 +169,7 @@ In this section, you will configure how user data flows from Workday to Azure Ac
169169
* **Expression** – Allows you to write a custom value to the AD attribute, based on one or more Workday
170170
attributes. [For more info, see this article on expressions](../app-provisioning/functions-for-customizing-application-data.md).
171171

172-
* **Source attribute** - The user attribute from Workday. If the attribute you are looking for is not present, see [Customizing the list of Workday user attributes](#customizing-the-list-of-workday-user-attributes).
172+
* **Source attribute** - The user attribute from Workday. If the attribute you are looking for is not present, see [Customizing the list of Workday user attributes](workday-inbound-tutorial.md#customizing-the-list-of-workday-user-attributes).
173173

174174
* **Default value** – Optional. If the source attribute has an empty value, the mapping will write this value instead.
175175
Most common configuration is to leave this blank.

articles/active-directory/saas-apps/workday-inbound-tutorial.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The objective of this tutorial is to show the steps you need to perform to provi
2323
>[!NOTE]
2424
>Use this tutorial, if the users you want to provision from Workday need an on-premises AD account and an Azure AD account.
2525
>* If the users from Workday only need Azure AD account (cloud-only users), then please refer to the tutorial on [configure Workday to Azure AD](workday-inbound-cloud-only-tutorial.md) user provisioning.
26-
>* To configure writeback of attributes such as email address, username and phone number from Azure AD to Workday, please refer to the tutorial on [configure Workday writeback](workday-writeback-tutorial).
26+
>* To configure writeback of attributes such as email address, username and phone number from Azure AD to Workday, please refer to the tutorial on [configure Workday writeback](workday-writeback-tutorial.md).
2727
2828

2929
## Overview
@@ -253,7 +253,8 @@ Use the steps below to setup a service account that can be used for provisioning
253253
2. Create a new domain user (example: *provAgentAdmin*)
254254
3. Right click the OU or domain name and select *Delegate Control* which will open the *Delegation of Control Wizard*.
255255

256-
> [!NOTE] If you want to limit the provisioning agent to only create and read users from a certain OU for testing purposes, then we recommend delegating the control at the appropriate OU level during test runs.
256+
> [!NOTE]
257+
> If you want to limit the provisioning agent to only create and read users from a certain OU for testing purposes, then we recommend delegating the control at the appropriate OU level during test runs.
257258
258259
4. Click **Next** on the welcome screen.
259260
5. On the **Select Users or Groups** screen, add the domain user you created in step 2. Click **Next**.

articles/active-directory/saas-apps/workday-writeback-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This Workday Writeback user provisioning solution is ideally suited for:
3636

3737
## Configure integration system user in Workday
3838

39-
Refer to the section [configure integration system user](workday-inbound-tutorial.md/#configure-integration-system-user-in-workday) for creating a Workday integration system user account with permissions to retrieve worker data.
39+
Refer to the section [configure integration system user](workday-inbound-tutorial.md#configure-integration-system-user-in-workday) for creating a Workday integration system user account with permissions to retrieve worker data.
4040

4141
## Configuring Azure AD attribute writeback to Workday
4242

0 commit comments

Comments
 (0)