You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/plan-cloud-hr-provision.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,10 +76,11 @@ You also need a valid Azure AD Premium P1 or higher subscription license for eve
76
76
77
77
### Prerequisites
78
78
79
-
- Azure AD global administrator access to configure the Azure AD Connect provisioning agent.
79
+
- Azure AD [hybrid identity administrator](../users-groups-roles/directory-assign-admin-roles#hybrid-identity-administrator) to configure the Azure AD Connect provisioning agent.
80
+
- Azure AD [application administrator](../users-groups-roles/directory-assign-admin-roles#application-administrator) role to configure the provisioning app in the Azure portal
80
81
- A test and production instance of the cloud HR app.
81
82
- Administrator permissions in the cloud HR app to create a system integration user and make changes to test employee data for testing purposes.
82
-
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the [Azure AD Connect provisioning agent](https://go.microsoft.com/fwlink/?linkid=847801).
83
+
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the Azure AD Connect provisioning agent
83
84
-[Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) for synchronizing users between Active Directory and Azure AD.
84
85
85
86
### Training resources
@@ -243,7 +244,7 @@ By default, the attribute in the cloud HR app that represents the unique employe
243
244
244
245
You can set multiple matching attributes and assign matching precedence. They're evaluated on matching precedence. As soon as a match is found, no further matching attributes are evaluated.
245
246
246
-
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#planning-workday-to-active-directory-user-attribute-mapping-and-transformations)) for a list of custom attributes to map.
247
+
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration)) for a list of custom attributes to map.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/workday-inbound-cloud-only-tutorial.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,7 +75,7 @@ Please refer to the [cloud HR deployment plan](../app-provisioning/plan-cloud-hr
75
75
76
76
## Configure integration system user in Workday
77
77
78
-
Refer to the section [configure integration system user](workday-inbound-tutorial.md/#configure-integration-system-user-in-workday) for creating a Workday integration system user account with permissions to retrieve worker data.
78
+
Refer to the section [configure integration system user](workday-inbound-tutorial.md#configure-integration-system-user-in-workday) for creating a Workday integration system user account with permissions to retrieve worker data.
79
79
80
80
## Configure user provisioning from Workday to Azure AD
81
81
@@ -120,7 +120,7 @@ The following sections describe steps for configuring user provisioning from Wor
120
120
> [!NOTE]
121
121
> If no version information is specified in the URL, the app uses Workday Web Services (WWS) v21.1 and no changes are required to the default XPATH API expressions shipped with the app. To use a specific WWS API version, specify version number in the URL <br>
> <br> If you are using a WWS API v30.0+, before turning on the provisioning job, please update the **XPATH API expressions** under **Attribute Mapping -> Advanced Options -> Edit attribute list for Workday** referring to the section [Managing your configuration](#managing-your-configuration) and [Workday attribute reference](../app-provisioning/workday-attribute-reference.md#xpath-values-for-workday-web-services-wws-api-v30).
123
+
> <br> If you are using a WWS API v30.0+, before turning on the provisioning job, please update the **XPATH API expressions** under **Attribute Mapping -> Advanced Options -> Edit attribute list for Workday** referring to the section [Managing your configuration](workday-inbound-tutorial.md#managing-your-configuration) and [Workday attribute reference](../app-provisioning/workday-attribute-reference.md#xpath-values-for-workday-web-services-wws-api-v30).
124
124
125
125
***Notification Email –** Enter your email address, and check the "send email if failure occurs" checkbox.
126
126
@@ -169,7 +169,7 @@ In this section, you will configure how user data flows from Workday to Azure Ac
169
169
***Expression** – Allows you to write a custom value to the AD attribute, based on one or more Workday
170
170
attributes. [For more info, see this article on expressions](../app-provisioning/functions-for-customizing-application-data.md).
171
171
172
-
***Source attribute** - The user attribute from Workday. If the attribute you are looking for is not present, see [Customizing the list of Workday user attributes](#customizing-the-list-of-workday-user-attributes).
172
+
***Source attribute** - The user attribute from Workday. If the attribute you are looking for is not present, see [Customizing the list of Workday user attributes](workday-inbound-tutorial.md#customizing-the-list-of-workday-user-attributes).
173
173
174
174
***Default value** – Optional. If the source attribute has an empty value, the mapping will write this value instead.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/workday-inbound-tutorial.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ The objective of this tutorial is to show the steps you need to perform to provi
23
23
>[!NOTE]
24
24
>Use this tutorial, if the users you want to provision from Workday need an on-premises AD account and an Azure AD account.
25
25
>* If the users from Workday only need Azure AD account (cloud-only users), then please refer to the tutorial on [configure Workday to Azure AD](workday-inbound-cloud-only-tutorial.md) user provisioning.
26
-
>* To configure writeback of attributes such as email address, username and phone number from Azure AD to Workday, please refer to the tutorial on [configure Workday writeback](workday-writeback-tutorial).
26
+
>* To configure writeback of attributes such as email address, username and phone number from Azure AD to Workday, please refer to the tutorial on [configure Workday writeback](workday-writeback-tutorial.md).
27
27
28
28
29
29
## Overview
@@ -253,7 +253,8 @@ Use the steps below to setup a service account that can be used for provisioning
253
253
2. Create a new domain user (example: *provAgentAdmin*)
254
254
3. Right click the OU or domain name and select *Delegate Control* which will open the *Delegation of Control Wizard*.
255
255
256
-
> [!NOTE] If you want to limit the provisioning agent to only create and read users from a certain OU for testing purposes, then we recommend delegating the control at the appropriate OU level during test runs.
256
+
> [!NOTE]
257
+
> If you want to limit the provisioning agent to only create and read users from a certain OU for testing purposes, then we recommend delegating the control at the appropriate OU level during test runs.
257
258
258
259
4. Click **Next** on the welcome screen.
259
260
5. On the **Select Users or Groups** screen, add the domain user you created in step 2. Click **Next**.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/workday-writeback-tutorial.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ This Workday Writeback user provisioning solution is ideally suited for:
36
36
37
37
## Configure integration system user in Workday
38
38
39
-
Refer to the section [configure integration system user](workday-inbound-tutorial.md/#configure-integration-system-user-in-workday) for creating a Workday integration system user account with permissions to retrieve worker data.
39
+
Refer to the section [configure integration system user](workday-inbound-tutorial.md#configure-integration-system-user-in-workday) for creating a Workday integration system user account with permissions to retrieve worker data.
40
40
41
41
## Configuring Azure AD attribute writeback to Workday
0 commit comments