Skip to content

Commit c36f247

Browse files
authored
Merge pull request #198266 from v-missam/miro
doc-1
2 parents 8218c99 + b1d4680 commit c36f247

File tree

2 files changed

+26
-20
lines changed

2 files changed

+26
-20
lines changed
-9.37 KB
Loading

articles/active-directory/saas-apps/miro-provisioning-tutorial.md

Lines changed: 26 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Before configuring and enabling automatic user provisioning, you should decide w
4545

4646
## Set up Miro for provisioning
4747

48-
1. To retrieve the needed **Secret Token** contact Miro support team at [email protected]. This value will be entered in the Secret Token field in the Provisioning tab of your Miro application in the Azure portal.
48+
To retrieve the needed **Secret Token** contact [Miro Support Team](mailto:[email protected]). This value will be entered in the Secret Token field in the Provisioning tab of your Miro application in the Azure portal.
4949

5050
## Add Miro from the gallery
5151

@@ -57,15 +57,15 @@ Before configuring Miro for automatic user provisioning with Azure AD, you need
5757

5858
![The Azure Active Directory button](common/select-azuread.png)
5959

60-
2. Go to **Enterprise applications**, and then select **All applications**.
60+
1. Go to **Enterprise applications**, and then select **All applications**.
6161

6262
![The Enterprise applications blade](common/enterprise-applications.png)
6363

64-
3. To add a new application, select the **New application** button at the top of the pane.
64+
1. To add a new application, select the **New application** button at the top of the pane.
6565

6666
![The New application button](common/add-new-app.png)
6767

68-
4. In the search box, enter **Miro**, select **Miro** in the results panel, and then click the **Add** button to add the application.
68+
1. In the search box, enter **Miro**, select **Miro** in the results panel, and then click the **Add** button to add the application.
6969

7070
![Miro in the results list](common/search-new-app.png)
7171

@@ -74,7 +74,7 @@ Before configuring Miro for automatic user provisioning with Azure AD, you need
7474
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Miro based on user and/or group assignments in Azure AD.
7575

7676
> [!TIP]
77-
> You may also choose to enable SAML-based single sign-on for Miro, following the instructions provided in the [Miro Single sign-on tutorial](./miro-tutorial.md). Single sign-on can be configured independently of automatic user provisioning, though these two features compliment each other.
77+
> You may also choose to enable SAML-based single sign-on for Miro, following the instructions provided in the [Miro Single sign-on tutorial](./miro-tutorial.md). Single sign-on can be configured independently of automatic user provisioning, though these two features complement each other.
7878
7979
> [!NOTE]
8080
> To learn more about Miro's SCIM endpoint, refer [this](https://help.miro.com/hc/en-us/articles/360036777814).
@@ -85,55 +85,55 @@ This section guides you through the steps to configure the Azure AD provisioning
8585

8686
![Enterprise applications blade](common/enterprise-applications.png)
8787

88-
2. In the applications list, select **Miro**.
88+
1. In the applications list, select **Miro**.
8989

9090
![The Miro link in the Applications list](common/all-applications.png)
9191

92-
3. Select the **Provisioning** tab.
92+
1. Select the **Provisioning** tab.
9393

9494
![Screenshot of the Manage options with the Provisioning option called out.](common/provisioning.png)
9595

96-
4. Set the **Provisioning Mode** to **Automatic**.
96+
1. Set the **Provisioning Mode** to **Automatic**.
9797

9898
![Screenshot of the Provisioning Mode dropdown list with the Automatic option called out.](common/provisioning-automatic.png)
9999

100-
5. Under the **Admin Credentials** section, input `https://miro.com/api/v1/scim` in **Tenant URL**. Input the **SCIM Authentication Token** value retrieved earlier in **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to Miro. If the connection fails, ensure your Miro account has Admin permissions and try again.
100+
1. Under the **Admin Credentials** section, input `https://miro.com/api/v1/scim` in **Tenant URL**. Input the **SCIM Authentication Token** value retrieved earlier in **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to Miro. If the connection fails, ensure your Miro account has Admin permissions and try again.
101101

102102
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
103103

104-
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
104+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
105105

106106
![Notification Email](common/provisioning-notification-email.png)
107107

108-
7. Click **Save**.
108+
1. Click **Save**.
109109

110-
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Miro**.
110+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Miro**.
111111

112112
![Miro User Mappings](media/miro-provisioning-tutorial/usermappings.png)
113113

114-
9. Review the user attributes that are synchronized from Azure AD to Miro in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Miro for update operations. Select the **Save** button to commit any changes.
114+
1. Review the user attributes that are synchronized from Azure AD to Miro in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Miro for update operations. Select the **Save** button to commit any changes.
115115

116116
![Miro User Attributes](media/miro-provisioning-tutorial/userattributes.png)
117117

118-
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Miro**.
118+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Miro**.
119119

120120
![Miro Group Mappings](media/miro-provisioning-tutorial/groupmappings.png)
121121

122-
11. Review the group attributes that are synchronized from Azure AD to Miro in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Miro for update operations. Select the **Save** button to commit any changes. Uncheck **Create** and **Delete** under **Target Object Actions** as Miro SCIM API does not support creating and deleting groups.
122+
1. Review the group attributes that are synchronized from Azure AD to Miro in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Miro for update operations. Select the **Save** button to commit any changes. Uncheck **Create** and **Delete** under **Target Object Actions** as Miro SCIM API does not support creating and deleting groups.
123123

124124
![Miro Group Attributes](media/miro-provisioning-tutorial/groupattributes.png)
125125

126-
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
126+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
127127

128-
13. To enable the Azure AD provisioning service for Miro, change the **Provisioning Status** to **On** in the **Settings** section.
128+
1. To enable the Azure AD provisioning service for Miro, change the **Provisioning Status** to **On** in the **Settings** section.
129129

130130
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
131131

132-
14. Define the users and/or groups that you would like to provision to Miro by choosing the desired values in **Scope** in the **Settings** section.
132+
1. Define the users and/or groups that you would like to provision to Miro by choosing the desired values in **Scope** in the **Settings** section.
133133

134134
![Provisioning Scope](common/provisioning-scope.png)
135135

136-
15. When you are ready to provision, click **Save**.
136+
1. When you are ready to provision, click **Save**.
137137

138138
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
139139

@@ -145,11 +145,17 @@ For more information on how to read the Azure AD provisioning logs, see [Reporti
145145

146146
* Miro's SCIM endpoint does not allow **Create** and **Delete** operations on groups. It only supports group **Update** operation.
147147

148+
## Troubleshooting Tips
149+
150+
* If experiencing errors with group creation, then it is required to disable it by unchecking **Create** and **Delete** under **Target Object Actions** as Miro SCIM API does not support creating and deleting groups.
151+
152+
![Miro Group Tips](media/miro-provisioning-tutorial/groupattributes.png)
153+
148154
## Additional resources
149155

150156
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
151157
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
152158

153159
## Next steps
154160

155-
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)
161+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

0 commit comments

Comments
 (0)