You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/tutorial-pilot-aadc-aadccp.md
+27-33Lines changed: 27 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ The following are prerequisites required for completing this tutorial
49
49
50
50
- A test environment with Azure AD Connect sync version 1.4.32.0 or later
51
51
- An OU or group that is in scope of sync and can be used the pilot. We recommend starting with a small set of objects.
52
-
- A server running Windows Server 2012 R2 or later that will host the provisioning agent.
52
+
- A server running Windows Server 2016 or later that will host the provisioning agent.
53
53
- Source anchor for Azure AD Connect sync should be either *objectGuid* or *ms-ds-consistencyGUID*
54
54
55
55
## Update Azure AD Connect
@@ -71,6 +71,7 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
71
71
>If you are running your own custom scheduler for Azure AD Connect sync, then please disable the scheduler.
72
72
73
73
## Create custom user inbound rule
74
+
In the Azure AD Connect Synchronization Rules editor, you need to create an inbound sync rule that filters out users in the OU you identified previously. The inbound sync rule is a join rule with a target attribute of cloudNoFlow. This rule tells Azure AD Connect not to synchronize attributes for these users. For more information, see [Migrating to cloud sync](migrate-azure-ad-connect-to-cloud-sync.md) documentation before attempting to migrate your production environment.
74
75
75
76
1. Launch the synchronization editor from the application menu in desktop as shown below:
76
77
@@ -110,6 +111,7 @@ Azure AD Connect sync synchronizes changes occurring in your on-premises directo
110
111
Same steps need to be followed for all object types (user, group and contact). Repeat steps per configured AD Connector / per AD forest.
111
112
112
113
## Create custom user outbound rule
114
+
You'll also need an outbound sync rule with a link type of JoinNoFlow and the scoping filter that has the cloudNoFlow attribute set to True. This rule tells Azure AD Connect not to synchronize attributes for these users. For more information, see [Migrating to cloud sync](migrate-azure-ad-connect-to-cloud-sync.md) documentation before attempting to migrate your production environment.
113
115
114
116
1. Select **Outbound** from the drop-down list for Direction and select **Add rule**.
115
117
@@ -151,46 +153,38 @@ If you're using the [Basic AD and Azure environment](tutorial-basic-ad-azure.md
151
153
152
154
Use the following steps to configure provisioning:

164
-
165
-
6. On the configuration screen, enter a **Notification email**, move the selector to **Enable** and select **Save**.
166
-
167
-

156
+
1. In the Azure portal, select **Azure Active Directory**.
157
+
2. On the left, select **Azure AD Connect**.
158
+
3. On the left, select **Cloud sync**.
159
+
160
+
:::image type="content" source="media/how-to-on-demand-provision/new-ux-1.png" alt-text="Screenshot of new UX cloud sync screen." lightbox="media/how-to-on-demand-provision/new-ux-1.png":::
161
+
162
+
4. Select **New configuration**.
163
+
:::image type="content" source="media/how-to-configure/new-ux-configure-1.png" alt-text="Screenshot of adding a configuration." lightbox="media/how-to-configure/new-ux-configure-1.png":::
164
+
5. On the configuration screen, select your domain and whether to enable password hash sync. Click **Create**.
165
+
166
+
:::image type="content" source="media/how-to-configure/new-ux-configure-2.png" alt-text="Screenshot of a new configuration." lightbox="media/how-to-configure/new-ux-configure-2.png":::
168
167
169
-
7. Under **Configure**, select **All users**to change the scope of the configuration rule.
168
+
6. The **Get started**screen will open.
170
169
171
-

172
-
173
-
8. On the right, change the scope to include the specific OU you created "OU=CPUsers,DC=contoso,DC=com".
170
+
:::image type="content" source="media/how-to-configure/new-ux-configure-3.png" alt-text="Screenshot of the getting started screen." lightbox="media/how-to-configure/new-ux-configure-3.png":::
174
171
175
-

176
-
177
-
9. Select **Done** and **Save**.
178
-
10. The scope should now be set to one organizational unit.
172
+
7. On the **Get started** screen, click either **Add scoping filters** next to the **Add scoping filters** icon or on the click **Scoping filters** on the left under **Manage**.
179
173
180
-

174
+
:::image type="content" source="media/how-to-configure/new-ux-configure-5.png" alt-text="Screenshot of scoping filters." lightbox="media/how-to-configure/new-ux-configure-5.png":::
175
+
176
+
8. Select the scoping filter. For this tutorial select:
177
+
-**Selected organizational units**: Scopes the configuration to apply to specific OUs.
178
+
9. In the box, enter "OU=CPUsers,DC=contoso,DC=com".
179
+
180
+
:::image type="content" source="media/tutorial-migrate-aadc-aadccp/configure-1.png" alt-text="Screenshot of the scoping filter." lightbox="media/tutorial-migrate-aadc-aadccp/configure-1.png":::
181
+
182
+
10. Click **Add**. Click **Save**.
181
183
182
-
## Verify users are provisioned by cloud sync
183
184
184
-
You'll now verify that the users that you had in our on-premises directory have been synchronized and now exist in out Azure AD tenant. This process may take a few hours to complete. To verify users are provisioning by cloud sync, follow these steps:
185
185
186
-
1. Browse to the [Azure portal](https://portal.azure.com) and sign in with an account that has an Azure subscription.
187
-
2. On the left, select **Azure Active Directory**
188
-
3. Select on **Azure AD Connect**
189
-
4. Select on **Manage cloud sync**
190
-
5. Select on **Logs** button
191
-
6. Search for a username to confirm that the user is provisioned by cloud sync
192
186
193
-
Additionally, you can verify that the user and group exist in Azure AD.
0 commit comments