Skip to content

Commit d1ddc45

Browse files
Merge pull request #251742 from jenniferf-skc/appprov
Entra ID step changes
2 parents 406ba23 + aa79496 commit d1ddc45

7 files changed

+17
-17
lines changed

articles/active-directory/app-provisioning/inbound-provisioning-api-configure-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 07/07/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -35,7 +35,7 @@ If you're configuring inbound user provisioning to on-premises Active Directory,
3535

3636
## Create your API-driven provisioning app
3737

38-
1. Log in to the [Microsoft Entra admin center](<https://entra.microsoft.com>).
38+
1. Log in to the [Microsoft Entra admin center](<https://entra.microsoft.com>) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
3939
2. Browse to **Azure Active Directory** > **Applications** > **Enterprise applications**.
4040
3. Click on **New application** to create a new provisioning application.
4141
[![Screenshot of Entra Admin Center.](media/inbound-provisioning-api-configure-app/provisioning-entra-admin-center.png)](media/inbound-provisioning-api-configure-app/provisioning-entra-admin-center.png#lightbox)

articles/active-directory/app-provisioning/inbound-provisioning-api-curl-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ ms.reviewer: cmmdesai
4040
4141
## Verify processing of the bulk request payload
4242
43-
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
43+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
4444
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
4545
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
4646
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-custom-attributes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 07/24/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -28,8 +28,8 @@ You have configured API-driven provisioning app. You're provisioning app is succ
2828

2929
In this step, we'll add the two attributes "HireDate" and "JobCode" that are not part of the standard SCIM schema to the provisioning app and use them in the provisioning data flow.
3030

31-
1. Log in to Microsoft Entra admin center with application administrator role.
32-
1. Go to **Enterprise applications** and open your API-driven provisioning app.
31+
1. Log in to your [Microsoft Entra admin center](https://entra.micsrosoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
32+
1. Browse to **Enterprise applications** and open your API-driven provisioning app.
3333
1. Open the **Provisioning** blade.
3434
1. Click on the **Edit Provisioning** button.
3535
1. Expand the **Mappings** section and click on the attribute mapping link. <br>

articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 07/07/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -27,7 +27,7 @@ Depending on how your API client authenticates with Azure AD, you can select bet
2727
## Configure a service principal
2828
This configuration registers an app in Azure AD that represents the external API client and grants it permission to invoke the inbound provisioning API. The service principal client id and client secret can be used in the OAuth client credentials grant flow.
2929

30-
1. Log in to Microsoft Entra admin center (https://entra.microsoft.com) with global administrator or application administrator login credentials.
30+
1. Log in to Microsoft Entra admin center (https://entra.microsoft.com) with at least [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823) login credentials.
3131
1. Browse to **Azure Active Directory** -> **Applications** -> **App registrations**.
3232
1. Click on the option **New registration**.
3333
1. Provide an app name, select the default options, and click on **Register**.

articles/active-directory/app-provisioning/inbound-provisioning-api-graph-explorer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 07/18/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -51,7 +51,7 @@ This tutorial describes how you can quickly test [API-driven inbound provisionin
5151
You can verify the processing either from the Microsoft Entra admin center or using Graph Explorer.
5252

5353
### Verify processing from Microsoft Entra admin center
54-
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
54+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with at least [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823) login credentials.
5555
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
5656
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
5757
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-postman.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 07/19/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -65,7 +65,7 @@ If the API invocation is successful, you see the message `202 Accepted.` Under H
6565
You can verify the processing either from the Microsoft Entra admin center or using Postman.
6666

6767
### Verify processing from Microsoft Entra admin center
68-
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
68+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with at least [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823) level credentials.
6969
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
7070
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
7171
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 07/18/2023
11+
ms.date: 09/15/2023
1212
ms.author: jfields
1313
ms.reviewer: cmmdesai
1414
---
@@ -180,12 +180,12 @@ To illustrate the procedure, let's use the CSV file `Samples/csv-with-2-records.
180180

181181
This section explains how to send the generated bulk request payload to your inbound provisioning API endpoint.
182182

183-
1. Log in to your Microsoft Entra admin center as *Application Administrator* or *Global Administrator*.
184-
1. Copy the `ServicePrincipalId` associated with your provisioning app from **Provisioning App** > **Properties** > **Object ID**.
183+
1. Log in to your [Microsoft Entra admin center](https://entra.micsrosoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
184+
1. Browse to **Provisioning App** > **Properties** > **Object ID** and copy the `ServicePrincipalId` associated with your provisioning app.
185185

186186
:::image type="content" border="true" source="./media/inbound-provisioning-api-powershell/object-id.png" alt-text="Screenshot of the Object ID." lightbox="./media/inbound-provisioning-api-powershell/object-id.png":::
187187

188-
1. As user with *Global Administrator* role, run the following command by providing the correct values for `ServicePrincipalId` and `TenantId`. It will prompt you for authentication if an authenticated session doesn't already exist for this tenant. Provide your consent to permissions prompted during authentication.
188+
1. As user with Global Administrator role, run the following command by providing the correct values for `ServicePrincipalId` and `TenantId`. It will prompt you for authentication if an authenticated session doesn't already exist for this tenant. Provide your consent to permissions prompted during authentication.
189189

190190
```powershell
191191
.\CSV2SCIM.ps1 -Path '..\Samples\csv-with-2-records.csv' -AttributeMapping $AttributeMapping -ServicePrincipalId <servicePrincipalId> -TenantId "contoso.onmicrosoft.com"
@@ -204,7 +204,7 @@ This section explains how to send the generated bulk request payload to your inb
204204
$ThumbPrint = $ClientCertificate.ThumbPrint
205205
```
206206
The generated certificate is stored **Current User\Personal\Certificates**. You can view it using the **Control Panel** -> **Manage user certificates** option.
207-
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as *Application Administrator*.
207+
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as Application Administrator.
208208
1. Open [the service principal you configured](inbound-provisioning-api-grant-access.md#configure-a-service-principal) under **App Registrations**.
209209
1. Copy the **Object ID** from the **Overview** blade. Use the value to replace the string `<AppObjectId>`. Copy the **Application (client) Id**. We will use it later and it is referenced as `<AppClientId>`.
210210
1. Run the following command to upload your certificate to the registered service principal.

0 commit comments

Comments
 (0)