You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-configure-app.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 07/07/2023
11
+
ms.date: 09/15/2023
12
12
ms.author: jfields
13
13
ms.reviewer: cmmdesai
14
14
---
@@ -35,7 +35,7 @@ If you're configuring inbound user provisioning to on-premises Active Directory,
35
35
36
36
## Create your API-driven provisioning app
37
37
38
-
1. Log in to the [Microsoft Entra admin center](<https://entra.microsoft.com>).
38
+
1. Log in to the [Microsoft Entra admin center](<https://entra.microsoft.com>) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
39
39
2. Browse to **Azure Active Directory** > **Applications** > **Enterprise applications**.
40
40
3. Click on **New application** to create a new provisioning application.
41
41
[](media/inbound-provisioning-api-configure-app/provisioning-entra-admin-center.png#lightbox)
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-curl-tutorial.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ ms.reviewer: cmmdesai
40
40
41
41
## Verify processing of the bulk request payload
42
42
43
-
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
43
+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
44
44
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
45
45
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
46
46
1. Open the Provisioning blade. The landing page displays the status of the last run.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-custom-attributes.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 07/24/2023
11
+
ms.date: 09/15/2023
12
12
ms.author: jfields
13
13
ms.reviewer: cmmdesai
14
14
---
@@ -28,8 +28,8 @@ You have configured API-driven provisioning app. You're provisioning app is succ
28
28
29
29
In this step, we'll add the two attributes "HireDate" and "JobCode" that are not part of the standard SCIM schema to the provisioning app and use them in the provisioning data flow.
30
30
31
-
1. Log in to Microsoft Entra admin center with application administrator role.
32
-
1.Go to **Enterprise applications** and open your API-driven provisioning app.
31
+
1. Log in to your [Microsoft Entra admin center](https://entra.micsrosoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
32
+
1.Browse to **Enterprise applications** and open your API-driven provisioning app.
33
33
1. Open the **Provisioning** blade.
34
34
1. Click on the **Edit Provisioning** button.
35
35
1. Expand the **Mappings** section and click on the attribute mapping link. <br>
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 07/07/2023
11
+
ms.date: 09/15/2023
12
12
ms.author: jfields
13
13
ms.reviewer: cmmdesai
14
14
---
@@ -27,7 +27,7 @@ Depending on how your API client authenticates with Azure AD, you can select bet
27
27
## Configure a service principal
28
28
This configuration registers an app in Azure AD that represents the external API client and grants it permission to invoke the inbound provisioning API. The service principal client id and client secret can be used in the OAuth client credentials grant flow.
29
29
30
-
1. Log in to Microsoft Entra admin center (https://entra.microsoft.com) with global administrator or application administrator login credentials.
30
+
1. Log in to Microsoft Entra admin center (https://entra.microsoft.com) with at least [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823) login credentials.
31
31
1. Browse to **Azure Active Directory** -> **Applications** -> **App registrations**.
32
32
1. Click on the option **New registration**.
33
33
1. Provide an app name, select the default options, and click on **Register**.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-graph-explorer.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 07/18/2023
11
+
ms.date: 09/15/2023
12
12
ms.author: jfields
13
13
ms.reviewer: cmmdesai
14
14
---
@@ -51,7 +51,7 @@ This tutorial describes how you can quickly test [API-driven inbound provisionin
51
51
You can verify the processing either from the Microsoft Entra admin center or using Graph Explorer.
52
52
53
53
### Verify processing from Microsoft Entra admin center
54
-
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
54
+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with at least [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823) login credentials.
55
55
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
56
56
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
57
57
1. Open the Provisioning blade. The landing page displays the status of the last run.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-postman.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 07/19/2023
11
+
ms.date: 09/15/2023
12
12
ms.author: jfields
13
13
ms.reviewer: cmmdesai
14
14
---
@@ -65,7 +65,7 @@ If the API invocation is successful, you see the message `202 Accepted.` Under H
65
65
You can verify the processing either from the Microsoft Entra admin center or using Postman.
66
66
67
67
### Verify processing from Microsoft Entra admin center
68
-
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
68
+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with at least [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823) level credentials.
69
69
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
70
70
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
71
71
1. Open the Provisioning blade. The landing page displays the status of the last run.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.topic: how-to
10
10
ms.workload: identity
11
-
ms.date: 07/18/2023
11
+
ms.date: 09/15/2023
12
12
ms.author: jfields
13
13
ms.reviewer: cmmdesai
14
14
---
@@ -180,12 +180,12 @@ To illustrate the procedure, let's use the CSV file `Samples/csv-with-2-records.
180
180
181
181
This section explains how to send the generated bulk request payload to your inbound provisioning API endpoint.
182
182
183
-
1. Log in to your Microsoft Entra admin center as *Application Administrator* or *Global Administrator*.
184
-
1.Copy the `ServicePrincipalId` associated with your provisioning app from **Provisioning App** > **Properties** > **Object ID**.
183
+
1. Log in to your [Microsoft Entra admin center](https://entra.micsrosoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
184
+
1.Browse to **Provisioning App** > **Properties** > **Object ID** and copy the `ServicePrincipalId` associated with your provisioning app.
185
185
186
186
:::image type="content" border="true" source="./media/inbound-provisioning-api-powershell/object-id.png" alt-text="Screenshot of the Object ID." lightbox="./media/inbound-provisioning-api-powershell/object-id.png":::
187
187
188
-
1. As user with *Global Administrator* role, run the following command by providing the correct values for `ServicePrincipalId` and `TenantId`. It will prompt you for authentication if an authenticated session doesn't already exist for this tenant. Provide your consent to permissions prompted during authentication.
188
+
1. As user with Global Administrator role, run the following command by providing the correct values for `ServicePrincipalId` and `TenantId`. It will prompt you for authentication if an authenticated session doesn't already exist for this tenant. Provide your consent to permissions prompted during authentication.
@@ -204,7 +204,7 @@ This section explains how to send the generated bulk request payload to your inb
204
204
$ThumbPrint = $ClientCertificate.ThumbPrint
205
205
```
206
206
The generated certificate is stored **Current User\Personal\Certificates**. You can view it using the **Control Panel** -> **Manage user certificates** option.
207
-
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as *Application Administrator*.
207
+
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as Application Administrator.
208
208
1. Open [the service principal you configured](inbound-provisioning-api-grant-access.md#configure-a-service-principal) under **App Registrations**.
209
209
1. Copy the **Object ID** from the **Overview** blade. Use the value to replace the string `<AppObjectId>`. Copy the **Application (client) Id**. We will use it later and it is referenced as `<AppClientId>`.
210
210
1. Run the following command to upload your certificate to the registered service principal.
0 commit comments