You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md
+3-10Lines changed: 3 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,17 +7,14 @@ manager: karenh444
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.topic: overview
10
-
ms.date: 05/28/2021
10
+
ms.date: 11/18/2021
11
11
ms.subservice: hybrid
12
12
ms.author: billmath
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
16
# Azure AD on-premises application provisioning architecture
17
17
18
-
>[!IMPORTANT]
19
-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability (GA).
20
-
21
18
## Overview
22
19
23
20
The following diagram shows an overview of how on-premises application provisioning works.
@@ -91,8 +88,8 @@ You can define one or more matching attribute(s) and prioritize them based on th
91
88
92
89
93
90
## Agent best practices
94
-
-Ensure the auto Azure AD Connect Provisioning Agent Auto Update service is running. It's enabled by default when you install the agent. Auto-update is required for Microsoft to support your deployment.
95
-
- Avoid all forms of inline inspection on outbound TLS communications between agents and Azure. This type of inline inspection causes degradation to the communication flow.
91
+
-Using the same agent for the on-prem provisioning feature along with Workday / SuccessFactors / Azure AD Connect Cloud Sync is currently unsupported. We are actively working to support on-prem provisioning on the same agent as the other provisioning scenarios.
92
+
--Avoid all forms of inline inspection on outbound TLS communications between agents and Azure. This type of inline inspection causes degradation to the communication flow.
96
93
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
97
94
- Reducing the distance between the two ends of the hop.
98
95
- Choosing the right network to traverse. For example, traversing a private network rather than the public internet might be faster because of dedicated links.
@@ -112,10 +109,6 @@ For the latest GA version of the provisioning agent, see [Azure AD connect provi
112
109
2. Go to **Control Panel** > **Uninstall or Change a Program**.
113
110
3. Look for the version that corresponds to the entry for **Microsoft Azure AD Connect Provisioning Agent**.
114
111
115
-
### Does Microsoft automatically push provisioning agent updates?
116
-
117
-
Yes. Microsoft automatically updates the provisioning agent if the Windows service Microsoft Azure AD Connect Agent Updater is up and running. Ensuring that your agent is up to date is required for support to troubleshoot issues.
118
-
119
112
### Can I install the provisioning agent on the same server running Azure AD Connect or Microsoft Identity Manager?
120
113
121
114
Yes. You can install the provisioning agent on the same server that runs Azure AD Connect or Microsoft Identity Manager, but they aren't required.
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
20
-
21
18
## Troubleshoot test connection issues
22
19
After you configure the provisioning agent and ECMA host, it's time to test connectivity from the Azure Active Directory (Azure AD) provisioning service to the provisioning agent, the ECMA host, and the application. To perform this end-to-end test, select **Test connection** in the application in the Azure portal. When the test connection fails, try the following troubleshooting steps:
# Export a Microsoft Identity Manager connector for use with the Azure AD ECMA Connector Host
18
18
19
-
>[!IMPORTANT]
20
-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
21
-
22
19
You can import into the Azure Active Directory (Azure AD) ECMA Connector Host a configuration for a specific connector from a Forefront Identity Manager Synchronization Service or Microsoft Identity Manager Synchronization Service (MIM Sync) installation. The MIM Sync installation is only used for configuration, not for the ongoing synchronization from Azure AD.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/on-premises-scim-provisioning.md
+7-12Lines changed: 7 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,16 +8,13 @@ ms.service: active-directory
8
8
ms.subservice: app-provisioning
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 10/16/2021
11
+
ms.date: 11/17/2021
12
12
ms.author: billmath
13
13
ms.reviewer: arvinh
14
14
---
15
15
16
16
# Azure AD on-premises application provisioning to SCIM-enabled apps
17
17
18
-
>[!IMPORTANT]
19
-
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
20
-
21
18
The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) client that can be used to automatically provision users into cloud or on-premises applications. This article outlines how you can use the Azure AD provisioning service to provision users into an on-premises application that's SCIM enabled. If you want to provision users into non-SCIM on-premises applications that use SQL as a data store, see the [Azure AD ECMA Connector Host Generic SQL Connector tutorial](tutorial-ecma-sql-connector.md). If you want to provision users into cloud apps such as DropBox and Atlassian, review the app-specific [tutorials](../../active-directory/saas-apps/tutorial-list.md).
22
19
23
20

@@ -30,21 +27,19 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
30
27
## On-premises app provisioning to SCIM-enabled apps
31
28
To provision users to SCIM-enabled apps:
32
29
33
-
1. Add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
34
-
1. Go to your app and select **Provisioning** > **Download the provisioning agent**.
35
-
1. Select **On-Premises Connectivity**, and download the provisioning agent.
30
+
1.[Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM endpoint is hosted on.
36
31
1. Copy the agent onto the virtual machine or server that your SCIM endpoint is hosted on.
37
32
1. Open the provisioning agent installer, agree to the terms of service, and select **Install**.
38
33
1. Open the provisioning agent wizard, and select **On-premises provisioning** when prompted for the extension you want to enable.
39
34
1. Provide credentials for an Azure AD administrator when you're prompted to authorize. Hybrid administrator or global administrator is required.
40
35
1. Select **Confirm** to confirm the installation was successful.
41
-
1. Go back to your application, and select **On-Premises Connectivity**.
36
+
1. Navigate to the Azure Portal and add the **On-premises SCIM app** from the [gallery](../../active-directory/manage-apps/add-application-portal.md).
37
+
1. Select **On-Premises Connectivity**, and download the provisioning agent. 1. Go back to your application, and select **On-Premises Connectivity**.
42
38
1. Select the agent that you installed from the dropdown list, and select **Assign Agent(s)**.
43
-
1. Wait 10 minutes or restart the Azure AD Connect Provisioning agent service on your server or VM.
44
-
1. Provide the URL for your SCIM endpoint in the **Tenant URL** box. An example is https://localhost:8585/scim.
45
-
39
+
1. Wait 20 minutes prior to completing the next step, to provide time for the agent assignment to complete.
40
+
1. Provide the URL for your SCIM endpoint in the **Tenant URL** box. An example is https://localhost:8585/scim.
46
41

47
-
1. Select **Test Connection**, and save the credentials.
42
+
1. Select **Test Connection**, and save the credentials. Use the steps [here](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-ecma-troubleshoot#troubleshoot-test-connection-issues) if you run into connectivity issues.
48
43
1. Configure any [attribute mappings](customize-application-attributes.md) or [scoping](define-conditional-rules-for-provisioning-user-accounts.md) rules required for your application.
49
44
1. Add users to scope by [assigning users and groups](../../active-directory/manage-apps/add-application-portal-assign-users.md) to the application.
50
45
1. Test provisioning a few users [on demand](provision-on-demand.md).
Microsoft Identity Web is a set of ASP.NET Core libraries that simplifies adding authentication and authorization support to web apps and web APIs integrating with the Microsoft identity platform. It provides a single-surface API convenience layer that ties together ASP.NET Core, its authentication middleware, and the [Microsoft Authentication Library (MSAL) for .NET](https://github.com/azuread/microsoft-authentication-library-for-dotnet).
23
23
24
+
You can get Microsoft.Identity.Web from NuGet or by using a Visual Studio project template to create a new app project.
25
+
24
26
## Supported application scenarios
25
27
26
28
If you're building ASP.NET Core web apps or web APIs and want to use Azure Active Directory (Azure AD) or Azure AD B2C for identity and access management (IAM), we recommend using Microsoft Identity Web for all of these scenarios:
@@ -30,11 +32,7 @@ If you're building ASP.NET Core web apps or web APIs and want to use Azure Activ
30
32
-[Protected web API that only authenticated users can access](scenario-protected-web-api-overview.md)
31
33
-[Protected web API that calls another (downstream) web API on behalf of the signed-in user](scenario-web-api-call-api-overview.md)
32
34
33
-
## Get the library
34
-
35
-
You can get Microsoft Identity Web from [NuGet](#nuget), [.NET Core project templates](#project-templates), and [GitHub](#github).
36
-
37
-
#### NuGet
35
+
## Install from NuGet
38
36
39
37
Microsoft Identity Web is available on NuGet as a set of packages that provide modular functionality based on your app's needs. Use the .NET CLI's `dotnet add` command or Visual Studio's **NuGet Package Manager** to install the packages appropriate for your project:
40
38
@@ -43,37 +41,45 @@ Microsoft Identity Web is available on NuGet as a set of packages that provide m
43
41
-[Microsoft.Identity.Web.MicrosoftGraph](https://www.nuget.org/packages/Microsoft.Identity.Web.MicrosoftGraph) - Optional. Provides simplified interaction with the Microsoft Graph API.
44
42
-[Microsoft.Identity.Web.MicrosoftGraphBeta](https://www.nuget.org/packages/Microsoft.Identity.Web.MicrosoftGraphBeta) - Optional. Provides simplified interaction with the Microsoft Graph API [beta endpoint](/graph/api/overview?view=graph-rest-beta&preserve-view=true).
45
43
46
-
#### Project templates
44
+
## Install by using a Visual Studio project template
45
+
46
+
Several project templates that use Microsoft Identity Web are included in .NET SDK versions 5.0 and above. The project templates aren't included in the ASP.NET Core 3.1 SDK, but you can install them separately.
47
47
48
-
Microsoft Identity Web project templates are included in .NET 5.0 and are available for download for ASP.NET Core 3.1 projects.
48
+
### .NET 5.0+ - Project templates included
49
49
50
-
If you're using ASP.NET Core 3.1, install the templates with the .NET CLI:
50
+
The Microsoft Identity Web project templates are included in .NET SDK versions 5.0 and above.
51
+
52
+
This example .NET CLI command creates a Blazor Server project that includes Microsoft Identity Web.
51
53
52
54
```dotnetcli
53
-
dotnet new --install Microsoft.Identity.Web.ProjectTemplates::1.0.0
The following diagram shows a high-level view of the supported app types and their relevant arguments:
58
+
Don't append a `2` to the application type argument (`blazorserver` in the example) if you're using the templates included in .NET SDK 5.0+. Include the `2` suffix *only* if you're on ASP.NET Core 3.1 and you installed the templates separately as described in the next section.
57
59
58
-
:::image type="content" source="media/microsoft-identity-web-overview/diagram-microsoft-identity-web-templates.png" lightbox="media/microsoft-identity-web-overview/diagram-microsoft-identity-web-templates.png" alt-text="Diagram of the available dot net CLI project templates for Microsoft Identity Web":::
59
-
<br /><sup><b>*</b></sup> `MultiOrg` is not supported with `webapi2`, but can be enabled in *appsettings.json* by setting tenant to `common` or `organizations`
60
-
<br /><sup><b>**</b></sup> `--calls-graph` is not supported for Azure AD B2C
60
+
### ASP.NET Core 3.1 - Install the project templates
61
61
62
-
This example .NET CLI command, taken from our [Blazor Server tutorial](tutorial-blazor-server.md), generates a new Blazor Server project that includes the right packages and starter code (placeholder values shown):
62
+
If you're using ASP.NET Core 3.1, install the project templates from NuGet.
Microsoft Identity Web is an open-source project hosted on GitHub: <ahref="https://github.com/AzureAD/microsoft-identity-web"target="_blank">AzureAD/microsoft-identity-web</a>
74
+
The following diagram shows several of the available app type templates and their arguments. Append a `2` to the app type argument (`blazorserver2` in the example) only if you're using the ASP.NET Core 3.1 SDK and you installed the templates by using `dotnet new --install`.
71
75
72
-
The [repository wiki](https://github.com/AzureAD/microsoft-identity-web/wiki) contains additional documentation, and if you need help or discover a bug, you can [file an issue](https://github.com/AzureAD/microsoft-identity-web/issues).
76
+
:::image type="content" source="media/microsoft-identity-web-overview/diagram-microsoft-identity-web-templates.png" lightbox="media/microsoft-identity-web-overview/diagram-microsoft-identity-web-templates.png" alt-text="Diagram of the available dot net CLI project templates for Microsoft Identity Web":::
77
+
<br /><sup><b>*</b></sup> `MultiOrg` is not supported with `webapi2`, but can be enabled in *appsettings.json* by setting tenant to `common` or `organizations`
78
+
<br /><sup><b>**</b></sup> `--calls-graph` is not supported for Azure AD B2C
73
79
74
-
## Features
80
+
## Features of the project templates
75
81
76
-
Microsoft Identity Web includes several features not provided if you use the default ASP.NET 3.1 project templates.
82
+
Microsoft Identity Web includes several features not available in the default ASP.NET Core 3.1 project templates.
77
83
78
84
| Feature | ASP.NET Core 3.1 | Microsoft Identity Web |
If you’re receiving a Request_BadRequest error, it's because the settings already exist in the tenant, so when you try to create a new property:value pair, the result is an error. In this case, take the following steps:
76
+
77
+
1. Repeat steps 1-4 from [Enable sensitivity label support in PowerShell](#enable-sensitivity-label-support-in-powershell).
78
+
1. Issue a `Get-AzureADDirectorySetting | FL` cmdlet and check the ID. If several ID values are present, use the one where you see the EnableMIPLabels property on the Values settings. You will need the ID in step 4.
79
+
1. Set the EnableMIPLabels property variable: `$Setting["EnableMIPLabels"] = "True"`
80
+
1. Issue the `Set-AzureADDirectorySetting -DirectorySetting $Setting -ID` cmdlet, using the ID that you retrieved in step 2.
81
+
1. Ensure that the value is now correctly updated by issuing `$Setting.Values` again.
82
+
75
83
You will also need to synchronize your sensitivity labels to Azure AD. For instructions, see [How to enable sensitivity labels for containers and synchronize labels](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites#how-to-enable-sensitivity-labels-for-containers-and-synchronize-labels).
0 commit comments