Skip to content

Commit e852f50

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents ad0c92f + 2d3740e commit e852f50

File tree

263 files changed

+2684
-1416
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

263 files changed

+2684
-1416
lines changed

.openpublishing.redirection.json

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -251,6 +251,12 @@
251251
"redirect_url": "/azure/site-recovery/site-to-site-deprecation",
252252
"redirect_document_id": false
253253
},
254+
255+
{
256+
"source_path": "articles/site-recovery/site-to-site-deprecation.md",
257+
"redirect_url": "/azure/site-recovery/hyper-v-azure-tutorial",
258+
"redirect_document_id": false
259+
},
254260
{
255261
"source_path": "articles/machine-learning/service/quickstart-get-started.md",
256262
"redirect_url": "/azure/machine-learning/service/tutorial-1st-experiment-sdk-setup",
@@ -4776,6 +4782,21 @@
47764782
"redirect_url": "/azure/app-service-mobile",
47774783
"redirect_document_id": false
47784784
},
4785+
{
4786+
"source_path": "articles/application-gateway/application-gateway-backend-ssl.md",
4787+
"redirect_url": "/azure/application-gateway/ssl-overview",
4788+
"redirect_document_id": false
4789+
},
4790+
{
4791+
"source_path": "articles/application-gateway/tutorial-external-site-redirect-cli.md",
4792+
"redirect_url": "/azure/application-gateway/redirect-external-site-cli",
4793+
"redirect_document_id": false
4794+
},
4795+
{
4796+
"source_path": "articles/application-gateway/application-gateway-create-gateway-cli.md",
4797+
"redirect_url": "/azure/application-gateway/quick-create-cli",
4798+
"redirect_document_id": false
4799+
},
47794800
{
47804801
"source_path": "articles/application-gateway/application-gateway-ssl-cli.md",
47814802
"redirect_url": "/azure/application-gateway/tutorial-ssl-cli",
@@ -43715,6 +43736,11 @@
4371543736
"source_path": "articles/aks/virtual-kubelet.md",
4371643737
"redirect_url": "/azure/aks/concepts-scale#burst-to-azure-container-instances",
4371743738
"redirect_document_id": false
43739+
},
43740+
{
43741+
"source_path": "articles/healthcare-apis/configure-cosmos-db.md",
43742+
"redirect_url": "/azure/healthcare-apis/configure-database",
43743+
"redirect_document_id": false
4371843744
}
4371943745
]
4372043746
}

articles/active-directory/develop/active-directory-authentication-libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The Azure Active Directory Authentication Library (ADAL) v1.0 enables applicatio
4343
| JavaScript |ADAL.js |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-js) |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-js) |[Single-page app](https://github.com/Azure-Samples/active-directory-javascript-singlepageapp-dotnet-webapi) | |
4444
| iOS, macOS |ADAL |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-objc/releases) |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-objc) |[iOS app](https://docs.microsoft.com/azure/active-directory/active-directory-devquickstarts-ios) | [Reference](http://cocoadocs.org/docsets/ADAL/2.5.1/)|
4545
| Android |ADAL |[Maven](https://search.maven.org/search?q=g:com.microsoft.aad+AND+a:adal&core=gav) |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-android) |[Android app](https://docs.microsoft.com/azure/active-directory/active-directory-devquickstarts-android) | [JavaDocs](https://javadoc.io/doc/com.microsoft.aad/adal/)|
46-
| Node.js |ADAL |[npm](https://www.npmjs.com/package/adal-node) |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-nodejs) | [Node.js web app](https://github.com/Azure-Samples/active-directory-node-webapp-openidconnect)|[Reference](https://docs.microsoft.com/javascript/api/adal-node/?view=azure-node-latest) |
46+
| Node.js |ADAL |[npm](https://www.npmjs.com/package/adal-node) |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-nodejs) | [Node.js web app](https://github.com/Azure-Samples/active-directory-node-webapp-openidconnect)|[Reference](https://docs.microsoft.com/javascript/api/overview/azure/activedirectory) |
4747
| Java |ADAL4J |[Maven](https://search.maven.org/#search%7Cga%7C1%7Ca%3Aadal4j%20g%3Acom.microsoft.azure) |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-java) |[Java web app](https://github.com/Azure-Samples/active-directory-java-webapp-openidconnect) |[Reference](https://javadoc.io/doc/com.microsoft.azure/adal4j) |
4848
| Python |ADAL |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-python) |[GitHub](https://github.com/AzureAD/azure-activedirectory-library-for-python) |[Python web app](https://github.com/Azure-Samples/active-directory-python-webapp-graphapi) |[Reference](https://adal-python.readthedocs.io/) |
4949

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The What's new in Azure Active Directory? release notes provide information abou
4040

4141
Azure AD threat intelligence detection is now available as part of the updated Azure AD Identity Protection feature. This new functionality helps to indicate unusual user activity for a specific user or activity that’s consistent with known attack patterns based on Microsoft’s internal and external threat intelligence sources.
4242

43-
For more information about the refreshed version of Azure AD Identity Protection, see the [Four major Azure AD Identity Protection enhancements are now in public preview](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Four-major-Azure-AD-Identity-Protection-enhancements-are-now-in/ba-p/326935) blog and the [What is Azure Active Directory Identity Protection (refreshed)?](https://docs.microsoft.com/azure/active-directory/identity-protection/overview-v2) article. For more information about Azure AD threat intelligence detection, see the [Azure Active Directory Identity Protection risk detections](https://docs.microsoft.com/azure/active-directory/identity-protection/risk-events-reference#azure-ad-threat-intelligence) article.
43+
For more information about the refreshed version of Azure AD Identity Protection, see the [Four major Azure AD Identity Protection enhancements are now in public preview](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Four-major-Azure-AD-Identity-Protection-enhancements-are-now-in/ba-p/326935) blog and the [What is Azure Active Directory Identity Protection (refreshed)?](https://docs.microsoft.com/azure/active-directory/identity-protection/overview-v2) article. For more information about Azure AD threat intelligence detection, see the [Azure Active Directory Identity Protection risk detections](https://docs.microsoft.com/azure/active-directory/identity-protection/concept-identity-protection-risks) article.
4444

4545
---
4646

Lines changed: 175 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,175 @@
1+
---
2+
title: 'Tutorial: Configure Looop for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to Looop.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: zchia
7+
writer: zchia
8+
manager: beatrizd
9+
10+
ms.assetid: 0efe2262-43c3-4e0c-97fa-9344385638e2
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: article
17+
ms.date: 09/19/2019
18+
ms.author: Zhchia
19+
---
20+
21+
# Tutorial: Configure Looop for automatic user provisioning
22+
23+
The objective of this tutorial is to demonstrate the steps to be performed in Looop and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and de-provision users and/or groups to Looop.
24+
25+
> [!NOTE]
26+
> This tutorial describes a connector built on top of the Azure AD User Provisioning Service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../manage-apps/user-provisioning.md).
27+
>
28+
> This connector is currently in Public Preview. For more information on the general Microsoft Azure terms of use for Preview features, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
29+
30+
## Prerequisites
31+
32+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
33+
34+
* An Azure AD tenant
35+
* [A Looop tenant](https://www.looop.co/pricing/)
36+
* A user account on a Looop with Administrator permissions.
37+
38+
## Assign users to Looop
39+
40+
Azure Active Directory uses a concept called assignments to determine which users should receive access to selected apps. In the context of automatic user provisioning, only the users and/or groups that have been assigned to an application in Azure AD are synchronized.
41+
42+
Before configuring and enabling automatic user provisioning, you should decide which users and/or groups in Azure AD need access to Looop. Once decided, you can assign these users and/or groups to Looop by following the instructions here:
43+
44+
* [Assign a user or group to an enterprise app](../manage-apps/assign-user-or-group-access-portal.md)
45+
46+
### Important tips for assigning users to Looop
47+
48+
* It is recommended that a single Azure AD user is assigned to Looop to test the automatic user provisioning configuration. Additional users and/or groups may be assigned later.
49+
50+
* When assigning a user to Looop, you must select any valid application-specific role (if available) in the assignment dialog. Users with the **Default Access** role are excluded from provisioning.
51+
52+
## Set up Looop for provisioning
53+
54+
Before configuring Looop for automatic user provisioning with Azure AD, you will need to retrieve some provisioning information from Looop.
55+
56+
1. Sign in to your [Looop Admin Console](https://app.looop.co/#/login) and select **Account**. Under **Account Settings** select **Authentication**.
57+
58+
![Looop Add SCIM](media/looop-provisioning-tutorial/admin.png)
59+
60+
2. Generate a new token by clicking **Reset Token** under **SCIM Integration**.
61+
62+
![Looop Add SCIM](media/looop-provisioning-tutorial/resettoken.png)
63+
64+
3. Copy the **SCIM Endpoint** and the **Token**. These values will be entered in the **Tenant URL** and **Secret Token** fields in the Provisioning tab of your Looop application in the Azure portal.
65+
66+
![Looop Create Token](media/looop-provisioning-tutorial/token.png)
67+
68+
## Add Looop from the gallery
69+
70+
To configure Looop for automatic user provisioning with Azure AD, you need to add Looop from the Azure AD application gallery to your list of managed SaaS applications.
71+
72+
1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**.
73+
74+
![The Azure Active Directory button](common/select-azuread.png)
75+
76+
2. Go to **Enterprise applications**, and then select **All applications**.
77+
78+
![The Enterprise applications blade](common/enterprise-applications.png)
79+
80+
3. To add a new application, select the **New application** button at the top of the pane.
81+
82+
![The New application button](common/add-new-app.png)
83+
84+
4. In the search box, enter **Looop**, select **Looop** in the results panel.
85+
86+
![Looop in the results list](common/search-new-app.png)
87+
88+
5. Select the **Sign-up for Looop** button which will redirect you to Looop's login page.
89+
90+
![Looop OIDC Add](media/looop-provisioning-tutorial/signup.png)
91+
92+
6. As Looop is an OpenIDConnect app, choose to login to Looop using your Microsoft work account.
93+
94+
![Looop OIDC login](media/looop-provisioning-tutorial/msftlogin.png)
95+
96+
7. After a successful authentication, accept the consent prompt for the consent page. The application will then be automatically added to your tenant and you will be redirected to your Looop account.
97+
98+
![Looop OIDc Consent](media/looop-provisioning-tutorial/accept.png)
99+
100+
## Configure automatic user provisioning to Looop
101+
102+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Looop based on user and/or group assignments in Azure AD.
103+
104+
### To configure automatic user provisioning for Looop in Azure AD:
105+
106+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
107+
108+
![Enterprise applications blade](common/enterprise-applications.png)
109+
110+
2. In the applications list, select **Looop**.
111+
112+
![The Looop link in the Applications list](common/all-applications.png)
113+
114+
3. Select the **Provisioning** tab.
115+
116+
![Provisioning tab](common/provisioning.png)
117+
118+
4. Set the **Provisioning Mode** to **Automatic**.
119+
120+
![Provisioning tab](common/provisioning-automatic.png)
121+
122+
5. Under the **Admin Credentials** section, input `https://<organisation_domain>.looop.co/scim/v2` in **Tenant URL**. For example `https://demo.looop.co/scim/v2`. Input the value that you retrieved and saved earlier from Looop in **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to Looop. If the connection fails, ensure your Looop account has Admin permissions and try again.
123+
124+
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
125+
126+
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
127+
128+
![Notification Email](common/provisioning-notification-email.png)
129+
130+
7. Click **Save**.
131+
132+
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Looop**.
133+
134+
![Looop User Mappings](media/looop-provisioning-tutorial/usermappings.png)
135+
136+
9. Review the user attributes that are synchronized from Azure AD to Looop in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Looop for update operations. Select the **Save** button to commit any changes.
137+
138+
![Looop User Attributes](media/looop-provisioning-tutorial/userattributes.png)
139+
140+
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Meta Networks Connector**.
141+
142+
![Looop Group Mappings](media/looop-provisioning-tutorial/groupmappings.png)
143+
144+
11. Review the group attributes that are synchronized from Azure AD to Meta Networks Connector in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Meta Networks Connector for update operations. Select the **Save** button to commit any changes.
145+
146+
![Looop Group Attributes](media/looop-provisioning-tutorial/groupattributes.png)
147+
148+
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
149+
150+
11. To enable the Azure AD provisioning service for Looop, change the **Provisioning Status** to **On** in the **Settings** section.
151+
152+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
153+
154+
12. Define the users and/or groups that you would like to provision to Looop by choosing the desired values in **Scope** in the **Settings** section.
155+
156+
![Provisioning Scope](common/provisioning-scope.png)
157+
158+
13. When you are ready to provision, click **Save**.
159+
160+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
161+
162+
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity report, which describes all actions performed by the Azure AD provisioning service on Looop.
163+
164+
For more information on how to read the Azure AD provisioning logs, see [Reporting on automatic user account provisioning](../manage-apps/check-status-user-account-provisioning.md).
165+
166+
## Additional resources
167+
168+
* [Managing user account provisioning for Enterprise Apps](../manage-apps/configure-automatic-user-provisioning-portal.md)
169+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
170+
171+
## Next steps
172+
173+
* [Learn how to review logs and get reports on provisioning activity](../manage-apps/check-status-user-account-provisioning.md)
174+
175+
30.5 KB
Loading
7.12 KB
Loading
11.4 KB
Loading
9.83 KB
Loading
6.7 KB
Loading
10.2 KB
Loading

0 commit comments

Comments
 (0)