Skip to content

Commit eaa0a32

Browse files
authored
Merge pull request #236609 from MicrosoftDocs/main
5/02 AM Publish
2 parents 8c8834a + a219bca commit eaa0a32

File tree

211 files changed

+1619
-758
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

211 files changed

+1619
-758
lines changed

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ git clone https://github.com/Azure-Samples/active-directory-b2c-msal-node-sign-i
7373

7474
Extract the sample file to a folder. You'll get a web app with the following directory structure:
7575

76-
```text
76+
```output
7777
active-directory-b2c-msal-node-sign-in-sign-out-webapp/
7878
├── index.js
7979
└── package.json

articles/active-directory/app-provisioning/configure-automatic-user-provisioning-portal.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 10/06/2022
11+
ms.date: 05/02/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
1515

1616
# Managing user account provisioning for enterprise apps in the Azure portal
1717

18-
This article describes the general steps for managing automatic user account provisioning and de-provisioning for applications that support it. *User account provisioning* is the act of creating, updating, and/or disabling user account records in an application’s local user profile store. Most cloud and SaaS applications store the users role and permissions in the user's own local user profile store, and presence of such a user record in the user's local store is *required* for single sign-on and access to work. To learn more about automatic user account provisioning, see [Automate User Provisioning and Deprovisioning to SaaS Applications with Azure Active Directory](user-provisioning.md).
18+
This article describes the general steps for managing automatic user account provisioning and deprovisioning for applications that support it. *User account provisioning* is the act of creating, updating, and/or disabling user account records in an application’s local user profile store. Most cloud and SaaS applications store the role and permissions in the user's own local user profile store. The presence of such a user record in the user's local store is *required* for single sign-on and access to work. To learn more about automatic user account provisioning, see [Automate User Provisioning and Deprovisioning to SaaS Applications with Azure Active Directory](user-provisioning.md).
1919

2020
> [!IMPORTANT]
2121
> Azure Active Directory (Azure AD) has a gallery that contains thousands of pre-integrated applications that are enabled for automatic provisioning with Azure AD. You should start by finding the provisioning setup tutorial specific to your application in the [List of tutorials on how to integrate SaaS apps with Azure Active Directory](../saas-apps/tutorial-list.md). You'll likely find step-by-step guidance for configuring both the app and Azure AD to create the provisioning connection.
@@ -36,7 +36,7 @@ Use the Azure portal to view and manage all applications that are configured for
3636

3737
The **Provisioning** pane begins with a **Mode** menu, which shows the provisioning modes supported for an enterprise application, and lets you configure them. The available options include:
3838

39-
* **Automatic** - This option is shown if Azure AD supports automatic API-based provisioning or de-provisioning of user accounts to this application. Select this mode to display an interface that helps administrators:
39+
* **Automatic** - This option is shown if Azure AD supports automatic API-based provisioning or deprovisioning of user accounts to this application. Select this mode to display an interface that helps administrators:
4040

4141
* Configure Azure AD to connect to the application's user management API
4242
* Create account mappings and workflows that define how user account data should flow between Azure AD and the app
@@ -72,10 +72,10 @@ Supported customizations include:
7272

7373
### Settings
7474

75-
Expand **Settings** to set an email address to receive notifications and whether to receive alerts on errors. You can also select the scope of users to sync. You can choose to sync all users and groups or only those that are assigned.
75+
Expand **Settings** to set an email address to receive notifications and whether to receive alerts on errors. Also select the scope of users to sync. Choose to sync all users and groups or only users that are assigned.
7676

7777
### Provisioning Status
7878

79-
If provisioning is being enabled for the first time for an application, turn on the service by changing the **Provisioning Status** to **On**. This change causes the Azure AD provisioning service to run an initial cycle. It reads the users assigned in the **Users and groups** section, queries the target application for them, and then runs the provisioning actions defined in the Azure AD **Mappings** section. During this process, the provisioning service stores cached data about what user accounts it's managing, so non-managed accounts inside the target applications that were never in scope for assignment aren't affected by de-provisioning operations. After the initial cycle, the provisioning service automatically synchronizes user and group objects on a forty-minute interval.
79+
If provisioning is being enabled for the first time for an application, turn on the service by changing the **Provisioning Status** to **On**. This change causes the Azure AD provisioning service to run an initial cycle. It reads the users assigned in the **Users and groups** section, queries the target application for them, and then runs the provisioning actions defined in the Azure AD **Mappings** section. During this process, the provisioning service stores cached data about what user accounts it's managing. The service stores cached data so nonmanaged accounts inside the target applications that were never in scope for assignment aren't affected in deprovisioning operations. After the initial cycle, the provisioning service automatically synchronizes user and group objects on a forty-minute interval.
8080

8181
Change the **Provisioning Status** to **Off** to pause the provisioning service. In this state, Azure doesn't create, update, or remove any user or group objects in the app. Change the state back to **On** and the service picks up where it left off.

articles/active-directory/develop/msal-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ MSAL Supports a wide range of application types and scenarios. Please refer to [
8282
ADAL to MSAL Migration Guide for different platforms are available in the following link.
8383
- [Migrate to MSAL iOS and MacOS](migrate-objc-adal-msal.md)
8484
- [Migrate to MSAL Java](migrate-adal-msal-java.md)
85-
- [Migrate to MSAL .Net](msal-net-migration.md)
85+
- [Migrate to MSAL .NET](msal-net-migration.md)
8686
- [Migrate to MSAL Node](msal-node-migration.md)
8787
- [Migrate to MSAL Python](migrate-python-adal-msal.md)
8888

articles/active-directory/develop/scenario-desktop-acquire-token-interactive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ WithParentActivityOrWindow(IWin32Window window)
6060
// Mac
6161
WithParentActivityOrWindow(NSWindow window)
6262

63-
// .NET Standard (this will be on all platforms at runtime, but only on NetStandard at build time)
63+
// .NET Standard (this will be on all platforms at runtime, but only on .NET Standard platforms at build time)
6464
WithParentActivityOrWindow(object parent).
6565
```
6666

articles/active-directory/develop/scenario-spa-production.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.date: 05/07/2019
1313
ms.author: owenrichards
1414
ms.custom: aaddev
15-
#Customer intent: As an application developer, I want to know how to write a single-page application by using the Microsoft identity platform.
15+
#Customer intent: As an application developer, I want to know how to write a single-page application by using the Microsoft identity platform.
1616
---
1717

1818
# Single-page application: Move to production

0 commit comments

Comments
 (0)