Skip to content

Commit ebf6b11

Browse files
authored
Updates tone for does not.
1 parent 6064a0f commit ebf6b11

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ Applications and systems that support customization of the attribute list includ
122122
> Editing the list of supported attributes is only recommended for administrators who have customized the schema of their applications and systems, and have first-hand knowledge of how their custom attributes have been defined or if a source attribute isn't automatically displayed in the Azure Portal UI. This sometimes requires familiarity with the APIs and developer tools provided by an application or system. The ability to edit the list of supported attributes is locked down by default, but customers can enable the capability by navigating to the following URL: https://portal.azure.com/?Microsoft_AAD_Connect_Provisioning_forceSchemaEditorEnabled=true . You can then navigate to your application to view the attribute list as described [above](#editing-the-list-of-supported-attributes).
123123
124124
> [!NOTE]
125-
> When a directory extension attribute in Azure AD does not show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx_acmeCostCenter`, make sure you enter it in the same format as defined in the directory.
125+
> When a directory extension attribute in Azure AD doesn't show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx_acmeCostCenter`, make sure you enter it in the same format as defined in the directory.
126126
127127
When you're editing the list of supported attributes, the following properties are provided:
128128

@@ -259,7 +259,7 @@ The request formats in the PATCH and POST differ. To ensure that POST and PATCH
259259
![Add AppRoleAssignmentsComplex](./media/customize-application-attributes/edit-attribute-approleassignmentscomplex.png)<br>
260260
- **Things to consider**
261261
- All roles will be provisioned as primary = false.
262-
- The POST contains the role type. The PATCH request does not contain type. We are working on sending the type in both POST and PATCH requests.
262+
- The POST contains the role type. The PATCH request doesn't contain type. We are working on sending the type in both POST and PATCH requests.
263263
- AppRoleAssignmentsComplex isn't compatible with setting scope to "Sync All users and groups."
264264

265265
- **Example output**
@@ -336,7 +336,7 @@ Selecting this option will effectively force a resynchronization of all users wh
336336
- A recommended best practice is to keep the number of consecutive changes to your attribute-mappings at a minimum.
337337
- Adding a photo attribute to be provisioned to an app isn't supported today as you can't specify the format to sync the photo. You can request the feature on [User Voice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789)
338338
- The attribute IsSoftDeleted is often part of the default mappings for an application. IsSoftdeleted can be true in one of four scenarios (the user is out of scope due to being unassigned from the application, the user is out of scope due to not meeting a scoping filter, the user has been soft deleted in Azure AD, or the property AccountEnabled is set to false on the user). It's not recommended to remove the IsSoftDeleted attribute from your attribute mappings.
339-
- The Azure AD provisioning service does not support provisioning null values.
339+
- The Azure AD provisioning service doesn't support provisioning null values.
340340
- They primary key, typically "ID", should not be included as a target attribute in your attribute mappings.
341341
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. See section above for more details on role mapping.
342342
- While you can disable groups from your mappings, disabling users isn't supported.

0 commit comments

Comments
 (0)