You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/customize-application-attributes.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,7 +122,7 @@ Applications and systems that support customization of the attribute list includ
122
122
> Editing the list of supported attributes is only recommended for administrators who have customized the schema of their applications and systems, and have first-hand knowledge of how their custom attributes have been defined or if a source attribute isn't automatically displayed in the Azure Portal UI. This sometimes requires familiarity with the APIs and developer tools provided by an application or system. The ability to edit the list of supported attributes is locked down by default, but customers can enable the capability by navigating to the following URL: https://portal.azure.com/?Microsoft_AAD_Connect_Provisioning_forceSchemaEditorEnabled=true . You can then navigate to your application to view the attribute list as described [above](#editing-the-list-of-supported-attributes).
123
123
124
124
> [!NOTE]
125
-
> When a directory extension attribute in Azure AD does not show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx_acmeCostCenter`, make sure you enter it in the same format as defined in the directory.
125
+
> When a directory extension attribute in Azure AD doesn't show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx_acmeCostCenter`, make sure you enter it in the same format as defined in the directory.
126
126
127
127
When you're editing the list of supported attributes, the following properties are provided:
128
128
@@ -259,7 +259,7 @@ The request formats in the PATCH and POST differ. To ensure that POST and PATCH
- All roles will be provisioned as primary = false.
262
-
- The POST contains the role type. The PATCH request does not contain type. We are working on sending the type in both POST and PATCH requests.
262
+
- The POST contains the role type. The PATCH request doesn't contain type. We are working on sending the type in both POST and PATCH requests.
263
263
- AppRoleAssignmentsComplex isn't compatible with setting scope to "Sync All users and groups."
264
264
265
265
- **Example output**
@@ -336,7 +336,7 @@ Selecting this option will effectively force a resynchronization of all users wh
336
336
- A recommended best practice is to keep the number of consecutive changes to your attribute-mappings at a minimum.
337
337
- Adding a photo attribute to be provisioned to an app isn't supported today as you can't specify the format to sync the photo. You can request the feature on [User Voice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789)
338
338
- The attribute IsSoftDeleted is often part of the default mappings for an application. IsSoftdeleted can be true in one of four scenarios (the user is out of scope due to being unassigned from the application, the user is out of scope due to not meeting a scoping filter, the user has been soft deleted in Azure AD, or the property AccountEnabled is set to false on the user). It's not recommended to remove the IsSoftDeleted attribute from your attribute mappings.
339
-
- The Azure AD provisioning service does not support provisioning null values.
339
+
- The Azure AD provisioning service doesn't support provisioning null values.
340
340
- They primary key, typically "ID", should not be included as a target attribute in your attribute mappings.
341
341
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. See section above for more details on role mapping.
342
342
- While you can disable groups from your mappings, disabling users isn't supported.
0 commit comments