You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/airbase-provisioning-tutorial.md
+15-3Lines changed: 15 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: 'Tutorial: Configure Airbase for automatic user provisioning with Azure Active Directory'
3
-
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Airbase.
3
+
description: Learn how to automatically provision and deprovision user accounts from Azure AD to Airbase.
4
4
services: active-directory
5
5
author: twimmers
6
6
writer: twimmers
@@ -16,7 +16,7 @@ ms.author: thwimmer
16
16
17
17
# Tutorial: Configure Airbase for automatic user provisioning
18
18
19
-
This tutorial describes the steps you need to perform in both Airbase and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users to [Airbase](https://www.airbase.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
19
+
This tutorial describes the steps you need to perform in both Airbase and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and deprovisions users to [Airbase](https://www.airbase.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
20
20
21
21
22
22
## Supported capabilities
@@ -40,7 +40,19 @@ The scenario outlined in this tutorial assumes that you already have the followi
40
40
* Determine what data to [map between Azure AD and Airbase](../app-provisioning/customize-application-attributes.md).
41
41
42
42
## Step 2. Configure Airbase to support provisioning with Azure AD
43
-
Contact Airbase support to configure Airbase to support provisioning with Azure AD.
43
+
44
+
1. Log in to Airbase portal.
45
+
1. Navigate to the Users section.
46
+
1. Click Sync with HRIS.
47
+
48
+

49
+
50
+
1. Select Azure AD from the list of HRIS.
51
+
1. Make a note of the Base URL and API Token.
52
+
53
+

54
+
55
+
1. Use these values in Step 5.5.
44
56
45
57
## Step 3. Add Airbase from the Azure AD application gallery

78
78
79
79
5. Under the **Admin Credentials** section, input your Hoxhunt Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Hoxhunt. If the connection fails, ensure your Hoxhunt account has Admin permissions and try again.
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.

86
86
87
87
7. Select **Save**.
88
88
89
89
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Hoxhunt**.
90
90
91
91
9. Review the user attributes that are synchronized from Azure AD to Hoxhunt in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Hoxhunt for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Hoxhunt API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
104
109
105
110
11. To enable the Azure AD provisioning service for Hoxhunt, change the **Provisioning Status** to **On** in the **Settings** section.
106
111
107
-

112
+

108
113
109
114
12. Define the users and/or groups that you would like to provision to Hoxhunt by choosing the desired values in **Scope** in the **Settings** section.

116
121
117
122
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
118
123
@@ -124,7 +129,8 @@ Once you've configured provisioning, use the following resources to monitor your
124
129
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
125
130
126
131
## Change Log
127
-
* 04/20/2021 - Added support for "preferredLanguage" and enterprise extension attribute "urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:division".
132
+
* 04/20/2021 - Added support for core user attribute **preferredLanguage** and enterprise extension attribute **urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:division**.
133
+
* 08/08/2023 - Added support for core user attribute **addresses[type eq "work"].locality|String** and enterprise extension attribute **urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager**.
0 commit comments