Skip to content

Commit f3d9f2d

Browse files
authored
Merge pull request #247881 from Harshita-130901/Provisioning-Update-tutorials-10/8
Provisioning Tutorials
2 parents 532399c + f2bf7da commit f3d9f2d

File tree

5 files changed

+104
-86
lines changed

5 files changed

+104
-86
lines changed

articles/active-directory/saas-apps/airbase-provisioning-tutorial.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: 'Tutorial: Configure Airbase for automatic user provisioning with Azure Active Directory'
3-
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Airbase.
3+
description: Learn how to automatically provision and deprovision user accounts from Azure AD to Airbase.
44
services: active-directory
55
author: twimmers
66
writer: twimmers
@@ -16,7 +16,7 @@ ms.author: thwimmer
1616

1717
# Tutorial: Configure Airbase for automatic user provisioning
1818

19-
This tutorial describes the steps you need to perform in both Airbase and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users to [Airbase](https://www.airbase.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
19+
This tutorial describes the steps you need to perform in both Airbase and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and deprovisions users to [Airbase](https://www.airbase.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
2020

2121

2222
## Supported capabilities
@@ -40,7 +40,19 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040
* Determine what data to [map between Azure AD and Airbase](../app-provisioning/customize-application-attributes.md).
4141

4242
## Step 2. Configure Airbase to support provisioning with Azure AD
43-
Contact Airbase support to configure Airbase to support provisioning with Azure AD.
43+
44+
1. Log in to Airbase portal.
45+
1. Navigate to the Users section.
46+
1. Click Sync with HRIS.
47+
48+
![Screenshot of choosing Azure from People - Users page.](media/airbase-provisioning-tutorial/connect-hris.png)
49+
50+
1. Select Azure AD from the list of HRIS.
51+
1. Make a note of the Base URL and API Token.
52+
53+
![Screenshot of tenant url and token.](media/airbase-provisioning-tutorial/generate-token.png)
54+
55+
1. Use these values in Step 5.5.
4456

4557
## Step 3. Add Airbase from the Azure AD application gallery
4658

articles/active-directory/saas-apps/hoxhunt-provisioning-tutorial.md

Lines changed: 24 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -62,57 +62,62 @@ This section guides you through the steps to configure the Azure AD provisioning
6262

6363
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
6464

65-
![Enterprise applications blade](common/enterprise-applications.png)
65+
![Screenshot of Enterprise applications blade.](common/enterprise-applications.png)
6666

6767
2. In the applications list, select **Hoxhunt**.
6868

69-
![The Hoxhunt link in the Applications list](common/all-applications.png)
69+
![Screenshot of the Hoxhunt link in the Applications list.](common/all-applications.png)
7070

7171
3. Select the **Provisioning** tab.
7272

73-
![Provisioning tab](common/provisioning.png)
73+
![Screenshot of Provisioning tab.](common/provisioning.png)
7474

7575
4. Set the **Provisioning Mode** to **Automatic**.
7676

77-
![Provisioning tab automatic](common/provisioning-automatic.png)
77+
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
7878

7979
5. Under the **Admin Credentials** section, input your Hoxhunt Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Hoxhunt. If the connection fails, ensure your Hoxhunt account has Admin permissions and try again.
8080

8181
![Token](common/provisioning-testconnection-tenanturltoken.png)
8282

8383
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
8484

85-
![Notification Email](common/provisioning-notification-email.png)
85+
![Screenshot of Notification Email.](common/provisioning-notification-email.png)
8686

8787
7. Select **Save**.
8888

8989
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Hoxhunt**.
9090

9191
9. Review the user attributes that are synchronized from Azure AD to Hoxhunt in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Hoxhunt for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Hoxhunt API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
9292

93-
|Attribute|Type|Supported for filtering|
94-
|---|---|---|
95-
|userName|String|✓|
96-
|emails[type eq "work"].value|String|
97-
|active|Boolean|
98-
|name.givenName|String|
99-
|name.familyName|String|
100-
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department|String|
101-
|addresses[type eq "work"].country|String|
93+
|Attribute|Type|Supported for filtering|Required by Hoxhunt
94+
|---|---|---|---
95+
|userName|String|✓|✓
96+
|emails[type eq "work"].value|String||✓
97+
|active|Boolean||
98+
|name.givenName|String||
99+
|name.familyName|String||
100+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department|String||
101+
|addresses[type eq "work"].country|String||
102+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:division|String||
103+
|preferredLanguage|String||
104+
|addresses[type eq "work"].locality|String||
105+
|urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager|Reference||
106+
102107

103108
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
104109

105110
11. To enable the Azure AD provisioning service for Hoxhunt, change the **Provisioning Status** to **On** in the **Settings** section.
106111

107-
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
112+
![Screenshot of Provisioning Status Toggled On.](common/provisioning-toggle-on.png)
108113

109114
12. Define the users and/or groups that you would like to provision to Hoxhunt by choosing the desired values in **Scope** in the **Settings** section.
110115

111-
![Provisioning Scope](common/provisioning-scope.png)
116+
![Screenshot of Provisioning Scope.](common/provisioning-scope.png)
112117

113118
13. When you are ready to provision, click **Save**.
114119

115-
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
120+
![Screenshot of Saving Provisioning Configuration.](common/provisioning-configuration-save.png)
116121

117122
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
118123

@@ -124,7 +129,8 @@ Once you've configured provisioning, use the following resources to monitor your
124129
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
125130

126131
## Change Log
127-
* 04/20/2021 - Added support for "preferredLanguage" and enterprise extension attribute "urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:division".
132+
* 04/20/2021 - Added support for core user attribute **preferredLanguage** and enterprise extension attribute **urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:division**.
133+
* 08/08/2023 - Added support for core user attribute **addresses[type eq "work"].locality|String** and enterprise extension attribute **urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:manager**.
128134

129135
## Additional resources
130136

304 KB
Loading
69.6 KB
Loading

0 commit comments

Comments
 (0)