You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/postman-provisioning-tutorialy.md
+39-10Lines changed: 39 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
33
33
34
34
*[An Azure AD tenant](../develop/quickstart-create-new-tenant.md).
35
35
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
36
-
*An Postman tenant.
36
+
*A Postman tenant on the [Enterprise plan](https://www.postman.com/pricing/).
37
37
* A user account in Postman with Admin permissions.
38
38
39
39
## Step 1. Plan your provisioning deployment
@@ -42,17 +42,46 @@ The scenario outlined in this tutorial assumes that you already have the followi
42
42
1. Determine what data to [map between Azure AD and Postman](../app-provisioning/customize-application-attributes.md).
43
43
44
44
## Step 2. Configure Postman to support provisioning with Azure AD
45
-
Contact Postman support to configure Postman to support provisioning with Azure AD.
45
+
46
+
Before you begin to configure Postman to support provisioning with Azure AD, you’ll need to generate a SCIM API token within the Postman Admin Console.
47
+
48
+
> [!NOTE]
49
+
> You can visit the page [Postman SCIM provisioning overview](https://learning.postman.com/docs/administration/scim-provisioning/scim-provisioning-overview/#enabling-scim-in-postman), to refer **Enable SCIM provisioning in Postman** steps.
50
+
51
+
1. Navigate to [Postman Admin Console](https://go.postman.co/home) by logging in to your Postman account.
52
+
1. Once you’ve logged in, click **Team** on the right side and click **Team Settings**.
53
+
1. Select **Authentication** in the sidebar and then turn on the **SCIM provisioning** toggle.
54
+
55
+

56
+
57
+
1. You will receive a pop up message asking whether you want to **Turn on SCIM Provisioning**, click **Turn On** to enable SCIM provisioning.
58
+
59
+

60
+
1. To **Generate SCIM API Key**, perform the following steps:
61
+
62
+
1. Select **Generate SCIM API Key** in the **SCIM provisioning** section.
63
+
64
+

65
+
66
+
1. Enter name of the key and click **Generate**.
67
+
1. Copy your new API key for later use and click **Done**.
68
+
69
+
> [!NOTE]
70
+
> You can revisit this page to manage your SCIM API keys. If you regenerate an existing API key, you will have the option to keep the first key active while you switch over.
71
+
72
+
> [!NOTE]
73
+
> To continue enabling SCIM provisioning, see [Configuring SCIM with Azure AD](https://learning.postman.com/docs/administration/scim-provisioning/configuring-scim-with-azure-ad/). For further information or help configuring SCIM, [contact Postman support](https://www.postman.com/support/).
74
+
46
75
47
76
## Step 3. Add Postman from the Azure AD application gallery
48
77
49
-
Add Postman from the Azure AD application gallery to start managing provisioning to Postman. If you have previously setup Postman for SSO you can use the same application. However it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
78
+
Add Postman from the Azure AD application gallery to start managing provisioning to Postman. If you have previously set up Postman for SSO you can use the same application. However, it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
50
79
51
80
## Step 4. Define who will be in scope for provisioning
52
81
53
82
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
54
83
55
-
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
84
+
* Start small. Test with a small set of users and groups before rolling out to everyone. When the scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When the scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
56
85
57
86
* If you need more roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
58
87
@@ -79,7 +108,7 @@ This section guides you through the steps to configure the Azure AD provisioning
79
108
80
109

81
110
82
-
1. Under the **Admin Credentials** section, input your Postman Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Postman. If the connection fails, ensure your Postman account has Admin permissions and try again.
111
+
1. Under the **Admin Credentials** section, input `https://api.getpostman.com/scim/v2/` as your Postman Tenant URL and your [SCIM API key](https://learning.postman.com/docs/administration/scim-provisioning/scim-provisioning-overview/#generating-scim-api-key) as the Secret Token. Click **Test Connection** to ensure Azure AD can connect to Postman. If the connection fails, ensure your Postman account has Admin permissions and try again.
83
112
84
113

85
114
@@ -128,15 +157,15 @@ This operation starts the initial synchronization cycle of all users and groups
128
157
## Step 6. Monitor your deployment
129
158
Once you've configured provisioning, use the following resources to monitor your deployment:
130
159
131
-
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
132
-
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion
160
+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully.
161
+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion.
133
162
* If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
134
163
135
164
## More resources
136
165
137
-
*[Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
138
-
*[What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
166
+
*[Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md).
167
+
*[What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md).
139
168
140
169
## Next steps
141
170
142
-
*[Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)
171
+
*[Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md).
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/recnice-provisioning-tutorial.md
+12-2Lines changed: 12 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,17 @@ The scenario outlined in this tutorial assumes that you already have the followi
41
41
1. Determine what data to [map between Azure AD and Recnice](../app-provisioning/customize-application-attributes.md).
42
42
43
43
## Step 2. Configure Recnice to support provisioning with Azure AD
44
-
Contact Recnice support to configure Recnice to support provisioning with Azure AD.
44
+
Before configuring Recnice for automatic user provisioning with Azure AD, you will need to know the Secret Token and Tenant URL.
45
+
46
+
1. Sign in to your Recnice Admin Console. Click on **Account**.
47
+
48
+

49
+
50
+
2. Copy the **SCIM Key** value. This value will be entered in the **Secret Token** field in the Provisioning tab of your Recnice application in the Azure portal.
51
+
52
+

53
+
54
+
3. The **Tenant URL** value: `https://scim.recnice.com/scim/`.
45
55
46
56
## Step 3. Add Recnice from the Azure AD application gallery
47
57
@@ -58,7 +68,7 @@ The Azure AD provisioning service allows you to scope who will be provisioned ba
58
68
59
69
## Step 5. Configure automatic user provisioning to Recnice
60
70
61
-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
71
+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Recnice based on user and/or group assignments in Azure AD.
62
72
63
73
### To configure automatic user provisioning for Recnice in Azure AD:
0 commit comments