Skip to content

Commit f9978b1

Browse files
authored
Merge pull request #250084 from Harshita-130901/postman-and-recnice
Postman and Recnice update
2 parents 0b511b7 + 0fcdb18 commit f9978b1

File tree

7 files changed

+51
-12
lines changed

7 files changed

+51
-12
lines changed
176 KB
Loading
60.9 KB
Loading
54 KB
Loading
7 KB
Loading
2.4 KB
Loading

articles/active-directory/saas-apps/postman-provisioning-tutorialy.md

Lines changed: 39 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
3333

3434
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md).
3535
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
36-
* An Postman tenant.
36+
* A Postman tenant on the [Enterprise plan](https://www.postman.com/pricing/).
3737
* A user account in Postman with Admin permissions.
3838

3939
## Step 1. Plan your provisioning deployment
@@ -42,17 +42,46 @@ The scenario outlined in this tutorial assumes that you already have the followi
4242
1. Determine what data to [map between Azure AD and Postman](../app-provisioning/customize-application-attributes.md).
4343

4444
## Step 2. Configure Postman to support provisioning with Azure AD
45-
Contact Postman support to configure Postman to support provisioning with Azure AD.
45+
46+
Before you begin to configure Postman to support provisioning with Azure AD, you’ll need to generate a SCIM API token within the Postman Admin Console.
47+
48+
> [!NOTE]
49+
> You can visit the page [Postman SCIM provisioning overview](https://learning.postman.com/docs/administration/scim-provisioning/scim-provisioning-overview/#enabling-scim-in-postman), to refer **Enable SCIM provisioning in Postman** steps.
50+
51+
1. Navigate to [Postman Admin Console](https://go.postman.co/home) by logging in to your Postman account.
52+
1. Once you’ve logged in, click **Team** on the right side and click **Team Settings**.
53+
1. Select **Authentication** in the sidebar and then turn on the **SCIM provisioning** toggle.
54+
55+
![Screenshot of Postman authentication settings page.](media/postman-provisioning-tutorial/postman-authentication-settings.png)
56+
57+
1. You will receive a pop up message asking whether you want to **Turn on SCIM Provisioning**, click **Turn On** to enable SCIM provisioning.
58+
59+
![Screenshot of modal to enable SCIM provisioning.](media/postman-provisioning-tutorial/postman-enable-scim-provisioning.png)
60+
1. To **Generate SCIM API Key**, perform the following steps:
61+
62+
1. Select **Generate SCIM API Key** in the **SCIM provisioning** section.
63+
64+
![Screenshot to generate SCIM API key in Postman.](media/postman-provisioning-tutorial/postman-generate-scim-api-key.png)
65+
66+
1. Enter name of the key and click **Generate**.
67+
1. Copy your new API key for later use and click **Done**.
68+
69+
> [!NOTE]
70+
> You can revisit this page to manage your SCIM API keys. If you regenerate an existing API key, you will have the option to keep the first key active while you switch over.
71+
72+
> [!NOTE]
73+
> To continue enabling SCIM provisioning, see [Configuring SCIM with Azure AD](https://learning.postman.com/docs/administration/scim-provisioning/configuring-scim-with-azure-ad/). For further information or help configuring SCIM, [contact Postman support](https://www.postman.com/support/).
74+
4675

4776
## Step 3. Add Postman from the Azure AD application gallery
4877

49-
Add Postman from the Azure AD application gallery to start managing provisioning to Postman. If you have previously setup Postman for SSO you can use the same application. However it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
78+
Add Postman from the Azure AD application gallery to start managing provisioning to Postman. If you have previously set up Postman for SSO you can use the same application. However, it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
5079

5180
## Step 4. Define who will be in scope for provisioning
5281

5382
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
5483

55-
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
84+
* Start small. Test with a small set of users and groups before rolling out to everyone. When the scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When the scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
5685

5786
* If you need more roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
5887

@@ -79,7 +108,7 @@ This section guides you through the steps to configure the Azure AD provisioning
79108

80109
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
81110

82-
1. Under the **Admin Credentials** section, input your Postman Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Postman. If the connection fails, ensure your Postman account has Admin permissions and try again.
111+
1. Under the **Admin Credentials** section, input `https://api.getpostman.com/scim/v2/` as your Postman Tenant URL and your [SCIM API key](https://learning.postman.com/docs/administration/scim-provisioning/scim-provisioning-overview/#generating-scim-api-key) as the Secret Token. Click **Test Connection** to ensure Azure AD can connect to Postman. If the connection fails, ensure your Postman account has Admin permissions and try again.
83112

84113
![Screenshot of Token.](common/provisioning-testconnection-tenanturltoken.png)
85114

@@ -128,15 +157,15 @@ This operation starts the initial synchronization cycle of all users and groups
128157
## Step 6. Monitor your deployment
129158
Once you've configured provisioning, use the following resources to monitor your deployment:
130159

131-
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
132-
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion
160+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully.
161+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion.
133162
* If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
134163

135164
## More resources
136165

137-
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
138-
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
166+
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md).
167+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md).
139168

140169
## Next steps
141170

142-
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)
171+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md).

articles/active-directory/saas-apps/recnice-provisioning-tutorial.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,17 @@ The scenario outlined in this tutorial assumes that you already have the followi
4141
1. Determine what data to [map between Azure AD and Recnice](../app-provisioning/customize-application-attributes.md).
4242

4343
## Step 2. Configure Recnice to support provisioning with Azure AD
44-
Contact Recnice support to configure Recnice to support provisioning with Azure AD.
44+
Before configuring Recnice for automatic user provisioning with Azure AD, you will need to know the Secret Token and Tenant URL.
45+
46+
1. Sign in to your Recnice Admin Console. Click on **Account**.
47+
48+
![Screenshot of the Recnice Account Page.](media/recnice-provisioning-tutorial/recnice-account-settings.png)
49+
50+
2. Copy the **SCIM Key** value. This value will be entered in the **Secret Token** field in the Provisioning tab of your Recnice application in the Azure portal.
51+
52+
![Screenshot of the S C I M A P I key.](media/recnice-provisioning-tutorial/recnice-token.png)
53+
54+
3. The **Tenant URL** value: `https://scim.recnice.com/scim/`.
4555

4656
## Step 3. Add Recnice from the Azure AD application gallery
4757

@@ -58,7 +68,7 @@ The Azure AD provisioning service allows you to scope who will be provisioned ba
5868

5969
## Step 5. Configure automatic user provisioning to Recnice
6070

61-
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
71+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Recnice based on user and/or group assignments in Azure AD.
6272

6373
### To configure automatic user provisioning for Recnice in Azure AD:
6474

0 commit comments

Comments
 (0)