|
2 | 2 | title: 'Tutorial: Configure Workplace by Facebook for automatic user provisioning with Azure Active Directory | Microsoft Docs'
|
3 | 3 | description: Learn the steps you need to do in both Workplace by Facebook and Azure Active Directory (Azure AD) to configure automatic user provisioning.
|
4 | 4 | services: active-directory
|
5 |
| -author: jeevansd |
| 5 | +author: twimmers |
6 | 6 | manager: CelesteDG
|
7 | 7 | ms.service: active-directory
|
8 | 8 | ms.subservice: saas-app-tutorial
|
9 | 9 | ms.workload: identity
|
10 | 10 | ms.topic: tutorial
|
11 | 11 | ms.date: 07/22/2021
|
12 |
| -ms.author: jeedes |
| 12 | +ms.author: thwimmer |
13 | 13 | ---
|
14 | 14 |
|
15 | 15 | # Tutorial: Configure Workplace by Facebook for automatic user provisioning
|
@@ -166,6 +166,44 @@ Once you've configured provisioning, use the following resources to monitor your
|
166 | 166 | To avoid the errors and successfully provision the failed users to Workplace from Facebook, modify the attribute mapping to the Workplace from Facebook email attribute to Coalesce([mail],[userPrincipalName]) or unassign the user from Workplace from Facebook, or provision an email address for the user.
|
167 | 167 | * There is an option in Workplace, which allows the existence of [users without email addresses.](https://www.workplace.com/resources/tech/account-management/email-less#enable) If this setting is toggled on the Workplace side, provisioning on the Azure side must be restarted in order for users without emails to successfully be created in Workplace.
|
168 | 168 |
|
| 169 | +## Update existing Workplace by Facebook application to use the Workplace by Facebook SCIM 2.0 endpoint |
| 170 | +Prior to November 2021, all Workplace by Facebook applications created were configured to utilize the Workplace by Facebook SCIM 1.0 endpoint. Starting November 2021, all newly created Workplace by Facebook applications are configured to utilize the Workplace by Facebook SCIM 2.0 endpoint. Completing the steps below will update applications configured to use the SCIM 1.0 endpoint to the use the SCIM 2.0 endpoint. These steps will remove any customizations previously made to the Workplace by Facebook application, including: |
| 171 | +* Authentication details |
| 172 | +* Scoping filters |
| 173 | +* Custom attribute mappings |
| 174 | + |
| 175 | +Be sure to note any changes that have been made to the settings listed above before completing the steps below. Failure to do so will result in the loss of customized settings. |
| 176 | + |
| 177 | +1. Sign into the Azure portal at https://portal.azure.com |
| 178 | +2. Navigate to your current Workplace by Facebook app under Azure Active Directory > Enterprise Applications |
| 179 | +3. In the Properties section of your new custom app, copy the Object ID. |
| 180 | + |
| 181 | +  |
| 182 | + |
| 183 | +4. In a new web browser window, go to https://developer.microsoft.com/graph/graph-explorer and sign in as the administrator for the Azure AD tenant where your app is added. |
| 184 | + |
| 185 | +  |
| 186 | + |
| 187 | +5. Check to make sure the account being used has the correct permissions. The permission “Directory.ReadWrite.All” is required to make this change. |
| 188 | + |
| 189 | +  |
| 190 | + |
| 191 | +  |
| 192 | + |
| 193 | +6. Run the command below to delete the provisioning job: |
| 194 | + |
| 195 | +DELETE https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/[job-id] |
| 196 | + |
| 197 | +7. In the Graph Explorer, run the command below. Replace "[object-id]" with the service principal ID (object ID) copied from the third step. |
| 198 | +_POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs { "templateId": "FacebookWorkplace" }_ |
| 199 | + |
| 200 | +  |
| 201 | + |
| 202 | +8. Return to the first web browser window and select the Provisioning tab for your application. Your configuration will have been reset. You can confirm the upgrade has taken place by confirming the Job ID starts with “FacebookWorkplace”. |
| 203 | + |
| 204 | +9. Update the tenant URL in the Admin Credentials section to the following: https://scim.workplace.com/ |
| 205 | + |
| 206 | +10. Restore any previous changes you made to the application (Authentication details, Scoping filters, Custom attribute mappings) and re-enable provisioning. |
169 | 207 |
|
170 | 208 | ## Change log
|
171 | 209 |
|
|
0 commit comments