Skip to content

Commit fb9c5e6

Browse files
authored
Merge pull request #116068 from ArvindHarinder1/patch-115
Update use-scim-to-provision-users-and-groups.md
2 parents fd7c7ce + 9ad8755 commit fb9c5e6

File tree

1 file changed

+0
-4
lines changed

1 file changed

+0
-4
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1224,10 +1224,6 @@ To help drive awareness and demand of our joint integration, we recommend you up
12241224
)
12251225
* **Customer communication.** Alert customers of the new integration through your customer communication (monthly newsletters, email campaigns, product release notes).
12261226

1227-
### Allow IP addresses used by the Azure AD provisioning service to make SCIM requests
1228-
1229-
Certain apps allow inbound traffic to their app. In order for the Azure AD provisioning service to function as expected, the IP addresses used must be allowed. For a list of IP addresses for each service tag/region, see the JSON file - [Azure IP Ranges and Service TagsPublic Cloud](https://www.microsoft.com/download/details.aspx?id=56519). You can download and program these IPs into your firewall as needed. The reserved IP ranges for Azure AD provisioning can be found under "AzureActiveDirectoryDomainServices."
1230-
12311227
## Related articles
12321228

12331229
* [Automate user provisioning and deprovisioning to SaaS apps](user-provisioning.md)

0 commit comments

Comments
 (0)