Skip to content

Commit fdad2fa

Browse files
authored
Merge pull request #113480 from tajaber/tajaber-patch-1
Update define-conditional-rules-for-provisioning-user-accounts.md
2 parents 897d29c + fa915b4 commit fdad2fa

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -144,8 +144,8 @@ Scoping filters are configured as part of the attribute mappings for each Azure
144144
## Common scoping filters
145145
| Target Attribute| Operator | Value | Description|
146146
|----|----|----|----|
147-
|userPrincipalName|REGEX MATCH|`.\*@domain.com`|All users with `userPrincipal` that have the domain `@domain.com` are in scope for provisioning. |
148-
|userPrincipalName|NOT REGEX MATCH|`.\*@domain.com`|All users with `userPrincipal` that has the domain `@domain.com` are out of scope for provisioning. |
147+
|userPrincipalName|REGEX MATCH|`.*\@domain.com`|All users with `userPrincipal` that have the domain `@domain.com` are in scope for provisioning. |
148+
|userPrincipalName|NOT REGEX MATCH|`.*\@domain.com`|All users with `userPrincipal` that has the domain `@domain.com` are out of scope for provisioning. |
149149
|department|EQUALS|`sales`|All users from the sales department are in scope for provisioning|
150150
|workerID|REGEX MATCH|`(1[0-9][0-9][0-9][0-9][0-9][0-9])`| All employees with `workerID` between 1000000 and 2000000 are in scope for provisioning.|
151151

0 commit comments

Comments
 (0)