Skip to content

Commit fedb7e0

Browse files
authored
Merge pull request #192587 from v-missam/palo
doc-1
2 parents a65a61c + 247384a commit fedb7e0

File tree

7 files changed

+202
-30
lines changed

7 files changed

+202
-30
lines changed

articles/active-directory/saas-apps/cisco-umbrella-user-management-provisioning-tutorial.md

Lines changed: 24 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -40,16 +40,16 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040

4141
## Step 1. Plan your provisioning deployment
4242
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
43-
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
44-
3. Determine what data to [map between Azure AD and Cisco Umbrella User Management](../app-provisioning/customize-application-attributes.md).
43+
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
44+
1. Determine what data to [map between Azure AD and Cisco Umbrella User Management](../app-provisioning/customize-application-attributes.md).
4545

4646
## Step 2. Import ObjectGUID attribute via Azure AD Connect (Optional)
47-
If you have previously provisioned user and group identities from on-premise AD to Cisco Umbrella and would now like to provision the same users and groups from Azure AD, you will need to synchronize the ObjectGUID attribute so that previously provisioned identities persist in the Umbrella policy.
47+
If you have previously provisioned user identities from on-premise AD to Cisco Umbrella and would now like to provision the same users from Azure AD, you will need to synchronize the ObjectGUID attribute so that previously provisioned identities persist in the Umbrella reporting. You will need to reconfigure any Umbrella policy on groups after importing groups from Azure AD.
4848

4949
> [!NOTE]
5050
> The on-premise Umbrella AD Connector should be turned off before importing the ObjectGUID attribute.
5151
52-
When using Microsoft Azure AD Connect, the ObjectGUID attribute of users and groups is not synchronized from on-premise AD to Azure AD by default. To synchronize this attribute, enable the optional **Directory Extension attribute sync** and select the objectGUID attributes for groups and users.
52+
When using Microsoft Azure AD Connect, the ObjectGUID attribute of users is not synchronized from on-premise AD to Azure AD by default. To synchronize this attribute, enable the optional **Directory Extension attribute sync** and select the objectGUID attributes for users.
5353

5454
![Azure Active Directory Connect wizard Optional features page](./media/cisco-umbrella-user-management-provisioning-tutorial/active-directory-connect-directory-extension-attribute-sync.png)
5555

@@ -62,17 +62,16 @@ When using Microsoft Azure AD Connect, the ObjectGUID attribute of users and gro
6262

6363
1. Log in to [Cisco Umbrella dashboard](https://login.umbrella.com ). Navigate to **Deployments** > **Core Identities** > **Users and Groups**.
6464

65-
2. If the import mechanism is set to Manual import, click on **Import from IdP** to switch the import mechanism.
6665

67-
3. Expand the Azure Active Directory card and click on the **API Keys page**.
66+
1. Expand the Azure Active Directory card and click on the **API Keys page**.
6867

6968
![Api](./media/cisco-umbrella-user-management-provisioning-tutorial/keys.png)
7069

71-
4. Expand the Azure Active Directory card on the API Keys page and click on **Generate Token**.
70+
1. Expand the Azure Active Directory card on the API Keys page and click on **Generate Token**.
7271

7372
![Generate](./media/cisco-umbrella-user-management-provisioning-tutorial/token.png)
7473

75-
5. The generated token will be displayed only once. Copy and save the URL and the token. These values will be entered in the **Tenant URL** and **Secret Token** fields respectively in the Provisioning tab of your Cisco Umbrella User Management application in the Azure portal.
74+
1. The generated token will be displayed only once. Copy and save the URL and the token. These values will be entered in the **Tenant URL** and **Secret Token** fields respectively in the Provisioning tab of your Cisco Umbrella User Management application in the Azure portal.
7675

7776

7877
## Step 4. Add Cisco Umbrella User Management from the Azure AD application gallery
@@ -97,31 +96,31 @@ This section guides you through the steps to configure the Azure AD provisioning
9796

9897
![Enterprise applications blade](common/enterprise-applications.png)
9998

100-
2. In the applications list, select **Cisco Umbrella User Management**.
99+
1. In the applications list, select **Cisco Umbrella User Management**.
101100

102101
![The Cisco Umbrella User Management link in the Applications list](common/all-applications.png)
103102

104-
3. Select the **Provisioning** tab.
103+
1. Select the **Provisioning** tab.
105104

106105
![Provisioning tab](common/provisioning.png)
107106

108-
4. Set the **Provisioning Mode** to **Automatic**.
107+
1. Set the **Provisioning Mode** to **Automatic**.
109108

110109
![Provisioning tab automatic](common/provisioning-automatic.png)
111110

112-
5. Under the **Admin Credentials** section, input your Cisco Umbrella User Management Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Cisco Umbrella User Management. If the connection fails, ensure your Cisco Umbrella User Management account has Admin permissions and try again.
111+
1. Under the **Admin Credentials** section, input your Cisco Umbrella User Management Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Cisco Umbrella User Management. If the connection fails, ensure your Cisco Umbrella User Management account has Admin permissions and try again.
113112

114113
![Token](common/provisioning-testconnection-tenanturltoken.png)
115114

116-
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
115+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
117116

118117
![Notification Email](common/provisioning-notification-email.png)
119118

120-
7. Select **Save**.
119+
1. Select **Save**.
121120

122-
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Cisco Umbrella User Management**.
121+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Cisco Umbrella User Management**.
123122

124-
9. Review the user attributes that are synchronized from Azure AD to Cisco Umbrella User Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Cisco Umbrella User Management for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Cisco Umbrella User Management API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
123+
1. Review the user attributes that are synchronized from Azure AD to Cisco Umbrella User Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Cisco Umbrella User Management for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Cisco Umbrella User Management API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
125124

126125
|Attribute|Type|Supported for Filtering|
127126
|---|---|---|
@@ -137,31 +136,26 @@ This section guides you through the steps to configure the Azure AD provisioning
137136
> [!NOTE]
138137
> If you have imported the objectGUID attribute for users via Azure AD Connect (refer Step 2), add a mapping from objectGUID to urn:ietf:params:scim:schemas:extension:ciscoumbrella:2.0:User:nativeObjectId.
139138
140-
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Cisco Umbrella User Management**.
139+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Cisco Umbrella User Management**.
141140

142-
11. Review the group attributes that are synchronized from Azure AD to Cisco Umbrella User Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Cisco Umbrella User Management for update operations. Select the **Save** button to commit any changes.
141+
1. Review the group attributes that are synchronized from Azure AD to Cisco Umbrella User Management in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Cisco Umbrella User Management for update operations. Select the **Save** button to commit any changes.
143142

144143
|Attribute|Type|Supported for Filtering|
145144
|---|---|---|
146145
|displayName|String|✓|
147146
|externalId|String|
148147
|members|Reference|
149-
|urn:ietf:params:scim:schemas:extension:ciscoumbrella:2.0:Group:nativeObjectId|String|
148+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
150149

151-
> [!NOTE]
152-
> If you have imported the objectGUID attribute for groups via Azure AD Connect (refer Step 2), add a mapping from objectGUID to urn:ietf:params:scim:schemas:extension:ciscoumbrella:2.0:Group:nativeObjectId.
153-
154-
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
155-
156-
13. To enable the Azure AD provisioning service for Cisco Umbrella User Management, change the **Provisioning Status** to **On** in the **Settings** section.
150+
1. To enable the Azure AD provisioning service for Cisco Umbrella User Management, change the **Provisioning Status** to **On** in the **Settings** section.
157151

158152
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
159153

160-
14. Define the users and/or groups that you would like to provision to Cisco Umbrella User Management by choosing the desired values in **Scope** in the **Settings** section.
154+
1. Define the users and/or groups that you would like to provision to Cisco Umbrella User Management by choosing the desired values in **Scope** in the **Settings** section.
161155

162156
![Provisioning Scope](common/provisioning-scope.png)
163157

164-
15. When you are ready to provision, click **Save**.
158+
1. When you are ready to provision, click **Save**.
165159

166160
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
167161

@@ -170,9 +164,9 @@ This operation starts the initial synchronization cycle of all users and groups
170164
## Step 7. Monitor your deployment
171165
Once you've configured provisioning, use the following resources to monitor your deployment:
172166

173-
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
174-
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
175-
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
167+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
168+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
169+
* If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
176170

177171
## Connector Limitations
178172
* Cisco Umbrella User Management supports provisioning a maximum of 200 groups. Any groups beyond this number that are in scope may not be provisioned to Cisco Umbrella.
Loading
Loading
-38.9 KB
Loading
-8 KB
Loading

0 commit comments

Comments
 (0)