![]() This operation starts the initial synchronization of all users and/or groups defined in Scope in the Settings section. When you are ready to provision, click Save. To enable the Azure AD provisioning service for Figma, change the Provisioning Status to On in the Settings section.ĭefine the users and/or groups that you would like to provision to Figma by choosing the desired values in Scope in the Settings section. To configure scoping filters, refer to the following instructions provided in the Scoping filter tutorial. Select the Save button to commit any changes. The attributes selected as Matching properties are used to match the user accounts in Figma for update operations. Review the user attributes that are synchronized from Azure AD to Figma in the Attribute Mapping section. Under the Mappings section, select Synchronize Azure Active Directory Users to Figma. In the Notification Email field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - Send an email notification when a failure occurs. If the connection fails, ensure your Figma account has Admin permissions and try again. Click Test Connection to ensure Azure AD can connect to Figma. Input the API Token value in Secret Token. Under the Admin Credentials section, input in Tenant URL where TenantID is the value that you retrieved from Figma earlier. Select Enterprise Applications, then select All applications. To configure automatic user provisioning for Figma in Azure AD: ![]() Single sign-on can be configured independently of automatic user provisioning, though these two features compliment each other. You may also choose to enable SAML-based single sign-on for Figma, following the instructions provided in the Figma Single sign-on tutorial. This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in Figma based on user and/or group assignments in Azure AD. In the search box, enter Figma, select Figma in the results panel, and then click the Add button to add the application.Ĭonfiguring automatic user provisioning to Figma ![]() To add a new application, select the New application button at the top of the pane. Go to Enterprise applications, and then select All applications. In the Azure portal, in the left navigation panel, select Azure Active Directory. To configure Figma for automatic user provisioning with Azure AD, you need to add Figma from the Azure AD application gallery to your list of managed SaaS applications. This value will be entered in the Secret Token field in the Provisioning tab of your Figma application in the Azure portal. Scroll down and click on Generate API Token.Ĭopy the API Token value. This value will be used to construct the SCIM endpoint URL to be entered into the Tenant URL field in the Provisioning tab of your Figma application in the Azure portal. Navigate to General > Update Log in Settings.Ĭopy the Tenant ID. Click on the gear icon next to your tenant. Users with the Default Access role are excluded from provisioning.īefore configuring Figma for automatic user provisioning with Azure AD, you will need to retrieve some provisioning information from Figma. When assigning a user to Figma, you must select any valid application-specific role (if available) in the assignment dialog. Additional users and/or groups may be assigned later. It is recommended that a single Azure AD user is assigned to Figma to test the automatic user provisioning configuration. Important tips for assigning users to Figma
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |