You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/reference-aadsts-error-codes.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -348,6 +348,7 @@ The `error` field has several possible values - review the protocol documentatio
348
348
| AADSTS700022 | InvalidMultipleResourcesScope - The provided value for the input parameter scope isn't valid because it contains more than one resource. |
349
349
| AADSTS700023 | InvalidResourcelessScope - The provided value for the input parameter scope isn't valid when request an access token. |
350
350
| AADSTS7000215 | Invalid client secret is provided. Developer error - the app is attempting to sign in without the necessary or correct authentication parameters.|
351
+
| AADSTS7000218 | The request body must contain the following parameter: 'client_assertion' or 'client_secret'. |
351
352
| AADSTS7000222 | InvalidClientSecretExpiredKeysProvided - The provided client secret keys are expired. Visit the Azure portal to create new keys for your app, or consider using certificate credentials for added security: [https://aka.ms/certCreds](./active-directory-certificate-credentials.md)|
352
353
| AADSTS700005 | InvalidGrantRedeemAgainstWrongTenant - Provided Authorization Code is intended to use against other tenant, thus rejected. OAuth2 Authorization Code must be redeemed against same tenant it was acquired for (/common or /{tenant-ID} as appropriate) |
353
354
| AADSTS1000000 | UserNotBoundError - The Bind API requires the Azure AD user to also authenticate with an external IDP, which hasn't happened yet. |
Copy file name to clipboardExpand all lines: articles/active-directory/develop/v2-app-types.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ You can ensure the user's identity by validating the ID token with a public sign
77
77
78
78
To see this scenario in action, try the code samples in [Sign in users from a Web app](scenario-web-app-sign-user-overview.md).
79
79
80
-
In addition to simple sign-in, a web server app might need to access another web service, such as a Representational State Transfer ([REST](https://docs.microsoft.com/rest/api/azure/)) API. In this case, the web server app engages in a combined OpenID Connect and OAuth 2.0 flow, by using the [OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md). For more information about this scenario, refer to our code [sample](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-1-Call-MSGraph/README.md).
80
+
In addition to simple sign-in, a web server app might need to access another web service, such as a [Representational State Transfer (REST) API](/rest/api/azure/). In this case, the web server app engages in a combined OpenID Connect and OAuth 2.0 flow, by using the [OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md). For more information about this scenario, refer to our code [sample](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-1-Call-MSGraph/README.md).
There are specific scenarios when delegating administration within a single tenant boundary won't meet your needs. In this section, we'll discuss requirements that may drive you to create a multi-tenant architecture. Multi-tenant organizations might span two or more Azure AD tenants. This can result in unique cross-tenant collaboration and management requirements. Multi-tenant architectures increase management overhead and complexity and should be used with caution. We recommend using a single tenant if your needs can be met with that architecture. For more detailed information, see [Multi-tenant user management]../fundamentals/multi-tenant-user-management-introduction.md).
20
+
There are specific scenarios when delegating administration within a single tenant boundary won't meet your needs. In this section, we'll discuss requirements that may drive you to create a multi-tenant architecture. Multi-tenant organizations might span two or more Azure AD tenants. This can result in unique cross-tenant collaboration and management requirements. Multi-tenant architectures increase management overhead and complexity and should be used with caution. We recommend using a single tenant if your needs can be met with that architecture. For more detailed information, see [Multi-tenant user management](multi-tenant-user-management-introduction.md).
21
21
22
22
A separate tenant creates a new boundary, and therefore decoupled management of Azure AD directory roles, directory objects, conditional access policies, Azure resource groups, Azure management groups, and other controls as described in previous sections.
23
23
@@ -183,4 +183,4 @@ Devices: This tenant contains a reduced number of devices; only those that are n
183
183
184
184
*[Resource isolation in a single tenant](secure-with-azure-ad-single-tenant.md)
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/security-operations-user-accounts.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -257,8 +257,8 @@ The following are listed in order of importance based on the effect and severity
257
257
| What to monitor| Risk Level| Where| Filter/sub-filter| Notes |
258
258
| - |- |- |- |- |
259
259
| Users authenticating to other Azure AD tenants.| Low| Azure AD Sign-ins log| Status = success<br>Resource tenantID != Home Tenant ID| Detects when a user has successfully authenticated to another Azure AD tenant with an identity in your organization's tenant.<br>Alert if Resource TenantID isn't equal to Home Tenant ID <br>[Microsoft Sentinel template](https://github.com/Azure/Azure-Sentinel/blob/master/Hunting%20Queries/AuditLogs/UsersAuthenticatingtoOtherAzureADTenants.yaml)<br>[Sigma rules](https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure)|
260
-
|User state changed from Guest to Member|Medium|Azure AD Audit logs|Activity: Update user<br>Category: UserManagement<br>UserType changed from Guest to Member|Monitor and alert on change of user type from Guest to Member. Was this expected?<br>[Microsoft Sentinel template](https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/UserStatechangedfromGuesttoMember.yaml<br>[Sigma rules](https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure))
261
-
|Guest users invited to tenant by non-approved inviters|Medium|Azure AD Audit logs|Activity: Invite external user<br>Category: UserManagement<br>Initiated by (actor): User Principal Name|Monitor and alert on non-approved actors inviting external users.<br>[Microsoft Sentinel template](https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/GuestUsersInvitedtoTenantbyNewInviters.yaml<br>[Sigma rules](https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure)|
260
+
|User state changed from Guest to Member|Medium|Azure AD Audit logs|Activity: Update user<br>Category: UserManagement<br>UserType changed from Guest to Member|Monitor and alert on change of user type from Guest to Member. Was this expected?<br>[Microsoft Sentinel template](https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/UserStatechangedfromGuesttoMember.yaml)<br>[Sigma rules](https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure)
261
+
|Guest users invited to tenant by non-approved inviters|Medium|Azure AD Audit logs|Activity: Invite external user<br>Category: UserManagement<br>Initiated by (actor): User Principal Name|Monitor and alert on non-approved actors inviting external users.<br>[Microsoft Sentinel template](https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/GuestUsersInvitedtoTenantbyNewInviters.yaml)<br>[Sigma rules](https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/azure)|
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,6 +124,9 @@ Caveat: If there are synchronized accounts that need to have non-expiring passwo
124
124
> [!NOTE]
125
125
> The Set-MsolPasswordPolicy PowerShell command will not work on federated domains.
126
126
127
+
> [!NOTE]
128
+
> The Set-AzureADUser PowerShell command will not work on federated domains.
129
+
127
130
#### Synchronizing temporary passwords and "Force Password Change on Next Logon"
128
131
129
132
It is typical to force a user to change their password during their first logon, especially after an admin password reset occurs. It is commonly known as setting a "temporary" password and is completed by checking the "User must change password at next logon" flag on a user object in Active Directory (AD).
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sync-whatis.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ The sync service consists of two components, the on-premises **Azure AD Connect
29
29
>
30
30
>To find out if you are already eligible for Cloud Sync, please verify your requirements in [this wizard](https://admin.microsoft.com/adminportal/home?Q=setupguidance#/modernonboarding/identitywizard).
31
31
>
32
-
>To learn more about Cloud Sync please read [this article](https://docs.microsoft.com/azure/active-directory/cloud-sync/what-is-cloud-sync), or watch this [short video](https://www.microsoft.com/en-us/videoplayer/embed/RWJ8l5).
32
+
>To learn more about Cloud Sync please read [this article](/azure/active-directory/cloud-sync/what-is-cloud-sync), or watch this [short video](https://www.microsoft.com/videoplayer/embed/RWJ8l5).
title: How to view applied conditional access policies in the Azure AD sign-in logs | Microsoft Docs
4
-
description: Learn how to view applied conditional access policies in the Azure AD sign-in logs
3
+
title: View applied Conditional Access policies in Azure AD sign-in logs
4
+
description: Learn how to view Conditional Access policies in Azure AD sign-in logs so that you can assess the impact of those policies.
5
5
services: active-directory
6
6
documentationcenter: ''
7
7
author: MarkusVi
@@ -19,45 +19,35 @@ ms.reviewer: besiler
19
19
ms.collection: M365-identity-device-management
20
20
---
21
21
22
-
# How to: View applied conditional access policies in the Azure AD sign-in logs
22
+
# View applied Conditional Access policies in Azure AD sign-in logs
23
23
24
-
With conditional access policies, you can control, how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your conditional access policies have on sign-ins to your tenant, so that you can take action if necessary. The sign-in logs in Azure AD provide you with the information you need to assess the impact of your policies.
25
-
26
-
27
-
This article explains how you can get access to the information about applied conditional access policies.
24
+
With Conditional Access policies, you can control how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your Conditional Access policies have on sign-ins to your tenant, so that you can take action if necessary.
28
25
26
+
The sign-in logs in Azure Active Directory (Azure AD) give you the information that you need to assess the impact of your policies. This article explains how to view applied Conditional Access policies in those logs.
29
27
30
28
## What you should know
31
29
32
30
As an Azure AD administrator, you can use the sign-in logs to:
33
31
34
-
- Troubleshoot sign in problems
35
-
- Check on feature performance
36
-
- Evaluate security of a tenant
37
-
38
-
Some scenarios require you to get an understanding for how your conditional access policies were applied to a sign-in event. Common examples include:
39
-
40
-
-**Helpdesk administrators** who need to look at applied conditional access policies to understand if a policy is the root cause of a ticket opened by a user.
41
-
42
-
-**Tenant administrators** who need to verify that conditional access policies have the intended impact on the users of a tenant.
32
+
- Troubleshoot sign-in problems.
33
+
- Check on feature performance.
34
+
- Evaluate the security of a tenant.
43
35
36
+
Some scenarios require you to get an understanding of how your Conditional Access policies were applied to a sign-in event. Common examples include:
44
37
45
-
You can access the sign-in logs using the Azure portal, MS Graph, and PowerShell.
38
+
-*Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
46
39
40
+
-*Tenant administrators* who need to verify that Conditional Access policies have the intended impact on the users of a tenant.
47
41
42
+
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
48
43
49
44
## Required administrator roles
50
45
46
+
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view both the logs and the policies.
51
47
52
-
To see applied conditional access policies in the sign-in logs, administrators must have permissions to:
53
-
54
-
- View sign-in logs
55
-
- View conditional access policies
56
-
57
-
The least privileged built-in role that grants both permissions is the **Security Reader**. As a best practice, your global administrator should add the **Security Reader** role to the related administrator accounts.
58
-
48
+
The least privileged built-in role that grants both permissions is *Security Reader*. As a best practice, your global administrator should add the Security Reader role to the related administrator accounts.
59
49
60
-
The following builtin roles grant permissions to read conditional access policies:
50
+
The following built-in roles grant permissions to read Conditional Access policies:
61
51
62
52
- Global Administrator
63
53
@@ -70,7 +60,7 @@ The following built in roles grant permissions to read conditional access polici
70
60
- Conditional Access Administrator
71
61
72
62
73
-
The following builtin roles grant permission to view sign-in logs:
63
+
The following built-in roles grant permission to view sign-in logs:
74
64
75
65
- Global Administrator
76
66
@@ -82,64 +72,57 @@ The following built in roles grant permission to view sign-in logs:
82
72
83
73
- Reports Reader
84
74
85
-
86
75
## Permissions for client apps
87
76
88
-
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy** resource from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it's the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
77
+
If you use a client app to pull sign-in logs from Microsoft Graph, your app needs permissions to receive the `appliedConditionalAccessPolicy` resource from Microsoft Graph. As a best practice, assign `Policy.Read.ConditionalAccess` because it's the least privileged permission.
89
78
90
-
- Policy.Read.ConditionalAccess
79
+
Any of the following permissions is sufficient for a client app to access applied certificate authority (CA) policies in sign-in logs through Microsoft Graph:
91
80
92
-
- Policy.ReadWrite.ConditionalAccess
81
+
-`Policy.Read.ConditionalAccess`
93
82
94
-
- Policy.Read.All
83
+
-`Policy.ReadWrite.ConditionalAccess`
95
84
96
-
85
+
-`Policy.Read.All`
97
86
98
87
## Permissions for PowerShell
99
88
100
-
Like any other client app, the Microsoft Graph PowerShell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph PowerShell. As a best practice, consent to:
89
+
Like any other client app, the Microsoft Graph PowerShell module needs client permissions to access applied Conditional Access policies in the sign-in logs. To successfully pull applied Conditional Access policies in the sign-in logs, you must consent to the necessary permissions with your administrator account for Microsoft Graph PowerShell. As a best practice, consent to:
101
90
102
-
- Policy.Read.ConditionalAccess
103
-
- AuditLog.Read.All
104
-
- Directory.Read.All
91
+
-`Policy.Read.ConditionalAccess`
92
+
-`AuditLog.Read.All`
93
+
-`Directory.Read.All`
105
94
106
95
These permissions are the least privileged permissions with the necessary access.
The output of this cmdlet contains a **AppliedConditionalAccessPolicies** property that shows all the conditional access policies applied to the sign-in.
103
+
`Get-MgAuditLogSignIn`
117
104
118
105
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://learn.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
119
106
120
-
The AzureAD Graph PowerShell module doesn't support viewing applied conditional access policies; only the Microsoft Graph PowerShell module returns applied conditional access policies.
107
+
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
121
108
122
109
## Confirming access
123
110
124
-
In the **Conditional Access** tab, you see a list of conditional access policies applied to that sign-in event.
125
-
111
+
On the **Conditional Access** tab, you see a list of Conditional Access policies applied to that sign-in event.
126
112
127
-
To confirm that you have admin access to view applied conditional access policies in the sign-ins logs, do:
113
+
To confirm that you have admin access to view applied Conditional Access policies in the sign-in logs:
128
114
129
-
1.Navigate to the Azure portal.
115
+
1.Go to the Azure portal.
130
116
131
-
2. In the top-right corner, select your directory, and then select **Azure Active Directory**in the left navigation pane.
117
+
2. In the upper-right corner, select your directory, and then select **Azure Active Directory**on the left pane.
132
118
133
119
3. In the **Monitoring** section, select **Sign-in logs**.
134
120
135
-
4. Click an item in the sign-in row table to bring up the Activity Details: Sign-ins context pane.
136
-
137
-
5. Click on the Conditional Access tab in the context pane. If your screen is small, you may need to click the ellipsis […] to see all context pane tabs.
138
-
139
-
121
+
4. Select an item in the sign-in table to open the **Activity Details: Sign-ins context** pane.
140
122
123
+
5. Select the **Conditional Access** tab on the context pane. If your screen is small, you might need to select the ellipsis (**...**) to see all tabs on the context pane.
0 commit comments