Skip to content

Commit 0412083

Browse files
authored
Merge pull request #253803 from MicrosoftDocs/main
10/04 PM Publishing
2 parents f3a807d + 215d02f commit 0412083

File tree

148 files changed

+1123
-778
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

148 files changed

+1123
-778
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12382,7 +12382,12 @@
1238212382
},
1238312383
{
1238412384
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md",
12385-
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide",
12385+
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-quickstart-guide",
12386+
"redirect_document_id": false
12387+
},
12388+
{
12389+
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide.md",
12390+
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-quickstart-guide",
1238612391
"redirect_document_id": false
1238712392
},
1238812393
{

articles/active-directory/architecture/service-accounts-principal.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ An application instance has two properties: the ApplicationID (or ClientID) and
3333

3434
> [!NOTE]
3535
> The terms **application** and **service principal** are used interchangeably, when referring to an application in authentication tasks. However, they are two representations of applications in Microsoft Entra ID.
36-
36+
3737
The ApplicationID represents the global application and is the same for application instances, across tenants. The ObjectID is a unique value for an application object. As with users, groups, and other resources, the ObjectID helps to identify an application instance in Microsoft Entra ID.
3838

3939
To learn more, see [Application and service principal relationship in Microsoft Entra ID](../develop/app-objects-and-service-principals.md)
@@ -43,8 +43,9 @@ To learn more, see [Application and service principal relationship in Microsoft
4343
You can create an application and its service principal object (ObjectID) in a tenant using:
4444

4545
* Azure PowerShell
46+
* Microsoft Graph PowerShell
4647
* Azure command-line interface (Azure CLI)
47-
* Microsoft Graph
48+
* Microsoft Graph API
4849
* The Azure portal
4950
* Other tools
5051

@@ -85,17 +86,17 @@ When using service principals, use the following table to match challenges and m
8586
To find accounts, run the following commands using service principals with Azure CLI or PowerShell.
8687

8788
* Azure CLI - `az ad sp list`
88-
* PowerShell - `Get-AzureADServicePrincipal -All:$true`
89+
* PowerShell - `Get-MgServicePrincipal -All:$true`
8990

90-
For more information, see [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal)
91+
For more information, see [Get-MgServicePrincipal](/powershell/module/microsoft.graph.applications/get-mgserviceprincipal)
9192

9293
## Assess service principal security
9394

9495
To assess the security, evaluate privileges and credential storage. Use the following table to help mitigate challenges:
9596

9697
|Challenge | Mitigation|
9798
| - | - |
98-
| Detect the user who consented to a multi-tenant app, and detect illicit consent grants to a multi-tenant app | - Run the following PowerShell to find multi-tenant apps <br>`Get-AzureADServicePrincipal -All:$true ? {$_.Tags -eq WindowsAzureActiveDirectoryIntegratedApp"}`</br> - Disable user consent </br> - Allow user consent from verified publishers, for selected permissions (recommended) </br> - Configure them in the user context </br> - Use their tokens to trigger the service principal|
99+
| Detect the user who consented to a multi-tenant app, and detect illicit consent grants to a multi-tenant app | - Run the following PowerShell to find multi-tenant apps <br>`Get-MgServicePrincipal -All:$true | ? {$_.Tags -eq "WindowsAzureActiveDirectoryIntegratedApp"}`</br> - Disable user consent </br> - Allow user consent from verified publishers, for selected permissions (recommended) </br> - Configure them in the user context </br> - Use their tokens to trigger the service principal|
99100
|Use of a hard-coded shared secret in a script using a service principal|Use a certificate|
100101
|Tracking who uses the certificate or the secret| Monitor the service principal sign-ins using the Microsoft Entra sign-in logs|
101102
|Can't manage service principal sign-in with Conditional Access| Monitor the sign-ins using the Microsoft Entra sign-in logs
@@ -134,3 +135,5 @@ Conditional Access:
134135
Use Conditional Access to block service principals from untrusted locations.
135136

136137
See, [Create a location-based Conditional Access policy](../conditional-access/workload-identity.md#create-a-location-based-conditional-access-policy)
138+
139+

articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide.md

Lines changed: 0 additions & 253 deletions
This file was deleted.

articles/active-directory/develop/scenario-daemon-acquire-token.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -268,8 +268,9 @@ If you get an error message telling you that you used an invalid scope, you prob
268268

269269
### Did you forget to provide admin consent? Daemon apps need it!
270270

271-
If you get an **Insufficient privileges to complete the operation** error when you call the API, the tenant administrator needs to grant permissions to the application. See step 6 of Register the client app above.
272-
You'll typically see an error that looks like this error:
271+
If you get an **Insufficient privileges to complete the operation** error when you call the API, the tenant administrator needs to grant permissions to the application. For guidance on how to grant admin consent for your application, see step 4 in [Quickstart: Acquire a token and call Microsoft Graph in a .NET Core console app](quickstart-console-app-netcore-acquire-token.md#step-4-admin-consent).
272+
273+
If you don't grant admin consent to your application, you'll run into the following error:
273274

274275
```json
275276
Failed to call the web API: Forbidden

articles/active-directory/devices/troubleshoot-primary-refresh-token.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -88,19 +88,19 @@ To get the PRT error code, run the `dsregcmd` command, and then locate the `SSO
8888

8989
<a name='method-2-use-event-viewer-to-examine-azure-ad-analytic-and-operational-logs'></a>
9090

91-
#### Method 2: Use Event Viewer to examine Microsoft Entra analytic and operational logs
91+
#### Method 2: Use Event Viewer to examine AAD analytic and operational logs
9292

9393
1. Select **Start**, and then search for and select **Event Viewer**.
9494
1. If the console tree doesn't appear in the **Event Viewer** window, select the **Show/Hide Console Tree** icon to make the console tree visible.
9595
1. In the console tree, select **Event Viewer (Local)**. If child nodes don't appear underneath this item, double-click your selection to show them.
9696
1. Select the **View** menu. If a check mark isn't displayed next to **Show Analytic and Debug Logs**, select that menu item to enable that feature.
97-
1. In the console tree, expand **Applications and Services Logs** > **Microsoft** > **Windows** > **Microsoft Entra ID**. The **Operational** and **Analytic** child nodes appear.
97+
1. In the console tree, expand **Applications and Services Logs** > **Microsoft** > **Windows** > **AAD**. The **Operational** and **Analytic** child nodes appear.
9898

9999
> [!NOTE]
100100
> In the Microsoft Entra Cloud Authentication Provider (CloudAP) plug-in, **Error** events are written to the **Operational** event logs, and information events are written to the **Analytic** event logs. You have to examine both the **Operational** and **Analytic** event logs to troubleshoot PRT issues.
101101
102-
1. In the console tree, select the **Analytic** node to view Microsoft Entra ID-related analytic events.
103-
1. In the list of analytic events, search for Event IDs 1006 and 1007. Event ID 1006 denotes the beginning of the PRT acquisition flow, and Event ID 1007 denotes the end of the PRT acquisition flow. All events in the **Microsoft Entra ID** logs (both **Analytic** and **Operational**) that occurred between Event ID 1006 and Event ID 1007 are logged as part of the PRT acquisition flow. The following table shows an example event listing.
102+
1. In the console tree, select the **Analytic** node to view AAD-related analytic events.
103+
1. In the list of analytic events, search for Event IDs 1006 and 1007. Event ID 1006 denotes the beginning of the PRT acquisition flow, and Event ID 1007 denotes the end of the PRT acquisition flow. All events in the **AAD** logs (both **Analytic** and **Operational**) that occurred between Event ID 1006 and Event ID 1007 are logged as part of the PRT acquisition flow. The following table shows an example event listing.
104104

105105
| Level | Date and Time | Source | Event ID | Task Category |
106106
|-----------------|--------------------------|---------|----------|--------------------------------|

articles/active-directory/enterprise-users/groups-bulk-download-members.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ You can bulk download the members of a group in your organization to a comma-sep
2929

3030
![The Download Members command is on the profile page for the group](./media/groups-bulk-download-members/download-panel.png)
3131

32+
[!INCLUDE [Bulk update warning](~/articles/active-directory/includes/bulk-export.md)]
33+
3234
## Check download status
3335

3436
You can see the status of all of your pending bulk requests in the **Bulk operation results** page.

articles/active-directory/enterprise-users/users-bulk-add.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,8 @@ The rows in a downloaded CSV template are as follows:
7272

7373
If there are errors, you can download and view the results file on the **Bulk operation results** page. The file contains the reason for each error. The file submission must match the provided template and include the exact column names.
7474

75+
[!INCLUDE [Bulk update warning](~/articles/active-directory/includes/bulk-export.md)]
76+
7577
## Check status
7678

7779
You can see the status of all of your pending bulk requests in the **Bulk operation results** page.

articles/active-directory/enterprise-users/users-bulk-delete.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ The rows in a downloaded CSV template are as follows:
5252

5353
If there are errors, you can download and view the results file on the **Bulk operation results** page. The file contains the reason for each error.
5454

55+
[!INCLUDE [Bulk update warning](~/articles/active-directory/includes/bulk-export.md)]
56+
5557
## Check status
5658

5759
You can see the status of all of your pending bulk requests in the **Bulk operation results** page.

articles/active-directory/enterprise-users/users-bulk-download.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,8 @@ You can see the status of your pending bulk requests in the **Bulk operation res
7676

7777
Each bulk activity to export a list of users can run for up to one hour. This pace enables export and download of a list of up to 500,000 users.
7878

79+
[!INCLUDE [Bulk update warning](~/articles/active-directory/includes/bulk-export.md)]
80+
7981
## Next steps
8082

8183
- [Bulk add users](users-bulk-add.md)

articles/active-directory/enterprise-users/users-bulk-restore.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,8 @@ The rows in a downloaded CSV template are as follows:
6262

6363
If there are errors, you can download and view the results file on the **Bulk operation results** page. The file contains the reason for each error.
6464

65+
[!INCLUDE [Bulk update warning](~/articles/active-directory/includes/bulk-export.md)]
66+
6567
## Check status
6668

6769
You can see the status of all of your pending bulk requests in the **Bulk operation results** page.

0 commit comments

Comments
 (0)