Skip to content

Commit 06a7316

Browse files
authored
Merge pull request #216914 from MicrosoftDocs/main
11/02 AM Publish
2 parents 30e3834 + d5af7bd commit 06a7316

File tree

79 files changed

+1160
-830
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

79 files changed

+1160
-830
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6423,11 +6423,6 @@
64236423
"redirect_url": "/azure/storage/blobs/storage-encrypt-decrypt-blobs-key-vault",
64246424
"redirect_document_id": false
64256425
},
6426-
{
6427-
"source_path_from_root": "/articles/storage/blobs/storage-encrypt-decrypt-blobs-key-vault.md",
6428-
"redirect_url": "/azure/storage/blobs/client-side-encryption",
6429-
"redirect_document_id": false
6430-
},
64316426
{
64326427
"source_path_from_root": "/articles/storage/blobs/Storage-blob-performance-tiers.md",
64336428
"redirect_url": "/azure/storage/common/storage-account-overview",

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -142,10 +142,15 @@ Users managing their security information at [https://aka.ms/mysecurityinfo](htt
142142
![Screenshot of how users can manage a Temporary Access Pass in My Security Info.](./media/how-to-authentication-temporary-access-pass/tap-my-security-info.png)
143143

144144
### Windows device setup
145-
Users with a Temporary Access Pass can navigate the setup process on Windows 10 and 11 to perform device join operations and configure Windows Hello For Business. Temporary Access Pass usage for setting up Windows Hello for Business varies based on the devices joined state:
146-
- During Azure AD Join setup, users can authenticate with a TAP (no password required) and setup Windows Hello for Business.
147-
- On already Azure AD Joined devices, users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.
148-
- On Hybrid Azure AD Joined devices, users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.
145+
Users with a Temporary Access Pass can navigate the setup process on Windows 10 and 11 to perform device join operations and configure Windows Hello for Business. Temporary Access Pass usage for setting up Windows Hello for Business varies based on the devices joined state.
146+
147+
For Azure AD Joined devices:
148+
- During the Azure AD Join setup process, users can authenticate with a TAP (no password required) to join the device and register Windows Hello for Business.
149+
- On already joined devices, users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.
150+
- If the [Web sign-in](https://learn.microsoft.com/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin) feature on Windows is also enabled, the user can use TAP to sign into the device. This is intended only for completing initial device setup, or recovery when the user does not know or have a password.
151+
152+
For Hybrid Azure AD Joined devices:
153+
- Users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.
149154

150155
![Screenshot of how to enter Temporary Access Pass when setting up Windows 10.](./media/how-to-authentication-temporary-access-pass/windows-10-tap.png)
151156

articles/active-directory/develop/active-directory-how-applications-are-added.md

Lines changed: 76 additions & 79 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/reference-v2-libraries.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: reference
1111
ms.workload: identity
12-
ms.date: 03/30/2021
12+
ms.date: 10/28/2022
1313
ms.author: cwerner
1414
ms.reviewer: jmprieur, saeeda
15-
ms.custom: aaddev
15+
ms.custom: aaddev, engagement-fy23
1616
# Customer intent: As a developer, I want to know whether there's a Microsoft Authentication Library (MSAL) available for the language/framework I'm using to build my application, and whether the library is GA or in preview.
1717
---
1818

Lines changed: 87 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,87 @@
1+
---
2+
title: Convert local guests into Azure AD B2B guest accounts
3+
description: Learn how to convert local guests into Azure AD B2B guest accounts
4+
services: active-directory
5+
author: gargi-sinha
6+
ms.author: gasinh
7+
manager: martinco
8+
ms.date: 11/03/2022
9+
ms.topic: how-to
10+
ms.service: active-directory
11+
ms.subservice: enterprise-users
12+
ms.workload: identity
13+
ms.custom: it-pro
14+
ms.collection: M365-identity-device-management
15+
---
16+
17+
# Convert local guests into Azure Active Directory B2B guest accounts
18+
19+
Azure Active Directory (Azure AD B2B) allows external users to collaborate using their own identities. However, it isn't uncommon for organizations to issue local usernames and passwords to external users. This approach isn't recommended as the bring-your-own-identity (BYOI) capabilities provided
20+
by Azure AD B2B to provide better security, lower cost, and reduce
21+
complexity when compared to local account creation. Learn more
22+
[here.](https://learn.microsoft.com/azure/active-directory/fundamentals/secure-external-access-resources)
23+
24+
If your organization currently issues local credentials that external users have to manage and would like to migrate to using Azure AD B2B instead, this document provides a guide to make the transition as seamlessly as possible.
25+
26+
## Identify external-facing applications
27+
28+
Before migrating local accounts to Azure AD B2B, admins should understand what applications and workloads these external users need to access. For example, if external users need access to an application that is hosted on-premises, admins will need to validate that the application is integrated with Azure AD and that a provisioning process is implemented to provision the user from Azure AD to the application.
29+
The existence and use of on-premises applications could be a reason why local accounts are created in the first place. Learn more about
30+
[provisioning B2B guests to on-premises
31+
applications.](https://learn.microsoft.com/azure/active-directory/external-identities/hybrid-cloud-to-on-premises)
32+
33+
All external-facing applications should have single-sign on (SSO) and provisioning integrated with Azure AD for the best end user experience.
34+
35+
## Identify local guest accounts
36+
37+
Admins will need to identify which accounts should be migrated to Azure AD B2B. External identities in Active Directory should be easily identifiable, which can be done with an attribute-value pair. For example, making ExtensionAttribute15 = `External` for all external users. If these users are being provisioned via Azure AD Connect or Cloud Sync, admins can optionally configure these synced external users
38+
to have the `UserType` attributes set to `Guest`. If these users are being
39+
provisioned as cloud-only accounts, admins can directly modify the
40+
users' attributes. What is most important is being able to identify the
41+
users who you want to convert to B2B.
42+
43+
## Map local guest accounts to external identities
44+
45+
Once you've identified which external user accounts you want to
46+
convert to Azure AD B2B, you need to identify the BYOI identities or external emails for each user. For example, admins will need to identify that the local account ([email protected]) is a user whose home identity/email address is [email protected]. How to identify the home identities is up to the organization, but some examples include:
47+
48+
- Asking the external user's sponsor to provide the information.
49+
50+
- Asking the external user to provide the information.
51+
52+
- Referring to an internal database if this information is already known and stored by the organization.
53+
54+
Once the mapping of each external local account to the BYOI identity is done, admins will need to add the external identity/email to the user.mail attribute on each local account.
55+
56+
## End user communications
57+
58+
External users should be notified that the migration will be taking place and when it will happen. Ensure you communicate the expectation that external users will stop using their existing password and post-migration will authenticate with their own home/corporate credentials going forward. Communications can include email campaigns, posters, and announcements.
59+
60+
## Migrate local guest accounts to Azure AD B2B
61+
62+
Once the local accounts have their user.mail attributes populated with the external identity/email that they're mapped to, admins can [convert the local accounts to Azure AD B2B by inviting the local account.](https://learn.microsoft.com/azure/active-directory/external-identities/invite-internal-users)
63+
This can be done in the UX or programmatically via PowerShell or the Microsoft Graph API. Once complete, the users will no longer
64+
authenticate with their local password, but will instead authenticate with their home identity/email that was populated in the user.mail attribute. You've successfully migrated to Azure AD B2B.
65+
66+
## Post-migration considerations
67+
68+
If local accounts for external users were being synced from on-premises, admins should take steps to reduce their on-premises footprint and use cloud-native B2B guest accounts moving forward. Some possible actions can include:
69+
70+
- Transition existing local accounts for external users to Azure AD B2B and stop creating local accounts. Post-migration, admins should invite external users natively in Azure AD.
71+
72+
- Randomize the passwords of existing local accounts for external users to ensure they can't authenticate locally to on-premises resources. This will increase security by ensuring that authentication and user lifecycle is tied to the external user's home identity.
73+
74+
## Next steps
75+
76+
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
77+
78+
1. [Determine your desired security posture for external access](1-secure-access-posture.md)
79+
1. [Discover your current state](2-secure-access-current-state.md)
80+
1. [Create a governance plan](3-secure-access-plan.md)
81+
1. [Use groups for security](4-secure-access-groups.md)
82+
1. [Transition to Azure AD B2B](5-secure-access-b2b.md)
83+
1. [Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
84+
1. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
85+
1. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
86+
1. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
87+
1. [Secure local guest accounts](10-secure-local-guest.md) (You’re here)

articles/active-directory/fundamentals/secure-external-access-resources.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 09/13/2022
11+
ms.date: 11/03/2022
1212
ms.author: gasinh
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -89,3 +89,5 @@ See the following articles on securing external access to resources. We recommen
8989
8. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
9090

9191
9. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
92+
93+
10. [Secure local guest accounts](10-secure-local-guest.md)

articles/active-directory/fundamentals/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -318,6 +318,8 @@ items:
318318
href: 8-secure-access-sensitivity-labels.md
319319
- name: 9 Secure access to Teams, SharePoint, and OneDrive
320320
href: 9-secure-access-teams-sharepoint.md
321+
- name: 10 Secure local guest accounts
322+
href: 10-secure-local-guest.md
321323
- name: Secure service accounts
322324
items:
323325
- name: Introduction to Azure service accounts

articles/active-directory/manage-apps/admin-consent-workflow-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
10-
ms.topic: how-to
11-
ms.date: 06/10/2022
10+
ms.topic: conceptual
11+
ms.date: 11/02/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414

articles/active-directory/manage-apps/disable-user-sign-in-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Disable how a how a user signs in
2+
title: Disable user sign-in for application
33
description: How to disable an enterprise application so that no users may sign in to it in Azure Active Directory
44
services: active-directory
55
author: eringreenlee
@@ -12,19 +12,19 @@ ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.custom: it-pro
1414
ms.collection: M365-identity-device-management
15-
#customer intent: As an admin, I want to disable the way a user signs in for an application so that no user can sign in to it in Azure Active Directory.
15+
#customer intent: As an admin, I want to disable user sign-in for an application so that no user can sign in to it in Azure Active Directory.
1616
---
1717
# Disable user sign-in for an application
1818

1919
There may be situations while configuring or managing an application where you don't want tokens to be issued for an application. Or, you may want to preemptively block an application that you do not want your employees to try to access. To accomplish this, you can disable user sign-in for the application, which will prevent all tokens from being issued for that application.
2020

21-
In this article, you will learn how to disable how a user signs in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
21+
In this article, you will learn how to prevent users from signing in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
2222

2323

2424

2525
## Prerequisites
2626

27-
To disable how a user signs in, you need:
27+
To disable user sign-in, you need:
2828

2929
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3030
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.

articles/active-directory/manage-apps/restore-application.md

Lines changed: 27 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 07/28/2022
11+
ms.date: 11/02/2022
1212
ms.author: jomondi
1313
ms.reviewer: sureshja
1414
ms.custom: mode-other
@@ -53,8 +53,11 @@ To recover your enterprise application with its previous configurations, first d
5353
1. To view the recently deleted enterprise application, run the following command:
5454

5555
```powershell
56-
Get-AzureADMSDeletedDirectoryObject -Id 'd4142c52-179b-4d31-b5b9-08940873507b'
57-
```
56+
Get-AzureADMSDeletedDirectoryObject -Id <id>
57+
```
58+
59+
Replace id with the object ID of the service principal that you want to restore.
60+
5861
:::zone-end
5962

6063
:::zone pivot="ms-powershell"
@@ -64,8 +67,10 @@ To recover your enterprise application with its previous configurations, first d
6467
1. To view the recently deleted enterprise applications, run the following command:
6568

6669
```powershell
67-
Get-MgDirectoryDeletedItem -DirectoryObjectId 'd4142c52-179b-4d31-b5b9-08940873507b'
70+
Get-MgDirectoryDeletedItem -DirectoryObjectId <id>
6871
```
72+
Replace id with the object ID of the service principal that you want to restore.
73+
6974
:::zone-end
7075

7176
:::zone pivot="ms-graph"
@@ -77,7 +82,11 @@ To get the list of deleted enterprise applications in your tenant, run the follo
7782
```http
7883
GET https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal
7984
```
80-
Record the ID of the enterprise application you want to restore.
85+
From the list of deleted service principals generated, record the ID of the enterprise application you want to restore.
86+
87+
Alternatively, if you want to get the specific enterprise application that was deleted, fetch the deleted service principal and filter the results by the client's application ID (appId) property using the following syntax:
88+
89+
`https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=appId eq '{appId}'`. Once you've retrieved the object ID of the deleted service principal, proceed to restore it.
8190

8291
:::zone-end
8392

@@ -89,17 +98,23 @@ Record the ID of the enterprise application you want to restore.
8998

9099

91100
```powershell
92-
Restore-AzureADMSDeletedDirectoryObject -Id 'd4142c52-179b-4d31-b5b9-08940873507b'
101+
Restore-AzureADMSDeletedDirectoryObject -Id <id>
93102
```
103+
104+
Replace id with the object ID of the service principal that you want to restore.
105+
94106
:::zone-end
95107

96108
:::zone pivot="ms-powershell"
97109

98110
1. To restore the enterprise application, run the following command:
99111

100112
```powershell
101-
Restore-MgDirectoryObject -DirectoryObjectId 'd4142c52-179b-4d31-b5b9-08940873507b'
113+
Restore-MgDirectoryObject -DirectoryObjectId <id>
102114
```
115+
116+
Replace id with the object ID of the service principal that you want to restore.
117+
103118
:::zone-end
104119

105120
:::zone pivot="ms-graph"
@@ -109,6 +124,9 @@ Record the ID of the enterprise application you want to restore.
109124
```http
110125
POST https://graph.microsoft.com/v1.0/directory/deletedItems/{id}/restore
111126
```
127+
128+
Replace id with the object ID of the service principal that you want to restore.
129+
112130
:::zone-end
113131

114132
## Permanently delete an enterprise application
@@ -121,7 +139,7 @@ Record the ID of the enterprise application you want to restore.
121139
To permanently delete a soft deleted enterprise application, run the following command:
122140

123141
```powershell
124-
Remove-AzureADMSDeletedDirectoryObject -Id 'd4142c52-179b-4d31-b5b9-08940873507b'
142+
Remove-AzureADMSDeletedDirectoryObject -Id <id>
125143
```
126144
:::zone-end
127145

@@ -130,7 +148,7 @@ Remove-AzureADMSDeletedDirectoryObject -Id 'd4142c52-179b-4d31-b5b9-08940873507b
130148
1. To permanently delete the soft deleted enterprise application, run the following command:
131149

132150
```powershell
133-
Remove-MgDirectoryDeletedItem -DirectoryObjectId 'd4142c52-179b-4d31-b5b9-08940873507b'
151+
Remove-MgDirectoryDeletedItem -DirectoryObjectId <id>
134152
```
135153

136154
:::zone-end

0 commit comments

Comments
 (0)