Skip to content

Commit 0f99143

Browse files
committed
SFI - Global Admin remediation for Azure AD B2C docs
1 parent 35c6086 commit 0f99143

6 files changed

+25
-36
lines changed

articles/active-directory-b2c/tenant-management-check-tenant-creation-permission.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010

1111
ms.topic: tutorial
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 06/21/2024
13+
ms.date: 09/11/2024
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -22,7 +22,7 @@ ms.subservice: B2C
2222

2323
# Review tenant creation permission in Azure Active Directory B2C
2424

25-
Anyone who creates an Azure Active Directory B2C (Azure AD B2C) becomes the *Global Administrator* of the tenant. It's a security risk if a non-admin user is allowed to create a tenant.
25+
It's a security risk if a non-admin user in a tenant is allowed to create a tenant. As a [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) in an Azure AD B2C tenant, you can restrict non-admin users from creating tenants.
2626

2727
In this article, you learn how, as an admin, you can restrict tenant creation for non-admins. Also, you learn how, as a non-admin user, you can check if you've permission to create a tenant.
2828

@@ -32,9 +32,7 @@ In this article, you learn how, as an admin, you can restrict tenant creation fo
3232

3333
## Restrict non-admin users from creating Azure AD B2C tenants
3434

35-
As a *Global Administrator* in an Azure AD B2C tenant, you can restrict non-admin users from creating tenants. To do so, use the following steps:
36-
37-
1. Sign in to the [Azure portal](https://portal.azure.com).
35+
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator).
3836

3937
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
4038

@@ -58,10 +56,10 @@ Before you create an Azure AD B2C tenant, make sure that you've the permission t
5856

5957
1. Under **Manage**, select **User Settings**.
6058

61-
1. Under **Default user role permissions**, review your **Restrict non-admin users from creating tenants** setting. If the setting is set to **No**, then contact your administrator to assign the tenant creator role to you. The setting is greyed out if you're not an administrator in the tenant.
59+
1. Under **Default user role permissions**, review your **Restrict non-admin users from creating tenants** setting. If the setting is set to **No**, then contact your administrator to assign you [Tenant Creator](/entra/identity/role-based-access-control/permissions-reference#tenant-creator) role. The setting is greyed out if you're not an administrator in the tenant.
6260

6361

64-
## Next steps
62+
## Related content
6563

6664
- [Read tenant name and ID](tenant-management-read-tenant-name.md)
6765
- [Clean up resources and delete tenant](tutorial-delete-tenant.md)

articles/active-directory-b2c/tenant-management-emergency-access-account.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,9 @@ description: Learn how to manage emergency access accounts in Azure AD B2C tenan
55

66
author: kengaderdus
77
manager: CelesteDG
8-
98
ms.service: active-directory
10-
119
ms.topic: tutorial
12-
ms.date: 06/21/2024
10+
ms.date: 09/11/2024
1311
ms.custom: b2c-docs-improvements
1412
ms.reviewer: yoelh
1513
ms.author: kengaderdus
@@ -47,7 +45,7 @@ Create two or more emergency access accounts. These accounts should be cloud-onl
4745

4846
Use the following steps to create an emergency access account:
4947

50-
1. Sign in to the [Azure portal](https://portal.azure.com) as an existing Global Administrator. If you use your Microsoft Entra account, make sure you're using the directory that contains your Azure AD B2C tenant:
48+
1. Sign in to the [Azure portal](https://portal.azure.com) as an existing [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator). If you use your Microsoft Entra account, make sure you're using the directory that contains your Azure AD B2C tenant:
5149

5250
1. Select the **Directories + subscriptions** icon in the portal toolbar.
5351

articles/active-directory-b2c/tenant-management-manage-administrator.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,19 @@
11
---
22
title: Manage administrator accounts in Azure Active Directory B2C
33
titleSuffix: Azure Active Directory B2C
4-
description: Learn how to add an administrator account to your Azure Active Directory B2C tenant. Learn how to invite a guest account as an administrator into your Azure AD B2C tenant.
5-
4+
description: Learn how to add an administrator account to your Azure Active Directory B2C tenant. Learn how to invite a guest account as an administrator into your Azure AD B2C tenant
65
author: kengaderdus
76
manager: CelesteDG
8-
97
ms.service: active-directory
10-
118
ms.topic: tutorial
129
ms.custom: b2c-docs-improvements
13-
ms.date: 06/21/2024
10+
ms.date: 09/11/2024
1411
ms.reviewer: yoelh
1512
ms.author: kengaderdus
1613
ms.subservice: B2C
1714

1815

1916
#Customer intent: As an Azure AD B2C administrator, I want to manage administrator accounts, add new administrators (work and guest accounts), assign roles to user accounts, remove role assignments, delete administrator accounts, and protect administrative accounts with multifactor authentication, so that I can control access and ensure security in my Azure AD B2C tenant.
20-
2117
---
2218

2319
# Manage administrator accounts in Azure Active Directory B2C
@@ -43,7 +39,7 @@ In this article, you learn how to:
4339

4440
To create a new administrative account, follow these steps:
4541

46-
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator permissions.
42+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least [Privileged Role Administrator](/entra/identity/role-based-access-control/permissions-reference#privileged-role-administrator) permissions.
4743
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
4844
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
4945
1. Under **Manage**, select **Users**.
@@ -70,7 +66,7 @@ You can also invite a new guest user to manage your tenant. The guest account is
7066

7167
To invite a user, follow these steps:
7268

73-
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator permissions.
69+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least [Privileged Role Administrator](/entra/identity/role-based-access-control/permissions-reference#privileged-role-administrator) permissions.
7470
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
7571
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
7672
1. Under **Manage**, select **Users**.
@@ -109,7 +105,7 @@ If the guest didn't receive the invitation email, or the invitation expired, you
109105

110106
You can assign a role when you [create a user](#add-an-administrator-work-account) or [invite a guest user](#invite-an-administrator-guest-account). You can add a role, change the role, or remove a role for a user:
111107

112-
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least Privileged Role Administrator permissions.
108+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least [Privileged Role Administrator](/entra/identity/role-based-access-control/permissions-reference#privileged-role-administrator) permissions.
113109
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
114110
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
115111
1. Under **Manage**, select **Users**.
@@ -127,15 +123,15 @@ If you need to remove a role assignment from a user, follow these steps:
127123

128124
As part of an auditing process, you typically review which users are assigned to specific roles in the Azure AD B2C directory. Use the following steps to audit which users are currently assigned privileged roles.
129125

130-
1. Sign in to the [Azure portal](https://portal.azure.com/) as Privileged Role Administrator.
126+
1. Sign in to the [Azure portal](https://portal.azure.com/) as [Privileged Role Administrator](/entra/identity/role-based-access-control/permissions-reference#privileged-role-administrator).
131127
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
132128
1. Under **Azure services**, select **Azure AD B2C**. Or use the search box to find and select **Azure AD B2C**.
133129
1. Under **Manage**, select **Roles and administrators**.
134130
1. Select a role, such as **Global administrator**. The **Role | Assignments** page lists the users with that role.
135131

136132
## Delete an administrator account
137133

138-
To delete an existing user, you must have a *Global administrator* role assignment. Global admins can delete any user, including other admins. *User administrators* can delete any non-admin user.
134+
To delete an existing user, you must have a [Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) role assignment. Global administrators can delete any user, including other admins. *User administrators* can delete any non-admin user.
139135

140136
1. In your Azure AD B2C directory, select **Users**, and then select the user you want to delete.
141137
1. Select **Delete**, and then **Yes** to confirm the deletion.

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99

1010
ms.topic: tutorial
11-
ms.date: 01/11/2024
11+
ms.date: 09/11/2024
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -48,11 +48,10 @@ Before you create your Azure AD B2C tenant, you need to take the following consi
4848

4949
## Create an Azure AD B2C tenant
5050
>[!NOTE]
51-
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched on, ask your *Global Administrator* to assign you a **Tenant Creator** role.
51+
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched on, ask your [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) to assign you a [Tenant Creator](/entra/identity/role-based-access-control/permissions-reference#tenant-creator) role.
5252
5353
1. Sign in to the [Azure portal](https://portal.azure.com).
5454

55-
5655
1. Make sure you're using the Microsoft Entra tenant that contains your subscription:
5756

5857
1. In the Azure portal toolbar, select the **Directories + subscriptions** icon.
@@ -150,4 +149,4 @@ In this article, you learned how to:
150149
Next, learn how to register a web application in your new tenant.
151150

152151
> [!div class="nextstepaction"]
153-
> [Register your applications >](tutorial-register-applications.md)
152+
> [Register your applications >](tutorial-register-applications.md)

articles/active-directory-b2c/tutorial-delete-tenant.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99

1010
ms.topic: tutorial
11-
ms.date: 01/11/2024
11+
ms.date: 09/11/2024
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414

@@ -28,7 +28,7 @@ When you've finished the Azure Active Directory B2C (Azure AD B2C) tutorials, yo
2828
2929
## Identify cleanup tasks
3030

31-
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
31+
1. Sign in to the [Azure portal](https://portal.azure.com/) with a [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator) role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
3232
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
3333
1. In the Azure portal, search for and select the **Microsoft Entra ID** service.
3434
1. In the left menu, under **Manage**, select **Properties**.
@@ -45,7 +45,7 @@ When you've finished the Azure Active Directory B2C (Azure AD B2C) tutorials, yo
4545

4646
If you've the confirmation page open from the previous section, you can use the links in the **Required action** column to open the Azure portal pages where you can remove these resources. Or, you can remove tenant resources from within the Azure AD B2C service using the following steps.
4747

48-
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
48+
1. Sign in to the [Azure portal](https://portal.azure.com/) with a [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator). Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
4949
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
5050
1. In the Azure portal, select the **Azure AD B2C** service, or search for and select **Azure AD B2C**.
5151
1. Delete all users *except* the admin account you're currently signed in as:
@@ -86,7 +86,7 @@ If you've the confirmation page open from the previous section, you can use the
8686

8787
Once you delete all the tenant resources, you can now delete the tenant itself:
8888

89-
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
89+
1. Sign in to the [Azure portal](https://portal.azure.com/) with a [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator). Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
9090
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
9191
1. In the Azure portal, search for and select the **Microsoft Entra ID** service.
9292
1. If you haven't already granted yourself access management permissions, do the following:
@@ -110,4 +110,4 @@ In this article, you learned how to:
110110
> * Delete your tenant resources
111111
> * Delete the tenant
112112
113-
Next, learn more about getting started with Azure AD B2C [user flows and custom policies](user-flow-overview.md).
113+
Next, learn more about getting started with Azure AD B2C [user flows and custom policies](user-flow-overview.md).

articles/active-directory-b2c/user-flow-custom-attributes.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99

1010
ms.topic: how-to
11-
ms.date: 01/11/2024
11+
ms.date: 09/11/2024
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
@@ -40,7 +40,7 @@ Azure AD B2C allows you to extend the set of attributes stored on each user acco
4040

4141
## Create a custom attribute
4242

43-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
43+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least [External ID User Flow Attribute Administrator](/entra/identity/role-based-access-control/permissions-reference#external-id-user-flow-attribute-administrator) of your Azure AD B2C tenant.
4444
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
4545
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
4646
1. Select **User attributes**, and then select **Add**.
@@ -199,7 +199,7 @@ Unlike built-in attributes, custom attributes can be removed. The extension attr
199199

200200
Use the following steps to remove a custom attribute from a user flow in your tenant:
201201

202-
1. Sign in to the [Azure portal](https://portal.azure.com/) as the global administrator of your Azure AD B2C tenant.
202+
1. Sign in to the [Azure portal](https://portal.azure.com/) as at least [External ID User Flow Attribute Administrator](/entra/identity/role-based-access-control/permissions-reference#external-id-user-flow-attribute-administrator) of your Azure AD B2C tenant.
203203
2. Make sure you're using the directory that contains your Azure AD B2C tenant:
204204
1. Select the **Directories + subscriptions** icon in the portal toolbar.
205205
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the Directory name list, and then select **Switch**
@@ -215,8 +215,6 @@ Use the [Microsoft Graph API](microsoft-graph-operations.md#application-extensio
215215

216216
::: zone-end
217217

218-
219-
220218

221219
## Next steps
222220

0 commit comments

Comments
 (0)