Skip to content

Commit 13d0ac8

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into normesta-sdk-interop
2 parents 7a30da1 + 4cf0cce commit 13d0ac8

File tree

151 files changed

+1709
-1212
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

151 files changed

+1709
-1212
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23069,6 +23069,16 @@
2306923069
"redirect_url": "/azure/storage/common/storage-quickstart-create-account",
2307023070
"redirect_document_id": true
2307123071
},
23072+
{
23073+
"source_path": "articles/storage/common/storage-quickstart-create-account.md",
23074+
"redirect_url": "/azure/storage/common/storage-account-create",
23075+
"redirect_document_id": true
23076+
},
23077+
{
23078+
"source_path": "articles/storage/common/storage-account-manage.md",
23079+
"redirect_url": "/azure/storage/common/storage-account-keys-manage",
23080+
"redirect_document_id": true
23081+
},
2307223082
{
2307323083
"source_path": "articles/storage/common/storage-account-options.md",
2307423084
"redirect_url": "/azure/storage/common/storage-account-overview",
@@ -43977,6 +43987,11 @@
4397743987
"source_path": "articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-storage.md",
4397843988
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/overview",
4397943989
"redirect_document_id": false
43990+
},
43991+
{
43992+
"source_path": "articles/virtual-desktop/bandwidth-recommendations.md",
43993+
"redirect_url": "https://docs.microsoft.com/windows-server/remote/remote-desktop-services/network-guidance",
43994+
"redirect_document_id": false
4398043995
}
4398143996
]
4398243997
}

articles/active-directory-domain-services/security-audit-events.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ The following table outlines scenarios for each destination resource type.
6666
6767
| Target Resource | Scenario |
6868
|:---|:---|
69-
|Azure Storage| This target should be used when your primary need is to store security audit events for archival purposes. Other targets can be used for archival purposes, however those targets provide capabilities beyond the primary need of archiving. Before you enable Azure AD DS security audit events, [Create an Azure storage account](../storage/common/storage-quickstart-create-account.md?tabs=azure-portal#create-a-storage-account-1).|
69+
|Azure Storage| This target should be used when your primary need is to store security audit events for archival purposes. Other targets can be used for archival purposes, however those targets provide capabilities beyond the primary need of archiving. Before you enable Azure AD DS security audit events, first [Create an Azure Storage account](../storage/common/storage-account-create.md).|
7070
|Azure Event Hubs| This target should be used when your primary need is to share security audit events with additional software such as data analysis software or security information & event management (SIEM) software. Before you enable Azure AD DS security audit events, [Create an event hub using Azure portal](https://docs.microsoft.com/azure/event-hubs/event-hubs-create)|
7171
|Azure Log Analytics Workspace| This target should be used when your primary need is to analyze and review secure audits from the Azure portal directly. Before you enable Azure AD DS security audit events, [Create a Log Analytics workspace in the Azure portal.](https://docs.microsoft.com/azure/azure-monitor/learn/quick-create-workspace)|
7272

3.82 KB
Loading
Lines changed: 38 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,75 +1,85 @@
11
---
2-
title: Quickstart Azure AD self-service password reset
3-
description: In this quickstart, you will quickly configure Azure AD self-service password reset to allow users to reset their own passwords
2+
title: Quickstart - Azure AD self-service password reset
3+
description: In this quickstart, you learn how to configure Azure AD self-service password reset to allow users to reset their own passwords and reduce IT department overhead.
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: quickstart
9-
ms.date: 07/17/2018
9+
ms.date: 12/10/2019
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
1414
ms.reviewer: sahenry
1515

16-
# Customer intent: As an Azure AD Administrator, I want to protect user authentication so I deploy SSPR so that when users have trouble signing-in they can reset their passwords using something they know.
16+
# Customer intent: As an Azure AD Administrator, I want to protect user authentication and reduce IT department overhead by deploying self-service password reset (SSPR) so that users can reset their own passwords when they have problems.
1717
ms.collection: M365-identity-device-management
1818
---
19-
# Quickstart: Self-service password reset
19+
# Quickstart: Configure Azure Active Directory self-service password reset
2020

21-
In this quickstart, you walk through configuring self-service password reset (SSPR) as a simple means for IT administrators to enable users to reset their passwords or unlock their accounts.
21+
In this quickstart, you configure Azure Active Directory (AD) self-service password reset (SSPR) to enable users to reset their passwords or unlock their accounts. With SSPR, users can reset their own credentials without helpdesk or administrator assistance. This ability lets users regain access to their account without waiting for additional support.
22+
23+
> [!IMPORTANT]
24+
> This quickstart shows an administrator how to enable self-service password reset. If your IT team hasn't already enabled the ability to reset your own password, reach out to your helpdesk for additional assistance.
25+
>
26+
> If your IT team has enabled password reset, once you're [registered for self-service password reset][register-sspr] you can then [reset your work or school password][reset-password]. If you're not already registered for self-service password reset, reach out to your helpdesk for additional assistance.
2227
2328
## Prerequisites
2429

2530
* A working Azure AD tenant with at least a trial license enabled.
31+
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2632
* An account with Global Administrator privileges.
27-
* A non-administrator test user with a password you know, if you need to create a user see the article [Quickstart: Add new users to Azure Active Directory](../add-users-azure-active-directory.md).
28-
* A pilot group to test with that the non-administrator test user is a member of, if you need to create a group see the article [Create a group and add members in Azure Active Directory](../active-directory-groups-create-azure-portal.md).
33+
* A non-administrator test user with a password you know, such as *testuser*.
34+
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../add-users-azure-active-directory.md).
35+
* A pilot group to test with that the non-administrator test user is a member of, such as *SSPR-Test-Group*.
36+
* If you need to create a group, see how to [Create a group and add members in Azure Active Directory](../active-directory-groups-create-azure-portal.md).
2937

3038
## Enable self-service password reset
3139

3240
[View this process as a video on YouTube](https://youtu.be/Pa0eyqjEjvQ)
3341

34-
1. From your existing Azure AD tenant, from the Azure portal menu or from the **Home** page, select **Azure Active Directory**. Then, select **Password reset**.
35-
36-
2. From the **Properties** page, under the option **Self Service Password Reset Enabled**, choose **Selected**.
37-
* From **Select group**, choose your pilot group created as part of the prerequisites section of this article.
38-
* Click **Save**.
42+
1. In the Azure portal menu or from the **Home** page, select **Azure Active Directory** and then choose **Password reset**.
3943

40-
3. From the **Authentication methods** page, make the following choices:
41-
* Number of methods required to reset: **1**
42-
* Methods available to users:
43-
* **Email**
44-
* **Mobile app code (preview)**
45-
* Click **Save**.
44+
1. On the **Properties** page under the option for **Self Service Password Reset Enabled**, choose **Selected**.
45+
1. Choose **Select group**, then select your pilot group created as part of the prerequisites section of this article, such as *SSPR-Test-Group*. When ready, select **Save**.
46+
1. On the **Authentication methods** page, make the following choices and then choose **Save**:
47+
* Number of methods required to reset: **1**
48+
* Methods available to users:
49+
* **Mobile app code**
50+
* **Email**
4651

47-
![Choosing authentication methods for SSPR][Authentication]
52+
> [!div class="mx-imgBorder"]
53+
> ![Choosing authentication methods for SSPR][Authentication]
4854
49-
4. From the **Registration** page, make the following choices:
55+
4. From the **Registration** page, make the following choices and then choose **Save**:
5056
* Require users to register when they sign in: **Yes**
5157
* Set the number of days before users are asked to reconfirm their authentication information: **365**
5258

5359
## Test self-service password reset
5460

55-
Now lets test your SSPR configuration with a test user. Since Microsoft enforces strong authentication requirements for Azure administrator accounts, testing using an administrator account may change the outcome. For more information regarding the administrator password policy, see our [password policy](concept-sspr-policy.md) article.
61+
Now lets test your SSPR configuration with a test user that's part of the group you selected in the previous section, such as *testuser*. Since Microsoft enforces strong authentication requirements for Azure administrator accounts, testing using an administrator account may change the outcome. For more information regarding the administrator password policy, see our [password policy](concept-sspr-policy.md) article.
5662

5763
1. Open a new browser window in InPrivate or incognito mode, and browse to [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup).
58-
2. Sign in with a non-administrator test user, and register your authentication phone.
59-
3. Once complete, click the button marked **looks good** and close the browser window.
64+
2. Sign in with a non-administrator test user, such as *testuser*, and register your authentication phone.
65+
3. Once complete, select the button marked **Looks good** and close the browser window.
6066
4. Open a new browser window in InPrivate or incognito mode, and browse to [https://aka.ms/sspr](https://aka.ms/sspr).
61-
5. Enter your non-administrator test users' User ID, the characters from the CAPTCHA, and then click **Next**.
62-
6. Follow the verification steps to reset your password
67+
5. Enter your non-administrator test users' User ID, such as *testuser*, the characters from the CAPTCHA, and then select **Next**.
68+
6. Follow the verification steps to reset your password.
6369

6470
## Clean up resources
6571

66-
It's easy to disable self-service password reset. Open your Azure AD tenant and go to **Properties** > **Password Reset**, and then select **None** under **Self Service Password Reset Enabled**.
72+
To disable self-service password reset, search for and select **Azure Active Directory** in the Azure portal. Select **Properties** > **Password Reset**, and then choose **None** under **Self Service Password Reset Enabled**. When ready, select **Save**.
6773

6874
## Next steps
6975

70-
In this quickstart, you’ve learned how to quickly configure self-service password reset for your cloud-only users. To find out how to complete a more detailed roll out, continue to our roll out guide.
76+
In this quickstart, you learned how to configure self-service password reset for your cloud-only users. To find out how to complete a more detailed roll out, continue to our roll out guide.
7177

7278
> [!div class="nextstepaction"]
7379
> [Roll out self-service password reset](howto-sspr-deployment.md)
7480
7581
[Authentication]: ./media/quickstart-sspr/sspr-authentication-methods.png "Azure AD authentication methods available and the quantity required"
82+
83+
<!-- INTERNAL LINKS -->
84+
[register-sspr]: ../user-help/active-directory-passwords-reset-register.md
85+
[reset-password]: ../user-help/active-directory-passwords-update-your-own-password.md

articles/active-directory/fundamentals/active-directory-users-assign-role-azure-portal.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,17 +27,24 @@ A common way to assign Azure AD roles to a user is on the **Directory role** pag
2727
You can also assign roles using Privileged Identity Management (PIM). For more detailed information about how to use PIM, see [Privileged Identity Management](https://docs.microsoft.com/azure/active-directory/privileged-identity-management).
2828

2929
### To assign a role to a user
30-
1. Sign in to the [Azure portal](https://portal.azure.com/) using a Global administrator account for the directory.
30+
1. Go to the [Azure portal](https://portal.azure.com/) and log in using a Global administrator account for the directory.
3131

32-
2. Select **Azure Active Directory**, select **Users**, and then search for and select the user getting the role assignment. For example, _Alain Charon_.
32+
2. Search for and select **Azure Active Directory**.
33+
34+
![Azure portal search for Azure Active Directory](media/active-directory-users-assign-role-azure-portal/search-azure-active-directory.png)
35+
36+
37+
3. Select **Users**.
38+
39+
4. Search for and select the user getting the role assignment. For example, _Alain Charon_.
3340

3441
![All users page - select the user](media/active-directory-users-assign-role-azure-portal/directory-role-select-user.png)
3542

36-
3. On the **Alain Charon - Profile** page, select **Assigned roles**.
43+
5. On the **Alain Charon - Profile** page, select **Assigned roles**.
3744

3845
The **Alain Charon - Directory role** page appears.
3946

40-
4. Select **Add assignment**, select the role to assign to Alain (for example, _Application administrator_), and then choose **Select**.
47+
6. Select **Add assignment**, select the role to assign to Alain (for example, _Application administrator_), and then choose **Select**.
4148

4249
![Assigned roles page - showing the selected role](media/active-directory-users-assign-role-azure-portal/directory-role-select-role.png)
4350

Loading
Loading

articles/active-directory/governance/access-reviews-overview.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,11 +61,13 @@ Depending on what you want to review, you will create your access review in Azur
6161

6262
To onboard access reviews, follow these steps.
6363

64-
1. As a Global administrator or User administrator, sign in to the [Azure portal](https://portal.azure.com) where you want to use access reviews.
64+
1. Go to the [Azure portal](https://portal.azure.com) to manage access reviews and sign in as a Global administrator or User administrator.
6565

66-
1. In the left navigation, click **Azure Active Directory**.
66+
1. Search for and select **Azure Active Directory**.
6767

68-
1. In the left menu, click **Identity Governance**.
68+
![Azure portal search for Azure Active Directory](media/access-reviews-overview/search-azure-active-directory.png)
69+
70+
1. Select **Identity Governance**.
6971

7072
1. Click **Access reviews**.
7173

-58.5 KB
Loading
39.6 KB
Loading

0 commit comments

Comments
 (0)