Skip to content

Commit 171df72

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 35a4e31 + 674716b commit 171df72

File tree

332 files changed

+7021
-3287
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

332 files changed

+7021
-3287
lines changed

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 03/27/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -192,15 +192,15 @@ Migrating user data doesn't remove or alter any data in the Multi-Factor Authent
192192

193193
The MFA Server Migration utility targets a single Azure AD group for all migration activities. You can add users directly to this group, or add other groups. You can also add them in stages during the migration.
194194

195-
To begin the migration process, enter the name or GUID of the Azure AD group you want to migrate. Once complete, press Tab or click outside the window and the utility will begin searching for the appropriate group. The window will populate all users in the group. A large group can take several minutes to finish.
195+
To begin the migration process, enter the name or GUID of the Azure AD group you want to migrate. Once complete, press Tab or click outside the window to begin searching for the appropriate group. All users in the group are populated. A large group can take several minutes to finish.
196196

197197
To view attribute data for a user, highlight the user, and select **View**:
198198

199199
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/view-user.png" alt-text="Screenshot of how to view use settings.":::
200200

201-
This window displays the attributes for the selected user in both Azure AD and the on-premises MFA Server. You can use this window to view how data was written to a user after they’ve been migrated.
201+
This window displays the attributes for the selected user in both Azure AD and the on-premises MFA Server. You can use this window to view how data was written to a user after migration.
202202

203-
The settings option allows you to change the settings for the migration process:
203+
The **Settings** option allows you to change the settings for the migration process:
204204

205205
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/settings.png" alt-text="Screenshot of settings.":::
206206

@@ -209,17 +209,21 @@ The settings option allows you to change the settings for the migration process:
209209
- The migration utility tries direct matching to UPN before using the on-premises Active Directory attribute.
210210
- If no match is found, it calls a Windows API to find the Azure AD UPN and get the SID, which it uses to search the MFA Server user list.
211211
- If the Windows API doesn’t find the user or the SID isn’t found in the MFA Server, then it will use the configured Active Directory attribute to find the user in the on-premises Active Directory, and then use the SID to search the MFA Server user list.
212-
- Automatic synchronization – Starts a background service that will continually monitor any authentication method changes to users in the on-premises MFA Server, and write them to Azure AD at the specified time interval defined
212+
- Automatic synchronization – Starts a background service that will continually monitor any authentication method changes to users in the on-premises MFA Server, and write them to Azure AD at the specified time interval defined.
213+
- Synchronization server – Allows the MFA Server Migration Sync service to run on a secondary MFA Server rather than only run on the primary. To configure the Migration Sync service to run on a secondary server, the `Configure-MultiFactorAuthMigrationUtility.ps1` script must be run on the server to register a certificate with the MFA Server Migration Utility app registration. The certificate is used to authenticate to Microsoft Graph.
213214

214-
The migration process can be an automatic process, or a manual process.
215+
The migration process can be automatic or manual.
215216

216217
The manual process steps are:
217218

218219
1. To begin the migration process for a user or selection of multiple users, press and hold the Ctrl key while selecting each of the user(s) you wish to migrate.
219220
1. After you select the desired users, click **Migrate Users** > **Selected users** > **OK**.
220221
1. To migrate all users in the group, click **Migrate Users** > **All users in AAD group** > **OK**.
222+
1. You can migrate users even if they are unchanged. By default, the utility is set to **Only migrate users that have changed**. Click **Migrate all users** to re-migrate previously migrated users that are unchanged. Migrating unchanged users can be useful during testing if an administrator needs to reset a user’s Azure MFA settings and wants to re-migrate them.
221223

222-
For the automatic process, click **Automatic synchronization** in the settings dialog, and then select whether you want all users to be synced, or only members of a given Azure AD group.
224+
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/migrate-users.png" alt-text="Screenshot of Migrate users dialog.":::
225+
226+
For the automatic process, click **Automatic synchronization** in **Settings**, and then select whether you want all users to be synced, or only members of a given Azure AD group.
223227

224228
The following table lists the sync logic for the various methods.
225229

6.88 KB
Loading
8.87 KB
Loading

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,8 @@
122122
href: troubleshoot-conditional-access-what-if.md
123123
- name: Troubleshoot continuous access evaluation
124124
href: howto-continuous-access-evaluation-troubleshoot.md
125+
- name: Approved client app migration
126+
href: migrate-approved-client-app.md
125127
- name: Custom controls
126128
href: controls.md
127129
- name: Classic policies

articles/active-directory/conditional-access/howto-policy-approved-app-or-app-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,4 +94,4 @@ After confirming your settings using [report-only mode](howto-conditional-access
9494

9595
[Conditional Access common policies](concept-conditional-access-policy-common.md)
9696

97-
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
97+
[Migrate approved client app to application protection policy in Conditional Access](migrate-approved-client-app.md)
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Migrate approved client app to application protection policy in Conditional Access
3+
description: The approved client app control is going away. Migrate to App protection policies.
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: conditional-access
8+
ms.topic: how-to
9+
ms.date: 03/28/2023
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: amycolannino
14+
ms.reviewer: jogro
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Migrate approved client app to application protection policy in Conditional Access
19+
20+
In this article, you learn how to migrate from the approved client app Conditional Access grant to the application protection policy grant. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article [App protection policies overview](/mem/intune/apps/app-protection-policy).
21+
22+
The approved client app grant is retiring in early March 2026. Organizations must transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
23+
24+
After March 2026, Microsoft will stop enforcing require approved client app control, and it will be as if this grant isn't selected. Use the following steps before March 2026 to protect your organization’s data.
25+
26+
## Edit an existing Conditional Access policy
27+
28+
Require approved client apps or app protection policy with mobile devices
29+
30+
The following steps make an existing Conditional Access policy require an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an app protection policy created in Microsoft Intune.
31+
32+
Organizations can choose to update their policies using the following steps.
33+
34+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
35+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
36+
1. Select a policy that uses the approved client app grant.
37+
1. Under **Access controls** > **Grant**, select **Grant access**.
38+
1. Select **Require approved client app** and **Require app protection policy**
39+
1. **For multiple controls** select **Require one of the selected controls**
40+
1. Confirm your settings and set **Enable policy** to **Report-only**.
41+
1. Select **Create** to create to enable your policy.
42+
43+
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
44+
45+
Repeat the previous steps on all of your policies that use the approved client app grant.
46+
47+
> [!WARNING]
48+
> Not all applications that are supported as approved applications or support application protection policies. For a list of some common client apps, see [App protection policy requirement](concept-conditional-access-grant.md#require-app-protection-policy). If your application is not listed there, contact the application developer.
49+
50+
## Create a Conditional Access policy
51+
52+
Require app protection policy with mobile devices
53+
54+
The following steps help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an [app protection policy created in Microsoft Intune](/mem/intune/apps/app-protection-policies).
55+
56+
Organizations can choose to deploy this policy using the following steps.
57+
58+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
59+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
60+
1. Select **New policy**.
61+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
62+
1. Under **Assignments**, select **Users or workload identities**.
63+
1. Under **Include**, select **All users**.
64+
1. Under **Exclude**, select **Users and groups** and exclude at least one account to prevent yourself from being locked out. If you don't exclude any accounts, you can't create the policy.
65+
1. Under **Cloud apps or actions**, select **All cloud apps**.
66+
1. Under **Conditions** > **Device platforms**, set **Configure** to **Yes**.
67+
1. Under **Include**, **Select device platforms**.
68+
1. Choose **Android** and **iOS**
69+
1. Select **Done**.
70+
1. Under **Access controls** > **Grant**, select **Grant access**.
71+
1. Select **Require approved client app** and **Require app protection policy**
72+
1. **For multiple controls** select **Require one of the selected controls**
73+
1. Confirm your settings and set **Enable policy** to **Report-only**.
74+
1. Select **Create** to create to enable your policy.
75+
76+
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
77+
78+
> [!NOTE]
79+
> If an app does not support **Require app protection policy**, end users trying to access resources from that app will be blocked.
80+
81+
## Next steps
82+
83+
For more information on application protection policies, see:
84+
85+
[App protection policies overview](/mem/intune/apps/app-protection-policy)

articles/active-directory/develop/console-quickstart-portal-nodejs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: OwenRichards1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
9-
ms.topic: portal
9+
ms.topic: conceptual
1010
ms.date: 08/22/2022
1111
ROBOTS: NOINDEX
1212
ms.author: owenrichards

articles/active-directory/develop/daemon-quickstart-portal-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: OwenRichards1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
9-
ms.topic: portal
9+
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.date: 08/22/2022
1212
ROBOTS: NOINDEX

articles/active-directory/develop/daemon-quickstart-portal-netcore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: OwenRichards1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
9-
ms.topic: portal
9+
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.date: 08/22/2022
1212
ROBOTS: NOINDEX

articles/active-directory/develop/daemon-quickstart-portal-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: OwenRichards1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
9-
ms.topic: portal
9+
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.date: 08/22/2022
1212
ROBOTS: NOINDEX

0 commit comments

Comments
 (0)