Skip to content

Commit 1ec44e2

Browse files
committed
PM-fine-tuning
1 parent bf27127 commit 1ec44e2

6 files changed

+61
-26
lines changed

articles/active-directory/reports-monitoring/howto-use-recommendations.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ Some recommendations may require a P2 or other license. For more information, se
4242
## How to read a recommendation
4343

4444
To view the details of a recommendation:
45+
4546
1. Sign in to Azure using the appropriate least-privilege role.
4647
1. Go to **Azure AD** > **Recommendations** and select a recommendation from the list.
4748

@@ -69,7 +70,7 @@ Each recommendation provides the same set of details that explain what the recom
6970

7071
- The **Action plan** provides step-by-step instructions to implement a recommendation. The Action plan may include links to relevant documentation or direct you to other pages in the Azure AD portal.
7172

72-
- If the impacted resource type is applications, a list of the **Impacted resources** appears at the bottom of the recommendation. The resource's name, ID, date it was first detected, and status are provided.
73+
- The **Impacted resources** table contains a list of resources identified by the recommendation. The resource's name, ID, date it was first detected, and status are provided. The resource could be an application or resource service principal, for example.
7374

7475
## How to update a recommendation
7576

@@ -105,7 +106,7 @@ Continue to monitor the recommendations in your tenant for changes.
105106

106107
### How to use Microsoft Graph with Azure Active Directory recommendations
107108

108-
Azure Active Directory recommendations can be viewed and managed using Microsoft Graph on the `/beta` endpoint. You can view recommendations along with their impacted resources, mark a recommendation as completed by a user, postpone a recommendation for later, and more.
109+
Azure Active Directory recommendations can be viewed and managed using Microsoft Graph on the `/beta` endpoint. You can view recommendations along with their impacted resources, postpone a recommendation for later, and more.
109110

110111
To get started, follow these instructions to work with recommendations using Microsoft Graph in Graph Explorer. The example uses the "Migrate apps from Active Directory Federated Services (ADFS) to Azure AD" recommendation.
111112

articles/active-directory/reports-monitoring/overview-recommendations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -53,11 +53,11 @@ The recommendations listed in the following table are currently available in pub
5353
| [Convert per-user MFA to Conditional Access MFA](recommendation-turn-off-per-user-mfa.md) | Users | All licenses | Generally available |
5454
| [Migrate applications from AD FS to Azure AD](recommendation-migrate-apps-from-adfs-to-azure-ad.md) | Applications | All licenses | Generally available |
5555
| [Migrate to Microsoft Authenticator](recommendation-migrate-to-authenticator.md) | Users | All licenses | Preview |
56-
| [Minimize MFA prompts from known devices](recommendation-migrate-apps-from-adfs-to-azure-ad.md) | Users | All licenses | Generally available |
57-
| [Remove unused applications](recommendation-remove-unused-apps.md) | Applications | P2 | Preview |
58-
| [Remove unused credentials from applications](recommendation-remove-unused-credential-from-apps.md) | Applications | P2 | Preview |
59-
| [Renew expiring application credentials](recommendation-renew-expiring-application-credential.md) | Applications | P2 | Preview |
60-
| [Renew expiring service principal credentials](recommendation-renew-expiring-service-principal-credential.md) | Applications | P2 | Preview |
56+
| [Minimize MFA prompts from known devices](recommendation-mfa-from-known-devices.md) | Users | All licenses | Generally available |
57+
| [Remove unused applications](recommendation-remove-unused-apps.md) | Applications | Azure AD Premium P2 | Preview |
58+
| [Remove unused credentials from applications](recommendation-remove-unused-credential-from-apps.md) | Applications | Azure AD Premium P2 | Preview |
59+
| [Renew expiring application credentials](recommendation-renew-expiring-application-credential.md) | Applications | Azure AD Premium P2 | Preview |
60+
| [Renew expiring service principal credentials](recommendation-renew-expiring-service-principal-credential.md) | Applications | Azure AD Premium P2 | Preview |
6161

6262
Azure AD only displays the recommendations that apply to your tenant, so you may not see all supported recommendations listed.
6363

articles/active-directory/reports-monitoring/recommendation-remove-unused-apps.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article covers the recommendation to investigate unused applications. This
2020

2121
## Description
2222

23-
This recommendation shows up if your tenant has applications that haven't been used in more than 30 days, so haven't been issued any tokens. Applications or service principals that were added but never used will show up as unused apps, which will also trigger this recommendation.
23+
This recommendation shows up if your tenant has applications that haven't been used in more than 30 days, so haven't been issued any tokens. Applications or service principals that were added but never used show up as unused apps, which will also trigger this recommendation.
2424

2525
## Value
2626

@@ -35,22 +35,25 @@ Applications that the recommendation identified appear in the list of **Impacted
3535

3636
![Screenshot of the Azure AD app registration area, with the App registrations menu item highlighted.](media/recommendation-remove-unused-apps/app-registrations-list.png)
3737

38-
1. We suggest you take appropriate steps to ensure the application is not used in longer intervals of more than 30 days. If so, we recommend updating the frequency of access such that the application’s last used time is within 30 days from its last access date.
38+
1. Determine if the identified application is needed.
39+
- If the application is no longer needed, remove it from your tenant.
40+
- If the application is needed, we suggest you take appropriate steps to ensure the application isn't used in intervals of more than 30 days.
41+
- We recommend updating the frequency of access such that the application’s last used time is within 30 days from its last access date.
3942

4043
## Known limitations
4144

4245
Take note of the following common scenarios or known limitations of the "Remove unused applications" recommendation.
4346

44-
* The time frame for application usage that triggers this recommendation cannot be customized.
47+
* The time frame for application usage that triggers this recommendation can't be customized.
4548

46-
* The following apps will not show up as a part of this recommendation, but are currently under review for future enhancements:
49+
* The following apps won't show up as a part of this recommendation, but are currently under review for future enhancements:
4750
- Microsoft-owned applications
4851
- Password single sign-on
4952
- Linked single sign-on
5053
- App proxy
5154
- Add-in apps
5255

53-
* This recommendation currently surfaces applications that were created within the past 30 days *and* shows as unused. Updates to the recommendation to filter out newly-created apps so that they can complete a full cycle are in progress.
56+
* This recommendation currently surfaces applications that were created within the past 30 days *and* shows as unused. Updates to the recommendation to filter out recently created apps so that they can complete a full cycle are in progress.
5457

5558
## Next steps
5659

articles/active-directory/reports-monitoring/recommendation-remove-unused-credential-from-apps.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,11 +47,20 @@ Applications that the recommendation identified appear in the list of **Impacted
4747

4848
![Screenshot of the Certificates & secrets area of app registrations.](media/recommendation-remove-unused-credential-from-apps/app-certificates-secrets.png)
4949

50-
To remove a credential from a service principal resource, use the MS Graph Service Principal API service action `removePassword`.
51-
50+
### Use Microsoft Graph to remove an unused credential
51+
52+
To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
53+
54+
- Remove a **credential** from a service principal resource:
55+
- Use the Microsoft Graph Service Principal API service action `removePassword`
56+
- [servicePrincipal: removePassword MS Graph API documentation](/graph/api/serviceprincipal-removepassword?view=graph-rest-beta&preserve-view=true)
57+
- Remove a **key credential** from a service principal resource:
58+
- Use the Microsoft Graph Service Principal API service action `removeKey`
59+
- [servicePrincipal: removeKey MS Graph API documentation](/graph/api/serviceprincipal-removekey?view=graph-rest-beta&preserve-view=true)
60+
5261
## Next steps
5362

5463
- [Review the Azure AD recommendations overview](overview-recommendations.md)
5564
- [Learn how to use Azure AD recommendations](howto-use-recommendations.md)
56-
- [Explore the Microsoft Graph API properties for recommendations](/graph/api/resources/recommendation)
65+
- [Explore the Microsoft Graph API properties for recommendations](/graph/api/resources/recommendations-api-overview)
5766
- [Learn about app and service principal objects in Azure AD](../develop/app-objects-and-service-principals.md)

articles/active-directory/reports-monitoring/recommendation-renew-expiring-application-credential.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,9 @@ Applications that the recommendation identified appear in the list of **Impacted
4646

4747
![Screenshot of the Certificates & secrets area of app registrations.](media/recommendation-renew-expiring-application-credential/app-certificates-secrets.png)
4848

49-
1. Once the certificate or secret is successfully added, update the service code to ensure it works with the new credential and has no negative customer impact. You should use Azure AD’s sign-in logs to validate that the thumbprint of the certificate matches the one that was just uploaded.
50-
1. After validating the new credential, navigate back to the Certificates and Secrets blade for the app and remove the old credential.
49+
1. Once the certificate or secret is successfully added, update the service code to ensure it works with the new credential and doesn't negatively affect customers.
50+
1. Use the Azure AD sign-in logs to validate that the thumbprint of the certificate matches the one that was recently uploaded.
51+
1. After validating the new credential, navigate back to **Azure AD** > **App registrations** > **Certificates and Secrets** for the app and remove the old credential.
5152

5253
## Known limitations
5354

articles/active-directory/reports-monitoring/recommendation-renew-expiring-service-principal-credential.md

Lines changed: 30 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article covers the recommendation to renew expiring service principal crede
2121

2222
## Description
2323

24-
An Azure Active Directory (Azure AD) service principal is the local representation of an application object in a single tenant or directory. The service principal defines who can access an application and what resources the application can access. Authentication of service principals is often completed using certificate credentials, which have a lifespan. If the credentials expire, the application will not be able to authenticate with your tenant.
24+
An Azure Active Directory (Azure AD) service principal is the local representation of an application object in a single tenant or directory. The service principal defines who can access an application and what resources the application can access. Authentication of service principals is often completed using certificate credentials, which have a lifespan. If the credentials expire, the application won't be able to authenticate with your tenant.
2525

2626
This recommendation shows up if your tenant has service principals with credentials that will expire soon.
2727

@@ -42,20 +42,41 @@ Renewing the service principal credential(s) before expiration ensures the appli
4242

4343
![Screenshot of the edit single-sign-on process.](media/recommendation-renew-expriring-service-principal-credential/recommendation-edit-sso.png)
4444

45-
1. After adding the certificate, change its properties to make the certificate active. This will make the other certificate inactive.
46-
1. Once the certificate is successfully added and activated, update the service code to ensure it works with the new credential and has no negative customer impact. You should use Azure AD’s sign-in logs to validate that the thumbprint of the certificate matches the one that was just uploaded.
47-
1. After validating the new credential, navigate back to the **Certificates and Secrets** area for the app and remove the old credential.
45+
1. After adding the certificate, change its properties to make the certificate active, which makes the other certificate inactive.
46+
1. Once the certificate is successfully added and activated, update the service code to ensure it works with the new credential and doesn't negatively affect customers.
47+
1. Use the Azure AD sign-in logs to validate that the thumbprint of the certificate matches the one that was recently uploaded.
48+
1. After validating the new credential, navigate back to the **Single sign-on** area for the app and remove the old credential.
49+
50+
### Use Microsoft Graph to renew expiring service principal credentials
51+
52+
To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
53+
54+
When renewing service principal credentials using Microsoft Graph, you need to run a query to get the password credentials on a service principal, add a new password credential, then remove the old credentials.
55+
56+
1. Run the following query in Microsoft Graph to get the password credentials on a service principal:
57+
- https://graph.microsoft.com/v1.0/servicePrincipals/{id}?$select=passwordCredentials
58+
- Replace {id} with the service principal ID.
59+
60+
1. Add a new password credential.
61+
- Use the Microsoft Graph Service Principal API service action `addPassword`
62+
- [servicePrincipal: addPassword MS Graph API documentation](/graph/api/serviceprincipal-addpassword?view=graph-rest-beta&preserve-view=true)
63+
64+
1. Remove the old/original credentials.
65+
- Use the Microsoft Graph Service Principal API service action `removePassword`
66+
- [servicePrincipal: removePassword MS Graph API documentation](/graph/api/serviceprincipal-removepassword?view=graph-rest-beta&preserve-view=true)
4867

4968
## Known limitations
5069

51-
Service principals that expire before the recommendation is completed by a user will be marked complete by the system. This recommendation identifies service principal credentials that are about to expire, so if they do expire, the recommendation doesn't distinguish between the credential expiring on its own or being addressed by the user.
70+
- This recommendation identifies service principal credentials that are about to expire, so if they do expire, the recommendation doesn't distinguish between the credential expiring on its own or being addressed by the user.
71+
72+
- Service principal credentials that expire before the recommendation is completed will be marked complete by the system.
73+
74+
- The recommendation currently doesn't display the password secret credential in service principal when you select the impacted resource from the list.
75+
5276

53-
You can see the recommendation but won't be able to see the service principal credential when you click on the impacted resource. Credentials are not displayed on the Enterprise applications area. You can use Microsoft Graph to pull this information programmatically.
54-
5577
## Next steps
5678

5779
- [Review the Azure AD recommendations overview](overview-recommendations.md)
5880
- [Learn how to use Azure AD recommendations](howto-use-recommendations.md)
5981
- [Explore the Microsoft Graph API properties for recommendations](/graph/api/resources/recommendation)
60-
- [Learn about securing service principals](../fundamentals/service-accounts-principal.md)
61-
82+
- [Learn about securing service principals](../fundamentals/service-accounts-principal.md)

0 commit comments

Comments
 (0)