You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-mfa-licensing.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Azure AD Multi-Factor Authentication can be used, and licensed, in a few differe
31
31
| Azure AD Premium P1 | You can use [Azure AD Conditional Access](../conditional-access/howto-conditional-access-policy-all-users-mfa.md) to prompt users for multi-factor authentication during certain scenarios or events to fit your business requirements. |
32
32
| Azure AD Premium P2 | Provides the strongest security position and improved user experience. Adds [risk-based Conditional Access](../conditional-access/howto-conditional-access-policy-risk.md) to the Azure AD Premium P1 features that adapts to user's patterns and minimizes multi-factor authentication prompts. |
33
33
| All Microsoft 365 plans | Azure AD Multi-Factor Authentication can be [enabled on a per-user basis](howto-mfa-userstates.md), or enabled or disabled for all users using [security defaults](../fundamentals/concept-fundamentals-security-defaults.md). Management of Azure AD Multi-Factor Authentication is through the Microsoft 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Microsoft 365 resources with multi-factor authentication](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication). |
34
-
| Azure AD free | You can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication for all users. You don't have granular control of enabled users or scenarios, but it does provide that additional security step.<br /> Even when security defaults aren't used to enable multi-factor authentication for everyone, users assigned the *Azure AD Global Administrator* role can be configured to use multi-factor authentication. This feature of the free tier makes sure the critical administrator accounts are protected by multi-factor authentication. |
34
+
| Azure AD free | You can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication for all users but you cannot enable Multi-Factor Authentication on per-user basis. You don't have granular control of enabled users or scenarios, but it does provide that additional security step.<br /> Even when security defaults aren't used to enable multi-factor authentication for everyone, users assigned the *Azure AD Global Administrator* role can be configured to use multi-factor authentication. This feature of the free tier makes sure the critical administrator accounts are protected by multi-factor authentication. |
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md
+30-32Lines changed: 30 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: develop
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 11/13/2020
13
+
ms.date: 05/06/2021
14
14
ms.author: kkrishna
15
15
ms.reviewer: marsma, kkrishna, jmprieur
16
16
ms.custom: aaddev
@@ -33,36 +33,34 @@ You define app roles by using the [Azure portal](https://portal.azure.com). App
33
33
34
34
There are two ways to declare app roles by using the Azure portal:
35
35
36
-
*[App roles UI](#app-roles-ui--preview) | Preview
37
-
*[App manifest editor](#app-manifest-editor)
36
+
-[App roles UI](#app-roles-ui)
37
+
-[App manifest editor](#app-manifest-editor)
38
38
39
-
The number of roles you add counts toward application manifest limits enforced by Azure Active Directory. For information about these limits, see the [Manifest limits](./reference-app-manifest.md#manifest-limits) section of [Azure Active Directory app manifest reference](reference-app-manifest.md).
39
+
The number of roles you add counts toward application manifest limits enforced by Azure Active Directory. For information about these limits, see the [Manifest limits](./reference-app-manifest.md#manifest-limits) section of [Azure Active Directory app manifest reference](reference-app-manifest.md).
40
40
41
-
### App roles UI | Preview
42
-
43
-
> [!IMPORTANT]
44
-
> The app roles portal UI feature [!INCLUDE [PREVIEW BOILERPLATE](../../../includes/active-directory-develop-preview.md)]
41
+
### App roles UI
45
42
46
43
To create an app role by using the Azure portal's user interface:
47
44
48
45
1. Sign in to the <ahref="https://portal.azure.com/"target="_blank">Azure portal</a>.
49
46
1. Select the **Directory + subscription** filter in top menu, and then choose the Azure Active Directory tenant that contains the app registration to which you want to add an app role.
50
47
1. Search for and select **Azure Active Directory**.
51
48
1. Under **Manage**, select **App registrations**, and then select the application you want to define app roles in.
52
-
1. Select **App roles | Preview**, and then select **Create app role**.
49
+
1. Select **App roles**, and then select **Create app role**.
53
50
54
51
:::image type="content" source="media/howto-add-app-roles-in-azure-ad-apps/app-roles-overview-pane.png" alt-text="An app registration's app roles pane in the Azure portal":::
52
+
55
53
1. In the **Create app role** pane, enter the settings for the role. The table following the image describes each setting and their parameters.
56
54
57
-
:::image type="content" source="media/howto-add-app-roles-in-azure-ad-apps/app-roles-create-context-pane.png" alt-text="An app registration's app roles create context pane in the Azure portal":::
55
+
:::image type="content" source="media/howto-add-app-roles-in-azure-ad-apps/app-roles-create-context-pane.png" alt-text="An app registration's app roles create context pane in the Azure portal":::
58
56
59
-
| Field | Description | Example |
60
-
|-------|-------------|---------|
61
-
|**Display name**| Display name for the app role that appears in the admin consent and app assignment experiences. This value may contain spaces. |`Survey Writer`|
62
-
|**Allowed member types**| Specifies whether this app role can be assigned to users, applications, or both.<br/><br/>When available to `applications`, app roles appear as application permissions in an app registration's **Manage** section > **API permissions > Add a permission > My APIs > Choose an API > Application permissions**. |`Users/Groups`|
63
-
|**Value**| Specifies the value of the roles claim that the application should expect in the token. The value should exactly match the string referenced in the application's code. The value cannot contain spaces. |`Survey.Create`|
64
-
|**Description**| A more detailed description of the app role displayed during admin app assignment and consent experiences. |`Writers can create surveys.`|
65
-
|**Do you want to enable this app role?**| Specifies whether the app role is enabled. To delete an app role, deselect this checkbox and apply the change before attempting the delete operation. |*Checked*|
|**Display name**| Display name for the app role that appears in the admin consent and app assignment experiences. This value may contain spaces. |`Survey Writer`|
60
+
|**Allowed member types**| Specifies whether this app role can be assigned to users, applications, or both.<br/><br/>When available to `applications`, app roles appear as application permissions in an app registration's **Manage** section > **API permissions > Add a permission > My APIs > Choose an API > Application permissions**. |`Users/Groups`|
61
+
|**Value**| Specifies the value of the roles claim that the application should expect in the token. The value should exactly match the string referenced in the application's code. The value cannot contain spaces. |`Survey.Create`|
62
+
|**Description**| A more detailed description of the app role displayed during admin app assignment and consent experiences.|`Writers can create surveys.`|
63
+
|**Do you want to enable this app role?**| Specifies whether the app role is enabled. To delete an app role, deselect this checkbox and apply the change before attempting the delete operation. |_Checked_|
66
64
67
65
1. Select **Apply** to save your changes.
68
66
@@ -150,7 +148,7 @@ Confirm that the users and groups you added appear in the **Users and groups** l
150
148
151
149
Once you've added app roles in your application, you can assign an app role to a client app by using the Azure portal or programmatically by using [Microsoft Graph](/graph/api/user-post-approleassignments).
152
150
153
-
When you assign app roles to an application, you create *application permissions*. Application permissions are typically used by daemon apps or back-end services that need to authenticate and make authorized API calls as themselves, without the interaction of a user.
151
+
When you assign app roles to an application, you create _application permissions_. Application permissions are typically used by daemon apps or back-end services that need to authenticate and make authorized API calls as themselves, without the interaction of a user.
154
152
155
153
To assign app roles to an application by using the Azure portal:
156
154
@@ -168,7 +166,7 @@ The newly added roles should appear in your app registration's **API permissions
168
166
169
167
#### Grant admin consent
170
168
171
-
Because these are *application permissions*, not delegated permissions, an admin must grant consent to use the app roles assigned to the application.
169
+
Because these are _application permissions_, not delegated permissions, an admin must grant consent to use the app roles assigned to the application.
172
170
173
171
1. In the app registration's **API permissions** pane, select **Grant admin consent for \<tenant name\>**.
174
172
1. Select **Yes** when prompted to grant consent for the requested permissions.
@@ -185,11 +183,11 @@ To learn how to add authorization to your web API, see [Protected web API: Verif
185
183
186
184
Though you can use app roles or groups for authorization, key differences between them can influence which you decide to use for your scenario.
| They are specific to an application and are defined in the app registration. They move with the application. | They are not specific to an app, but to an Azure AD tenant. |
191
-
| App roles are removed when their app registration is removed. | Groups remain intact even if the app is removed. |
192
-
| Provided in the `roles` claim. | Provided in `groups` claim. |
189
+
| App roles are removed when their app registration is removed. | Groups remain intact even if the app is removed. |
190
+
| Provided in the `roles` claim. | Provided in `groups` claim. |
193
191
194
192
Developers can use app roles to control whether a user can sign in to an app or an app can obtain an access token for a web API. To extend this security control to groups, developers and admins can also assign security groups to app roles.
195
193
@@ -199,12 +197,12 @@ App roles are preferred by developers when they want to describe and control the
199
197
200
198
Learn more about app roles with the following resources.
201
199
202
-
* Code samples on GitHub
203
-
*[Add authorization using groups and group claims to an ASP.NET Core web app](https://aka.ms/groupssample)
204
-
*[Angular single-page application (SPA) calling a .NET Core web API and using app roles and security groups](https://github.com/Azure-Samples/ms-identity-javascript-angular-spa-dotnetcore-webapi-roles-groups/blob/master/README.md)
205
-
* Reference documentation
206
-
*[Azure AD app manifest](./reference-app-manifest.md)
207
-
*[Azure AD access tokens](access-tokens.md)
208
-
*[Azure AD ID tokens](id-tokens.md)
209
-
*[Provide optional claims to your app](active-directory-optional-claims.md)
210
-
* Video: [Implement authorization in your applications with Microsoft identity platform](https://www.youtube.com/watch?v=LRoc-na27l0) (1:01:15)
200
+
- Code samples on GitHub
201
+
-[Add authorization using groups and group claims to an ASP.NET Core web app](https://aka.ms/groupssample)
202
+
-[Angular single-page application (SPA) calling a .NET Core web API and using app roles and security groups](https://github.com/Azure-Samples/ms-identity-javascript-angular-spa-dotnetcore-webapi-roles-groups/blob/master/README.md)
203
+
- Reference documentation
204
+
-[Azure AD app manifest](./reference-app-manifest.md)
205
+
-[Azure AD access tokens](access-tokens.md)
206
+
-[Azure AD ID tokens](id-tokens.md)
207
+
-[Provide optional claims to your app](active-directory-optional-claims.md)
208
+
- Video: [Implement authorization in your applications with Microsoft identity platform](https://www.youtube.com/watch?v=LRoc-na27l0) (1:01:15)
If you have a large number of devices in your directory, use the timestamp filter to narrow down the number of returned devices. To get all devices with a timestamp older than specific date and store the returned data in a CSV file:
143
+
If you have a large number of devices in your directory, use the timestamp filter to narrow down the number of returned devices. To get all devices that haven't logged on in 90 days and store the returned data in a CSV file:
0 commit comments