Skip to content

Commit 2fb6a20

Browse files
author
RoseHJM
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mdb-quotas
2 parents 466ccf0 + 9d33b25 commit 2fb6a20

File tree

48 files changed

+565
-280
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+565
-280
lines changed

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Next, if one or more of the users that will need access to the application do no
4343
The following sections outline how to create extension attributes for a tenant with cloud only users, and for a tenant with Active Directory users.
4444

4545
## Create an extension attribute in a tenant with cloud only users
46-
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you do not have any users who need that attribute and originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
46+
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you have any users who need that attribute and do not originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
4747

4848
Once schema extensions are created, these extension attributes are automatically discovered when you next visit the provisioning page in the Azure portal, in most cases.
4949

@@ -82,7 +82,7 @@ Content-type: application/json
8282
"extension_inputAppId_extensionName": "extensionValue"
8383
}
8484
```
85-
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get).
85+
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get). Note that the Graph v1.0 does not by default return any of a user's directory extension attributes, unless the attributes are specified in the request as one of the properties to return.
8686

8787
```json
8888
GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_inputAppId_extensionName

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
10-
ms.date: 08/22/2023
10+
ms.date: 08/31/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -99,7 +99,7 @@ This setting allows configuration of lifetime for token issued by Azure Active D
9999

100100
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants. You can start by looking at the sign-in logs to understand which session lifetime policies were applied during sign-in.
101101

102-
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-in-log-activity-details.md#authentication-details).
102+
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see the [Learn about the sign-in log activity details](../reports-monitoring/concept-sign-in-log-activity-details.md) article.
103103

104104
![Screenshot of authentication details.](./media/concepts-azure-multi-factor-authentication-prompts-session-lifetime/details.png)
105105

articles/active-directory/multi-tenant-organizations/multi-tenant-organization-configure-graph.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.custom: it-pro
2323
2424
This article describes the key steps to configure a multi-tenant organization using the Microsoft Graph API. This article uses an example owner tenant named *Cairo* and two member tenants named *Berlin* and *Athens*.
2525

26-
If you instead want to use the Microsoft 365 admin center to configure a multi-tenant organization, see [Set up a multi-tenant org in Microsoft 365 (Preview)](/microsoft-365/enterprise/set-up-multi-tenant-org) and [Join or leave a multi-tenant organization in Microsoft 365 (Preview)](/microsoft-365/enterprise/join-leave-multi-tenant-org).
26+
If you instead want to use the Microsoft 365 admin center to configure a multi-tenant organization, see [Set up a multi-tenant org in Microsoft 365 (Preview)](/microsoft-365/enterprise/set-up-multi-tenant-org) and [Join or leave a multi-tenant organization in Microsoft 365 (Preview)](/microsoft-365/enterprise/join-leave-multi-tenant-org). To learn how to configure Microsoft Teams for your multi-tenant organization, see [The new Microsoft Teams desktop client](/microsoftteams/new-teams-desktop-admin).
2727

2828
## Prerequisites
2929

@@ -464,4 +464,5 @@ You delete a multi-tenant organization by removing all tenants. The process for
464464
465465
- [Set up a multi-tenant org in Microsoft 365 (Preview)](/microsoft-365/enterprise/set-up-multi-tenant-org)
466466
- [Synchronize users in multi-tenant organizations in Microsoft 365 (Preview)](/microsoft-365/enterprise/sync-users-multi-tenant-orgs)
467+
- [The new Microsoft Teams desktop client](/microsoftteams/new-teams-desktop-admin)
467468
- [Configure multi-tenant organization templates using the Microsoft Graph API (Preview)](./multi-tenant-organization-configure-templates.md)

articles/active-directory/reports-monitoring/concept-sign-in-log-activity-details.md

Lines changed: 54 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 08/22/2023
11+
ms.date: 08/31/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
---
@@ -22,7 +22,7 @@ Azure AD logs all sign-ins into an Azure tenant for compliance purposes. As an I
2222

2323
This article explains the values on the Basic info tab of the sign-ins log.
2424

25-
## Basic info tab
25+
## [Basic info](#tab/basic-info)
2626

2727
The Basic info tab contains most of the details that are also displayed in the table. You can launch the Sign-in Diagnostic from the Basic info tab. For more information, see [How to use the Sign-in Diagnostic](howto-use-sign-in-diagnostics.md).
2828

@@ -32,11 +32,11 @@ If a sign-in failed, you can get more information about the reason in the Basic
3232

3333
![Screenshot of the sign-in error code on the basics tab.](media/concept-sign-in-log-activity-details/sign-in-error-code.png)
3434

35-
## Location and Device info
35+
## [Location and Device](#tab/location-and-device)
3636

3737
The **Location** and **Device info** tabs display general information about the location and IP address of the user. The Device info tab provides details on the browser and operating system used to sign in. This tab also provides details on if the device is compliant, managed, or hybrid Azure AD joined.
3838

39-
## Authentication details
39+
## [Authentication details](#tab/authentication-details)
4040

4141
The **Authentication Details** tab in the details of a sign-in log provides the following information for each authentication attempt:
4242

@@ -62,77 +62,78 @@ When analyzing authentication details, take note of the following details:
6262
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
6363
- If Conditional Access policies for authentication or session lifetime are applied, they're listed above the sign-in attempts. If you don't see either of these, those policies aren't currently applied. For more information, see [Conditional Access session controls](../conditional-access/concept-conditional-access-session.md).
6464

65+
---
6566

6667
## Unique identifiers
6768

6869
In Azure AD, a resource access has three relevant components:
6970

70-
- **Who** – The identity (User) doing the sign-in.
71-
- **How** – The client (Application) used for the access.
72-
- **What** – The target (Resource) accessed by the identity.
73-
74-
Each component has an associated unique identifier (ID).
75-
76-
### Tenant
77-
78-
The sign-in log tracks two tenant identifiers:
79-
80-
- **Home tenant** – The tenant that owns the user identity.
81-
- **Resource tenant** – The tenant that owns the (target) resource.
82-
83-
These identifiers are relevant in cross-tenant scenarios. For example, to find out how users outside your tenant are accessing your resources, select all entries where the home tenant doesn’t match the resource tenant.
84-
For the home tenant, Azure AD tracks the ID and the name.
85-
86-
### Request ID
87-
88-
The request ID is an identifier that corresponds to an issued token. If you're looking for sign-ins with a specific token, you need to extract the request ID from the token, first.
89-
90-
91-
### Correlation ID
92-
93-
The correlation ID groups sign-ins from the same sign-in session. The identifier was implemented for convenience. Its accuracy isn't guaranteed because the value is based on parameters passed by a client.
71+
- **Who:** The identity (User) doing the sign-in.
72+
- **How:** The client (Application) used for the access.
73+
- **What:** The target (Resource) accessed by the identity.
9474

95-
### Sign-in
75+
Each component has an associated unique identifier (ID).:
9676

97-
The sign-in identifier is a string the user provides to Azure AD to identify itself when attempting to sign-in. It's usually a user principal name (UPN), but can be another identifier such as a phone number.
77+
- **Authentication requirement:** Shows the highest level of authentication needed through all the sign-in steps for the sign-in to succeed.
78+
- Graph API supports `$filter` (`eq` and `startsWith` operators only).
9879

99-
### Authentication requirement
80+
- **Conditional Access evaluation:** Shows whether continuous access evaluation (CAE) was applied to the sign-in event.
81+
- There are multiple sign-in requests for each authentication, which can appear on either the interactive or non-interactive tabs.
82+
- CAE is only displayed as true for one of the requests, and it can appear on the interactive tab or non-interactive tab.
83+
- For more information, see [Monitor and troubleshoot sign-ins with continuous access evaluation in Azure AD](../conditional-access/howto-continuous-access-evaluation-troubleshoot.md).
10084

101-
This attribute shows the highest level of authentication needed through all the sign-in steps for the sign-in to succeed. Graph API supports `$filter` (`eq` and `startsWith` operators only).
85+
- **Correlation ID:** The correlation ID groups sign-ins from the same sign-in session. The value is based on parameters passed by a client, so may Azure AD cannot guarantee its accuracy.
10286

103-
### Sign-in event types
87+
- **Cross-tenant access type:** Describes the type of cross-tenant access used by the actor to access the resource. Possible values are:
88+
- `none` - A sign-in event that didn't cross an Azure AD tenant's boundaries.
89+
- `b2bCollaboration`- A cross tenant sign-in performed by a guest user using B2B Collaboration.
90+
- `b2bDirectConnect` - A cross tenant sign-in performed by a B2B.
91+
- `microsoftSupport`- A cross tenant sign-in performed by a Microsoft support agent in a Microsoft customer tenant.
92+
- `serviceProvider` - A cross-tenant sign-in performed by a Cloud Service Provider (CSP) or similar admin on behalf of that CSP's customer in a tenant
93+
- `unknownFutureValue` - A sentinel value used by MS Graph to help clients handle changes in enum lists. For more information, see [Best practices for working with Microsoft Graph](/graph/best-practices-concept).
94+
- If the sign-in didn't the pass the boundaries of a tenant, the value is `none`.
10495

105-
Indicates the category of the sign in the event represents. For user sign-ins, the category can be `interactiveUser` or `nonInteractiveUser` and corresponds to the value for the **isInteractive** property on the sign-in resource. For managed identity sign-ins, the category is `managedIdentity`. For service principal sign-ins, the category is **servicePrincipal**. The Azure portal doesn't show this value, but the sign-in event is placed in the tab that matches its sign-in event type. Possible values are:
96+
- **Request ID:** An identifier that corresponds to an issued token. If you're looking for sign-ins with a specific token, you need to extract the request ID from the token, first.
10697

107-
- `interactiveUser`
108-
- `nonInteractiveUser`
109-
- `servicePrincipal`
110-
- `managedIdentity`
111-
- `unknownFutureValue`
98+
- **Sign-in:** String the user provides to Azure AD to identify itself when attempting to sign-in. It's usually a user principal name (UPN), but can be another identifier such as a phone number.
11299

113-
The Microsoft Graph API, supports: `$filter` (`eq` operator only)
100+
- **Sign-in event types:** Indicates the category of the sign-in the event represents.
101+
- The user sign-ins category can be `interactiveUser` or `nonInteractiveUser` and corresponds to the value for the **isInteractive** property on the sign-in resource.
102+
- The managed identity category is `managedIdentity`.
103+
- The service principal category is **servicePrincipal**.
104+
- The Azure portal doesn't show this value, but the sign-in event is placed in the tab that matches its sign-in event type. Possible values are:
105+
- `interactiveUser`
106+
- `nonInteractiveUser`
107+
- `servicePrincipal`
108+
- `managedIdentity`
109+
- `unknownFutureValue`
110+
- The Microsoft Graph API, supports: `$filter` (`eq` operator only).
114111

115-
### User type
112+
- **Tenant:** The sign-in log tracks two tenant identifiers:
113+
- **Home tenant** – The tenant that owns the user identity. Azure AD tracks the ID and name.
114+
- **Resource tenant** – The tenant that owns the (target) resource.
115+
- These identifiers are relevant in cross-tenant scenarios.
116+
- For example, to find out how users outside your tenant are accessing your resources, select all entries where the home tenant doesn’t match the resource tenant.
117+
118+
- **User type:** Type of a user.
119+
- Examples include `member`, `guest`, or `external`.
116120

117-
The type of a user. Examples include `member`, `guest`, or `external`.
118121

119122

120-
### Cross-tenant access type
123+
## Considerations for sign-in logs
121124

122-
This attribute describes the type of cross-tenant access used by the actor to access the resource. Possible values are:
125+
The following scenarios are important to consider when you're reviewing sign-in logs.
123126

124-
- `none` - A sign-in event that didn't cross an Azure AD tenant's boundaries.
125-
- `b2bCollaboration`- A cross tenant sign-in performed by a guest user using B2B Collaboration.
126-
- `b2bDirectConnect` - A cross tenant sign-in performed by a B2B.
127-
- `microsoftSupport`- A cross tenant sign-in performed by a Microsoft support agent in a Microsoft customer tenant.
128-
- `serviceProvider` - A cross-tenant sign-in performed by a Cloud Service Provider (CSP) or similar admin on behalf of that CSP's customer in a tenant
129-
- `unknownFutureValue` - A sentinel value used by MS Graph to help clients handle changes in enum lists. For more information, see [Best practices for working with Microsoft Graph](/graph/best-practices-concept).
127+
- **IP address and location:** There's no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.
130128

131-
If the sign-in didn't the pass the boundaries of a tenant, the value is `none`.
129+
- **Conditional Access:**
130+
- *Not applied:* No policy applied to the user and application during sign-in.
131+
- *Success:* One or more Conditional Access policies applied to or were evaluated for the user and application (but not necessarily the other conditions) during sign-in. Even though a Conditional Access policy might not apply, if it was evaluated, the Conditional Access status shows *Success*.
132+
- *Failure:* The sign-in satisfied the user and application condition of at least one Conditional Access policy and grant controls are either not satisfied or set to block access.
132133

133-
### Conditional Access evaluation
134+
- **Home tenant name:** Due to privacy commitments, Azure AD doesn't populate the home tenant name field during cross-tenant scenarios.
134135

135-
This value shows whether continuous access evaluation (CAE) was applied to the sign-in event. There are multiple sign-in requests for each authentication. Some are shown on the interactive tab, while others are shown on the non-interactive tab. CAE is only displayed as true for one of the requests, and it can be on the interactive tab or non-interactive tab. For more information, see [Monitor and troubleshoot sign-ins with continuous access evaluation in Azure AD](../conditional-access/howto-continuous-access-evaluation-troubleshoot.md).
136+
- **Multifactor authentication:** When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
136137

137138
## Next steps
138139

0 commit comments

Comments
 (0)