You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Next, if one or more of the users that will need access to the application do no
43
43
The following sections outline how to create extension attributes for a tenant with cloud only users, and for a tenant with Active Directory users.
44
44
45
45
## Create an extension attribute in a tenant with cloud only users
46
-
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you do not have any users who need that attribute and originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
46
+
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you have any users who need that attribute and do not originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
47
47
48
48
Once schema extensions are created, these extension attributes are automatically discovered when you next visit the provisioning page in the Azure portal, in most cases.
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get).
85
+
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get). Note that the Graph v1.0 does not by default return any of a user's directory extension attributes, unless the attributes are specified in the request as one of the properties to return.
86
86
87
87
```json
88
88
GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_inputAppId_extensionName
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.custom: has-azure-ad-ps-ref
9
9
ms.topic: conceptual
10
-
ms.date: 08/22/2023
10
+
ms.date: 08/31/2023
11
11
12
12
ms.author: justinha
13
13
author: justinha
@@ -99,7 +99,7 @@ This setting allows configuration of lifetime for token issued by Azure Active D
99
99
100
100
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants. You can start by looking at the sign-in logs to understand which session lifetime policies were applied during sign-in.
101
101
102
-
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-in-log-activity-details.md#authentication-details).
102
+
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see the [Learn about the sign-in log activity details](../reports-monitoring/concept-sign-in-log-activity-details.md) article.
103
103
104
104

Copy file name to clipboardExpand all lines: articles/active-directory/multi-tenant-organizations/multi-tenant-organization-configure-graph.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ ms.custom: it-pro
23
23
24
24
This article describes the key steps to configure a multi-tenant organization using the Microsoft Graph API. This article uses an example owner tenant named *Cairo* and two member tenants named *Berlin* and *Athens*.
25
25
26
-
If you instead want to use the Microsoft 365 admin center to configure a multi-tenant organization, see [Set up a multi-tenant org in Microsoft 365 (Preview)](/microsoft-365/enterprise/set-up-multi-tenant-org) and [Join or leave a multi-tenant organization in Microsoft 365 (Preview)](/microsoft-365/enterprise/join-leave-multi-tenant-org).
26
+
If you instead want to use the Microsoft 365 admin center to configure a multi-tenant organization, see [Set up a multi-tenant org in Microsoft 365 (Preview)](/microsoft-365/enterprise/set-up-multi-tenant-org) and [Join or leave a multi-tenant organization in Microsoft 365 (Preview)](/microsoft-365/enterprise/join-leave-multi-tenant-org). To learn how to configure Microsoft Teams for your multi-tenant organization, see [The new Microsoft Teams desktop client](/microsoftteams/new-teams-desktop-admin).
27
27
28
28
## Prerequisites
29
29
@@ -464,4 +464,5 @@ You delete a multi-tenant organization by removing all tenants. The process for
464
464
465
465
- [Set up a multi-tenant org in Microsoft 365 (Preview)](/microsoft-365/enterprise/set-up-multi-tenant-org)
466
466
- [Synchronize users in multi-tenant organizations in Microsoft 365 (Preview)](/microsoft-365/enterprise/sync-users-multi-tenant-orgs)
467
+
- [The new Microsoft Teams desktop client](/microsoftteams/new-teams-desktop-admin)
467
468
- [Configure multi-tenant organization templates using the Microsoft Graph API (Preview)](./multi-tenant-organization-configure-templates.md)
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-sign-in-log-activity-details.md
+54-53Lines changed: 54 additions & 53 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 08/22/2023
11
+
ms.date: 08/31/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: besiler
14
14
---
@@ -22,7 +22,7 @@ Azure AD logs all sign-ins into an Azure tenant for compliance purposes. As an I
22
22
23
23
This article explains the values on the Basic info tab of the sign-ins log.
24
24
25
-
## Basic infotab
25
+
## [Basic info](#tab/basic-info)
26
26
27
27
The Basic info tab contains most of the details that are also displayed in the table. You can launch the Sign-in Diagnostic from the Basic info tab. For more information, see [How to use the Sign-in Diagnostic](howto-use-sign-in-diagnostics.md).
28
28
@@ -32,11 +32,11 @@ If a sign-in failed, you can get more information about the reason in the Basic
32
32
33
33

34
34
35
-
## Location and Device info
35
+
## [Location and Device](#tab/location-and-device)
36
36
37
37
The **Location** and **Device info** tabs display general information about the location and IP address of the user. The Device info tab provides details on the browser and operating system used to sign in. This tab also provides details on if the device is compliant, managed, or hybrid Azure AD joined.
The **Authentication Details** tab in the details of a sign-in log provides the following information for each authentication attempt:
42
42
@@ -62,77 +62,78 @@ When analyzing authentication details, take note of the following details:
62
62
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
63
63
- If Conditional Access policies for authentication or session lifetime are applied, they're listed above the sign-in attempts. If you don't see either of these, those policies aren't currently applied. For more information, see [Conditional Access session controls](../conditional-access/concept-conditional-access-session.md).
64
64
65
+
---
65
66
66
67
## Unique identifiers
67
68
68
69
In Azure AD, a resource access has three relevant components:
69
70
70
-
-**Who** – The identity (User) doing the sign-in.
71
-
-**How** – The client (Application) used for the access.
72
-
-**What** – The target (Resource) accessed by the identity.
73
-
74
-
Each component has an associated unique identifier (ID).
75
-
76
-
### Tenant
77
-
78
-
The sign-in log tracks two tenant identifiers:
79
-
80
-
-**Home tenant** – The tenant that owns the user identity.
81
-
-**Resource tenant** – The tenant that owns the (target) resource.
82
-
83
-
These identifiers are relevant in cross-tenant scenarios. For example, to find out how users outside your tenant are accessing your resources, select all entries where the home tenant doesn’t match the resource tenant.
84
-
For the home tenant, Azure AD tracks the ID and the name.
85
-
86
-
### Request ID
87
-
88
-
The request ID is an identifier that corresponds to an issued token. If you're looking for sign-ins with a specific token, you need to extract the request ID from the token, first.
89
-
90
-
91
-
### Correlation ID
92
-
93
-
The correlation ID groups sign-ins from the same sign-in session. The identifier was implemented for convenience. Its accuracy isn't guaranteed because the value is based on parameters passed by a client.
71
+
-**Who:** The identity (User) doing the sign-in.
72
+
-**How:** The client (Application) used for the access.
73
+
-**What:** The target (Resource) accessed by the identity.
94
74
95
-
### Sign-in
75
+
Each component has an associated unique identifier (ID).:
96
76
97
-
The sign-in identifier is a string the user provides to Azure AD to identify itself when attempting to sign-in. It's usually a user principal name (UPN), but can be another identifier such as a phone number.
77
+
-**Authentication requirement:** Shows the highest level of authentication needed through all the sign-in steps for the sign-in to succeed.
78
+
- Graph API supports `$filter` (`eq` and `startsWith` operators only).
98
79
99
-
### Authentication requirement
80
+
-**Conditional Access evaluation:** Shows whether continuous access evaluation (CAE) was applied to the sign-in event.
81
+
- There are multiple sign-in requests for each authentication, which can appear on either the interactive or non-interactive tabs.
82
+
- CAE is only displayed as true for one of the requests, and it can appear on the interactive tab or non-interactive tab.
83
+
- For more information, see [Monitor and troubleshoot sign-ins with continuous access evaluation in Azure AD](../conditional-access/howto-continuous-access-evaluation-troubleshoot.md).
100
84
101
-
This attribute shows the highest level of authentication needed through all the sign-in steps for the sign-in to succeed. Graph API supports `$filter` (`eq` and `startsWith` operators only).
85
+
-**Correlation ID:** The correlation ID groups sign-ins from the same sign-in session. The value is based on parameters passed by a client, so may Azure AD cannot guarantee its accuracy.
102
86
103
-
### Sign-in event types
87
+
-**Cross-tenant access type:** Describes the type of cross-tenant access used by the actor to access the resource. Possible values are:
88
+
-`none` - A sign-in event that didn't cross an Azure AD tenant's boundaries.
89
+
-`b2bCollaboration`- A cross tenant sign-in performed by a guest user using B2B Collaboration.
90
+
-`b2bDirectConnect` - A cross tenant sign-in performed by a B2B.
91
+
-`microsoftSupport`- A cross tenant sign-in performed by a Microsoft support agent in a Microsoft customer tenant.
92
+
-`serviceProvider` - A cross-tenant sign-in performed by a Cloud Service Provider (CSP) or similar admin on behalf of that CSP's customer in a tenant
93
+
-`unknownFutureValue` - A sentinel value used by MS Graph to help clients handle changes in enum lists. For more information, see [Best practices for working with Microsoft Graph](/graph/best-practices-concept).
94
+
- If the sign-in didn't the pass the boundaries of a tenant, the value is `none`.
104
95
105
-
Indicates the category of the sign in the event represents. For user sign-ins, the category can be `interactiveUser` or `nonInteractiveUser` and corresponds to the value for the **isInteractive** property on the sign-in resource. For managed identity sign-ins, the category is `managedIdentity`. For service principal sign-ins, the category is **servicePrincipal**. The Azure portal doesn't show this value, but the sign-in event is placed in the tab that matches its sign-in event type. Possible values are:
96
+
-**Request ID:** An identifier that corresponds to an issued token. If you're looking for sign-ins with a specific token, you need to extract the request ID from the token, first.
106
97
107
-
-`interactiveUser`
108
-
-`nonInteractiveUser`
109
-
-`servicePrincipal`
110
-
-`managedIdentity`
111
-
-`unknownFutureValue`
98
+
-**Sign-in:** String the user provides to Azure AD to identify itself when attempting to sign-in. It's usually a user principal name (UPN), but can be another identifier such as a phone number.
112
99
113
-
The Microsoft Graph API, supports: `$filter` (`eq` operator only)
100
+
-**Sign-in event types:** Indicates the category of the sign-in the event represents.
101
+
- The user sign-ins category can be `interactiveUser` or `nonInteractiveUser` and corresponds to the value for the **isInteractive** property on the sign-in resource.
102
+
- The managed identity category is `managedIdentity`.
103
+
- The service principal category is **servicePrincipal**.
104
+
- The Azure portal doesn't show this value, but the sign-in event is placed in the tab that matches its sign-in event type. Possible values are:
105
+
-`interactiveUser`
106
+
-`nonInteractiveUser`
107
+
-`servicePrincipal`
108
+
-`managedIdentity`
109
+
-`unknownFutureValue`
110
+
- The Microsoft Graph API, supports: `$filter` (`eq` operator only).
114
111
115
-
### User type
112
+
-**Tenant:** The sign-in log tracks two tenant identifiers:
113
+
-**Home tenant** – The tenant that owns the user identity. Azure AD tracks the ID and name.
114
+
-**Resource tenant** – The tenant that owns the (target) resource.
115
+
- These identifiers are relevant in cross-tenant scenarios.
116
+
- For example, to find out how users outside your tenant are accessing your resources, select all entries where the home tenant doesn’t match the resource tenant.
117
+
118
+
-**User type:** Type of a user.
119
+
- Examples include `member`, `guest`, or `external`.
116
120
117
-
The type of a user. Examples include `member`, `guest`, or `external`.
118
121
119
122
120
-
### Cross-tenant access type
123
+
##Considerations for sign-in logs
121
124
122
-
This attribute describes the type of cross-tenant access used by the actor to access the resource. Possible values are:
125
+
The following scenarios are important to consider when you're reviewing sign-in logs.
123
126
124
-
-`none` - A sign-in event that didn't cross an Azure AD tenant's boundaries.
125
-
-`b2bCollaboration`- A cross tenant sign-in performed by a guest user using B2B Collaboration.
126
-
-`b2bDirectConnect` - A cross tenant sign-in performed by a B2B.
127
-
-`microsoftSupport`- A cross tenant sign-in performed by a Microsoft support agent in a Microsoft customer tenant.
128
-
-`serviceProvider` - A cross-tenant sign-in performed by a Cloud Service Provider (CSP) or similar admin on behalf of that CSP's customer in a tenant
129
-
-`unknownFutureValue` - A sentinel value used by MS Graph to help clients handle changes in enum lists. For more information, see [Best practices for working with Microsoft Graph](/graph/best-practices-concept).
127
+
-**IP address and location:** There's no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.
130
128
131
-
If the sign-in didn't the pass the boundaries of a tenant, the value is `none`.
129
+
-**Conditional Access:**
130
+
-*Not applied:* No policy applied to the user and application during sign-in.
131
+
-*Success:* One or more Conditional Access policies applied to or were evaluated for the user and application (but not necessarily the other conditions) during sign-in. Even though a Conditional Access policy might not apply, if it was evaluated, the Conditional Access status shows *Success*.
132
+
-*Failure:* The sign-in satisfied the user and application condition of at least one Conditional Access policy and grant controls are either not satisfied or set to block access.
132
133
133
-
### Conditional Access evaluation
134
+
-**Home tenant name:** Due to privacy commitments, Azure AD doesn't populate the home tenant name field during cross-tenant scenarios.
134
135
135
-
This value shows whether continuous access evaluation (CAE) was applied to the sign-in event. There are multiple sign-in requests for each authentication. Some are shown on the interactive tab, while others are shown on the non-interactive tab. CAE is only displayed as true for one of the requests, and it can be on the interactive tab or non-interactive tab. For more information, see [Monitor and troubleshoot sign-ins with continuous access evaluation in Azure AD](../conditional-access/howto-continuous-access-evaluation-troubleshoot.md).
136
+
-**Multifactor authentication:** When a user signs in with MFA, several separate MFA events are actually taking place. For example, if a user enters the wrong validation code or doesn't respond in time, additional MFA events are sent to reflect the latest status of the sign-in attempt. These sign-in events appear as one line item in the Azure AD sign-in logs. That same sign-in event in Azure Monitor, however, appears as multiple line items. These events all have the same `correlationId`.
0 commit comments