Skip to content

Commit 34b35cf

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 27bcd32 + fb36f27 commit 34b35cf

File tree

153 files changed

+2525
-2334
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

153 files changed

+2525
-2334
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14099,6 +14099,26 @@
1409914099
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
1410014100
"redirect_document_id": ""
1410114101
},
14102+
{
14103+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-designer-custom-skill.md",
14104+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-designer-custom-skill",
14105+
"redirect_document_id": false
14106+
},
14107+
{
14108+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-custom-skill.md",
14109+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-custom-skill",
14110+
"redirect_document_id": false
14111+
},
14112+
{
14113+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-form.md",
14114+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-form",
14115+
"redirect_document_id": false
14116+
},
14117+
{
14118+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-python.md",
14119+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-python",
14120+
"redirect_document_id": false
14121+
},
1410214122
{
1410314123
"source_path_from_root": "/articles/search/search-get-started-vs-code.md",
1410414124
"redirect_url": "/previous-versions/azure/search/search-get-started-vs-code",

articles/active-directory/develop/desktop-quickstart-portal-wpf.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,7 @@ ms.author: owenrichards
1313
ms.custom: aaddev, identityplatformtop40, mode-api
1414
#Customer intent: As an application developer, I want to learn how my Windows Presentation Foundation (WPF) application can get an access token and call an API that's protected by the Microsoft identity platform.
1515
---
16-
17-
# Quickstart: Acquire a token and call the Microsoft Graph API from a Windows desktop app
16+
# Quickstart: Sign in users and call Microsoft Graph in a Windows desktop app
1817

1918
> [!div renderon="docs"]
2019
> Welcome! This probably isn't the page you were expecting. While we work on a fix, this link should take you to the right article:
@@ -24,7 +23,8 @@ ms.custom: aaddev, identityplatformtop40, mode-api
2423
> We apologize for the inconvenience and appreciate your patience while we work to get this resolved.
2524
2625
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
27-
26+
> ## Quickstart: Acquire a token and call the Microsoft Graph API from a Windows desktop application
27+
>
2828
> In this quickstart, you download and run a code sample that demonstrates how a Windows Presentation Foundation (WPF) application can sign in users and get an access token to call the Microsoft Graph API.
2929
>
3030
> See [How the sample works](#how-the-sample-works) for an illustration.

articles/active-directory/develop/msal-android-shared-devices.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 12/06/2022
12+
ms.date: 02/06/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: brandwe
1515
ms.custom: aaddev, identitypla | Azuretformtop40
@@ -96,6 +96,7 @@ These Microsoft applications support Azure AD's shared device mode:
9696
- [Microsoft Teams](/microsoftteams/platform/)
9797
- [Microsoft Managed Home Screen](/mem/intune/apps/app-configuration-managed-home-screen-app) app for Android Enterprise
9898
- [Microsoft Edge](/microsoft-edge) (in Public Preview)
99+
- [Outlook](/mem/intune/apps/app-configuration-policies-outlook) (in Public Preview)
99100
- [Microsoft Power Apps](/power-apps) (in Public Preview)
100101
- [Yammer](/yammer) (in Public Preview)
101102

articles/active-directory/fundamentals/service-accounts-governing-azure.md

Lines changed: 100 additions & 119 deletions
Large diffs are not rendered by default.
Lines changed: 44 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,13 @@
11
---
2-
title: Secure group managed service accounts | Azure Active Directory
3-
description: A guide to securing group managed service account (gMSA) computer accounts.
4-
services: active-directory
5-
author: janicericketts
2+
title: Secure group managed service accounts
3+
description: A guide to securing group managed service accounts (gMSAs)
4+
author: jricketts
65
manager: martinco
76
ms.service: active-directory
87
ms.workload: identity
98
ms.subservice: fundamentals
109
ms.topic: conceptual
11-
ms.date: 08/20/2022
10+
ms.date: 02/06/2023
1211
ms.author: jricketts
1312
ms.reviewer: ajburnle
1413
ms.custom: "it-pro, seodec18"
@@ -17,48 +16,42 @@ ms.collection: M365-identity-device-management
1716

1817
# Secure group managed service accounts
1918

20-
Group managed service accounts (gMSAs) are managed domain accounts that you use to help secure services. gMSAs can run on a single server or on a server farm, such as systems behind a network load balancing or Internet Information Services (IIS) server. After you configure your services to use a gMSA principal, password management for that account is handled by the Windows operating system.
19+
Group managed service accounts (gMSAs) are domain accounts to help secure services. gMSAs can run on one server, or in a server farm, such as systems behind a network load balancing or Internet Information Services (IIS) server. After you configure your services to use a gMSA principal, account password management is handled by the Windows operating system (OS).
2120

22-
## Benefits of using gMSAs
21+
## Benefits of gMSAs
2322

24-
gMSAs offer a single identity solution with greater security. At the same time, to help reduce administrative overhead, they:
23+
gMSAs are an identity solution with greater security that help reduce administrative overhead:
2524

26-
* **Set strong passwords**: gMSAs use 240-byte, randomly generated complex passwords. The complexity and length of gMSA passwords minimizes the likelihood of a service getting compromised by brute force or dictionary attacks.
25+
* **Set strong passwords** - 240-byte, randomly generated passwords: the complexity and length of gMSA passwords minimizes the likelihood of compromise by brute force or dictionary attacks
26+
* **Cycle passwords regularly** - password management goes to the Windows OS, which changes the password every 30 days. Service and domain administrators don't need to schedule password changes, or manage service outages.
27+
* **Support deployment to server farms** - deploy gMSAs to multiple servers to support load balanced solutions where multiple hosts run the same service
28+
* **Support simplified service principal name (SPN) management** - set up an SPN with PowerShell, when you create an account.
29+
* In addition, services that support automatic SPN registrations might do so against the gMSA, if the gMSA permissions are set correctly.
2730

28-
* **Cycle passwords regularly**: gMSAs shift password management to the Windows operating system, which changes the password every 30 days. Service and domain administrators no longer need to schedule password changes or manage service outages to help keep service accounts secure.
31+
## Using gMSAs
2932

30-
* **Support deployment to server farms**: The ability to deploy gMSAs to multiple servers allows for the support of load balanced solutions where multiple hosts run the same service.
31-
32-
* **Support simplified service principal name (SPN) management**: You can set up an SPN by using PowerShell when you create an account. In addition, services that support automatic SPN registrations might do so against the gMSA, provided that the gMSA permissions are correctly set.
33-
34-
## When to use gMSAs
35-
36-
Use gMSAs as the preferred account type for on-premises services unless a service, such as Failover Clustering, doesn't support it.
33+
Use gMSAs as the account type for on-premises services unless a service, such as failover clustering, doesn't support it.
3734

3835
> [!IMPORTANT]
39-
> You must test your service with gMSAs before you deploy it into production. To do so, set up a test environment to ensure that the application can use the gMSA, and then access the resources it needs to access. For more information, see [Support for group managed service accounts](/system-center/scom/support-group-managed-service-accounts).
40-
36+
> Test your service with gMSAs before it goes to production. Set up a test environment to ensure the application uses the gMSA, then accesses resources. For more information, see [Support for group managed service accounts](/system-center/scom/support-group-managed-service-accounts?view=sc-om-2022&preserve-view=true).
4137
42-
If a service doesn't support the use of gMSAs, your next best option is to use a standalone managed service account (sMSA). An sMSA provides the same functionality as a gMSA, but it's intended for deployment on a single server only.
38+
If a service doesn't support gMSAs, you can use a standalone managed service account (sMSA). An sMSA has the same functionality, but is intended for deployment on a single server.
4339

44-
If you can't use a gMSA or sMSA that's supported by your service, you must configure the service to run as a standard user account. Service and domain administrators are required to observe strong password management processes to help keep the account secure.
40+
If you can't use a gMSA or sMSA supported by your service, configure the service to run as a standard user account. Service and domain administrators are required to observe strong password management processes to help keep the account secure.
4541

46-
## Assess the security posture of gMSAs
42+
## Assess gSMA security posture
4743

48-
gMSA accounts are inherently more secure than standard user accounts, which require ongoing password management. However, it's important to consider a gMSA's scope of access as you look at its overall security posture.
49-
50-
Potential security issues and mitigations for using gMSAs are shown in the following table:
44+
gMSAs are more secure than standard user accounts, which require ongoing password management. However, consider gMSA scope of access in relation to security posture. Potential security issues and mitigations for using gMSAs are shown in the following table:
5145

5246
| Security issue| Mitigation |
5347
| - | - |
54-
| gMSA is a member of privileged groups. | <li>Review your group memberships. To do so, you create a PowerShell script to enumerate all group memberships. You can then filter a resultant CSV file by the names of your gMSA files.<li>Remove the gMSA from privileged groups.<li>Grant the gMSA only the rights and permissions it requires to run its service (consult with your service vendor).
55-
| gMSA has read/write access to sensitive resources. | <li>Audit access to sensitive resources.<li>Archive audit logs to a SIEM, such as Azure Log Analytics or Microsoft Sentinel, for analysis.<li>Remove unnecessary resource permissions if you detect an undesirable level of access. |
56-
| | |
48+
| gMSA is a member of privileged groups | <li>Review your group memberships. Create a PowerShell script to enumerate group memberships. Filter the resultant CSV file by gMSA file names.<li>Remove the gMSA from privileged groups.<li>Grant the gMSA rights and permissions it requires to run its service. See your service vendor.
49+
| gMSA has read/write access to sensitive resources | <li>Audit access to sensitive resources.<li>Archive audit logs to a SIEM, such as Azure Log Analytics or Microsoft Sentinel, for analysis.<li>Remove unnecessary resource permissions if there's an unnecessary access level. |
5750

5851

5952
## Find gMSAs
6053

61-
Your organization might already have created gMSAs. To retrieve these accounts, run the following PowerShell cmdlets:
54+
Your organization might have gMSAs. To retrieve these accounts, run the following PowerShell cmdlets:
6255

6356
```powershell
6457
Get-ADServiceAccount
@@ -70,19 +63,19 @@ Test-ADServiceAccount
7063
Uninstall-ADServiceAccount
7164
```
7265

73-
74-
To work effectively, gMSAs must be in the Managed Service Accounts AD container.
75-
66+
### Managed Service Accounts container
7667

77-
![Screen shot of a gMSA account in the managed service accounts container.](./media/securing-service-accounts/secure-gmsa-image-1.png)
68+
To work effectively, gMSAs must be in the Managed Service Accounts container.
69+
70+
![Screenshot of a gMSA in the Managed Service Accounts container.](./media/securing-service-accounts/secure-gmsa-image-1.png)
7871

79-
To find service MSAs that might not be in the list, run the following commands:
72+
To find service MSAs not in the list, run the following commands:
8073

8174
```powershell
8275
8376
Get-ADServiceAccount -Filter *
8477
85-
# This PowerShell cmdlet will return all managed service accounts (both gMSAs and sMSAs). An administrator can differentiate between the two by examining the ObjectClass attribute on returned accounts.
78+
# This PowerShell cmdlet returns managed service accounts (gMSAs and sMSAs). Differentiate by examining the ObjectClass attribute on returned accounts.
8679
8780
# For gMSA accounts, ObjectClass = msDS-GroupManagedServiceAccount
8881
@@ -95,7 +88,7 @@ Get-ADServiceAccount –Filter * | where-object {$_.ObjectClass -eq "msDS-GroupM
9588

9689
## Manage gMSAs
9790

98-
To manage gMSA accounts, you can use the following Active Directory PowerShell cmdlets:
91+
To manage gMSAs, use the following Active Directory PowerShell cmdlets:
9992

10093
`Get-ADServiceAccount`
10194

@@ -112,33 +105,32 @@ To manage gMSA accounts, you can use the following Active Directory PowerShell c
112105
`Uninstall-ADServiceAccount`
113106

114107
> [!NOTE]
115-
> Beginning with Windows Server 2012, the *-ADServiceAccount cmdlets work with gMSAs by default. For more information about using the preceding cmdlets, see [Get started with group managed service accounts](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts).
108+
> In Windows Server 2012, and later versions, the *-ADServiceAccount cmdlets work with gMSAs. Learn more: [Get started with group managed service accounts](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts).
116109
117110
## Move to a gMSA
118-
gMSA accounts are the most secure type of service account for on-premises needs. If you can move to one, you should. Additionally, consider moving your services to Azure and your service accounts to Azure Active Directory. To move to a gMSA account, do the following:
119-
120-
1. Ensure that the [Key Distribution Service (KDS) root key](/windows-server/security/group-managed-service-accounts/create-the-key-distribution-services-kds-root-key) is deployed in the forest. This is a one-time operation.
121111

122-
1. [Create a new gMSA](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts).
112+
gMSAs are a secure service account type for on-premises. It's recommended you use gMSAs, if possible. In addition, consider moving your services to Azure and your service accounts to Azure Active Directory.
113+
114+
To move to a gMSA:
123115

124-
1. Install the new gMSA on each host that runs the service.
116+
1. Ensure the [Key Distribution Service (KDS) root key](/windows-server/security/group-managed-service-accounts/create-the-key-distribution-services-kds-root-key) is deployed in the forest. This is a one-time operation.
117+
2. [Create a new gMSA](/windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts).
118+
3. Install the new gMSA on hosts that run the service.
119+
125120
> [!NOTE]
126-
> For more information about creating and installing a gMSA on a host, prior to configuring your service to use the gMSA, see [Get started with group managed service accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj128431(v=ws.11)).
127-
128-
1. Change your service identity to gMSA, and specify a blank password.
129-
130-
1. Validate that your service is working under the new gMSA identity.
131-
132-
1. Delete the old service account identity.
121+
> Before configuring your service to use the gMSA, see [Get started with group managed service accounts](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/jj128431(v=ws.11)).
133122
134-
123+
4. Change your service identity to gMSA.
124+
5. Specify a blank password.
125+
6. Validate your service is working under the new gMSA identity.
126+
7. Delete the old service account identity.
135127

136128
## Next steps
137129

138130
To learn more about securing service accounts, see the following articles:
139131

140132
* [Introduction to on-premises service accounts](service-accounts-on-premises.md)
141133
* [Secure standalone managed service accounts](service-accounts-standalone-managed.md)
142-
* [Secure computer accounts](service-accounts-computer.md)
143-
* [Secure user accounts](service-accounts-user-on-premises.md)
134+
* [Secure computer accounts with Active Directory](service-accounts-computer.md)
135+
* [Secure user-based service accounts in Active Directory](service-accounts-user-on-premises.md)
144136
* [Govern on-premises service accounts](service-accounts-govern-on-premises.md)

articles/active-directory/fundamentals/whats-deprecated-azure-ad.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -27,15 +27,17 @@ Use the following table to learn about changes including deprecations, retiremen
2727
> [!NOTE]
2828
> Dates and times are United States Pacific Standard Time, and are subject to change.
2929
30-
|Functionality, feature, or service|Change|New tenant change date |Current tenant change date|
31-
|---|---|---|---|
32-
|Microsoft Authenticator app [Number matching](../authentication/how-to-mfa-number-match.md)|Feature change|Feb 27, 2023|Feb 27, 2023|
33-
|Azure AD DS [virtual network deployments](../../active-directory-domain-services/migrate-from-classic-vnet.md)|Retirement|Mar 1, 2023|Mar 1, 2023|
34-
|[License management API, PowerShell](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366)|Retirement|Nov 1, 2022|Mar 31, 2023|
35-
|[Azure AD Authentication Library (ADAL)](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Retirement|Jun 30, 2023|Jun 30, 2023|
36-
|[Azure AD Graph API](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Deprecation|Jun 30, 2023|Jun 30, 2023|
37-
|[Azure AD PowerShell](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Retirement|Jun 30, 2023|Jun 30, 2023|
38-
|[Azure AD MFA Server](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Retirement|Sep 30, 2024|Sep 30, 2024|
30+
|Functionality, feature, or service|Change|Change date |
31+
|---|---|---:|
32+
|Microsoft Authenticator app [Number matching](../authentication/how-to-mfa-number-match.md)|Feature change|Feb 27, 2023|
33+
|Azure AD DS [virtual network deployments](../../active-directory-domain-services/migrate-from-classic-vnet.md)|Retirement|Mar 1, 2023|
34+
|[License management API, PowerShell](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366)|Retirement|*Mar 31, 2023|
35+
|[Azure AD Authentication Library (ADAL)](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Retirement|Jun 30, 2023|
36+
|[Azure AD Graph API](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Deprecation|Jun 30, 2023|
37+
|[Azure AD PowerShell and MSOnline PowerShell](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Deprecation|Jun 30, 2023|
38+
|[Azure AD MFA Server](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Retirement|Sep 30, 2024|
39+
40+
\* The legacy license management API and PowerShell cmdlets will not work for **new tenants** created after Nov 1, 2022.
3941

4042

4143
> [!IMPORTANT]
@@ -58,8 +60,6 @@ Use the definitions in this section help clarify the state, availability, and su
5860
### Terminology
5961

6062
* **End-of-life** - engineering investments have ended, and the feature is unavailable to any customer
61-
* **Current tenant change date** - the change date goes into effect for tenants created before the new tenant change date
62-
* **New tenant change date** - the change date goes into effect for tenants created after the change date
6363

6464
## Next steps
6565
[What's new in Azure Active Directory?](../../active-directory/fundamentals/whats-new.md)

0 commit comments

Comments
 (0)