You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-sync-attributes-synchronized.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.workload: identity
12
12
ms.tgt_pltfrm: na
13
13
ms.devlang: na
14
14
ms.topic: reference
15
-
ms.date: 04/24/2019
15
+
ms.date: 04/15/2020
16
16
ms.subservice: hybrid
17
17
ms.author: billmath
18
18
@@ -370,7 +370,7 @@ This group is a set of attributes used as the minimal attributes needed for a ge
370
370
* Yammer (only User is consumed)
371
371
*[Hybrid Business-to-Business (B2B) cross-org collaboration scenarios offered by resources like SharePoint](https://go.microsoft.com/fwlink/?LinkId=747036)
372
372
373
-
This group is a set of attributes that can be used if the Azure AD directory is not used to support Office 365, Dynamics, or Intune. It has a small set of core attributes.
373
+
This group is a set of attributes that can be used if the Azure AD directory is not used to support Office 365, Dynamics, or Intune. It has a small set of core attributes. Note that single sign-on or provisioning to some third-party applications requires configuring synchronization of attributes in addition to the attributes described here. Application requirements are described in the [SaaS app tutorial](../saas-apps/tutorial-list.md) for each application.
374
374
375
375
| Attribute Name | User | Contact | Group | Comment |
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/ally-tutorial.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ To learn more about SaaS app integration with Azure AD, see [What is application
34
34
To get started, you need the following items:
35
35
36
36
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37
-
* Ally single sign-on (SSO) enabled subscription.
37
+
*An Ally single sign-on (SSO) enabled subscription. If you don't have a subscription, [start your free trial](https://www.ally.io/?utm_source=azure&utm_medium=mktgplace&utm_term=tutorial).
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/directory-assign-admin-roles.md
+20-10Lines changed: 20 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: users-groups-roles
11
11
ms.topic: reference
12
-
ms.date: 04/14/2020
12
+
ms.date: 04/22/2020
13
13
ms.author: curtand
14
14
ms.reviewer: vincesm
15
15
ms.custom: it-pro, fasttrack-edit
@@ -47,32 +47,35 @@ The following administrator roles are available:
47
47
Users in this role can create and manage all aspects of enterprise applications, application registrations, and application proxy settings. Note that users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
48
48
49
49
Application Administrators can manage application credentials that allows them to impersonate the application. So, users assigned to this role can manage application credentials of only those applications that are either not assigned to any Azure AD roles or those assigned to following admin roles only:
50
+
50
51
* Application Administrator
51
52
* Application Developer
52
53
* Cloud Application Administrator
53
54
* Directory Readers
54
55
55
-
If an application is assigned to any other role that are not mentioned above, then Application Administrator cannot manage credentials of that application.
56
-
56
+
If an application is assigned to any other role that are not mentioned above, then Application Administrator cannot manage credentials of that application.
57
+
57
58
This role also grants the ability to _consent_ to delegated permissions and application permissions, with the exception of permissions on the Microsoft Graph API.
58
59
59
60
> [!IMPORTANT]
60
-
> This exception means that you can still consent to permissions for _other_ apps (e.g. third party apps or apps that you have registered), but not to permissions on Azure AD itself. You can still _request_ these permissions as part of the app registration, but _granting_ (i.e. consenting to) these permissions requires an Azure AD admin. This means that a malicious user cannot easily elevate their permissions, for example by creating and consenting to an app that can write to the entire directory and through that app's permissions elevate themselves to become a global admin.
61
+
> This exception means that you can still consent to permissions for _other_ apps (for example, non-Microsoft apps or apps that you have registered), but not to permissions on Azure AD itself. You can still _request_ these permissions as part of the app registration, but _granting_ (that is, consenting to) these permissions requires an Azure AD admin. This means that a malicious user cannot easily elevate their permissions, for example by creating and consenting to an app that can write to the entire directory and through that app's permissions elevate themselves to become a global admin.
Users in this role can create application registrations when the "Users can register applications" setting is set to No. This role also grants permission to consent on one's own behalf when the "Users can consent to apps accessing company data on their behalf" setting is set to No. Users assigned to this role are added as owners when creating new application registrations or enterprise applications.
The Authentication administrator role is currently in public preview. Users with this role can set or reset non-password credentials and can update passwords for all users. Authentication Administrators can require users to re-register against existing non-password credential (for example, MFA or FIDO) and revoke **remember MFA on the device**, which prompts for MFA on the next sign-in of users who are non-administrators or assigned the following roles only:
69
+
Users with this role can set or reset non-password credentials for some users and can update passwords for all users. Authentication administrators can require users who are non-administrators or assigned to some roles to re-register against existing non-password credentials (for example, MFA or FIDO), and can also revoke **remember MFA on the device**, which prompts for MFA on the next sign-in. These actions apply only to users who are non-administrators or who are assigned one or more of the following roles:
69
70
70
71
* Authentication Administrator
71
72
* Directory Readers
72
73
* Guest Inviter
73
74
* Message Center Reader
74
75
* Reports Reader
75
76
77
+
The [Privileged authentication administrator](#privileged-authentication-administrator) role has permission can force re-registration and multi-factor authentication for all users.
78
+
76
79
> [!IMPORTANT]
77
80
> Users with this role can change credentials for people who may have access to sensitive or private information or critical configuration inside and outside of Azure Active Directory. Changing the credentials of a user may mean the ability to assume that user's identity and permissions. For example:
78
81
>
@@ -98,7 +101,7 @@ Users with this role can create and manage B2C User Flows (also called "built-in
98
101
99
102
### [B2C User Flow Attribute Administrator](#b2c-user-flow-attribute-administrator-permissions)
100
103
101
-
Users with this role add or delete custom attributes available to all user flows in the tenant. As such, users with this role can change or add new elements to the enduser schema and impact the behavior of all user flows and indirectly result in changes to what data may be asked of end users and ultimately sent as claims to applications. This role cannot edit user flows.
104
+
Users with this role add or delete custom attributes available to all user flows in the tenant. As such, users with this role can change or add new elements to the end-user schema and impact the behavior of all user flows and indirectly result in changes to what data may be asked of end users and ultimately sent as claims to applications. This role cannot edit user flows.
@@ -123,6 +126,7 @@ Makes purchases, manages subscriptions, manages support tickets, and monitors se
123
126
Users in this role have the same permissions as the Application Administrator role, excluding the ability to manage application proxy. This role grants the ability to create and manage all aspects of enterprise applications and application registrations. This role also grants the ability to consent to delegated permissions, and application permissions excluding the Microsoft Graph API. Users assigned to this role are not added as owners when creating new application registrations or enterprise applications.
124
127
125
128
Cloud Application Administrators can manage application credentials that allows them to impersonate the application. So, users assigned to this role can manage application credentials of only those applications that are either not assigned to any Azure AD roles or those assigned to following admin roles only:
129
+
126
130
* Application Developer
127
131
* Cloud Application Administrator
128
132
* Directory Readers
@@ -207,10 +211,10 @@ Users with this role have global permissions within Microsoft Exchange Online, w
This administrator manages federation between Azure Active Directory tenants and external identity providers. With this role, users can add new identity providers and configure all available settings (e.g. authentication path, service ID, assigned key containers). This user can enable the tenant to trust authentications from external identity providers. The resulting impact on enduser experiences depends on the type of tenant:
214
+
This administrator manages federation between Azure Active Directory tenants and external identity providers. With this role, users can add new identity providers and configure all available settings (e.g. authentication path, service ID, assigned key containers). This user can enable the tenant to trust authentications from external identity providers. The resulting impact on end-user experiences depends on the type of tenant:
211
215
212
216
* Azure Active Directory tenants for employees and partners: The addition of a federation (e.g. with Gmail) will immediately impact all guest invitations not yet redeemed. See [Adding Google as an identity provider for B2B guest users](https://docs.microsoft.com/azure/active-directory/b2b/google-federation).
213
-
* Azure Active Directory B2C tenants: The addition of a federation (for example, with Facebook, or with another Azure AD organization) does not immediately impact enduser flows until the identity provider is added as an option in a user flow (also called a built-in policy). See [Configuring a Microsoft account as an identity provider](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-setup-msa-app) for an example. To change user flows, the limited role of "B2C User Flow Administrator" is required.
217
+
* Azure Active Directory B2C tenants: The addition of a federation (for example, with Facebook, or with another Azure AD organization) does not immediately impact end-user flows until the identity provider is added as an option in a user flow (also called a built-in policy). See [Configuring a Microsoft account as an identity provider](https://docs.microsoft.com/azure/active-directory-b2c/active-directory-b2c-setup-msa-app) for an example. To change user flows, the limited role of "B2C User Flow Administrator" is required.
214
218
215
219
### [Global Administrator / Company Administrator](#company-administrator-permissions)
216
220
@@ -279,7 +283,7 @@ Users in this role can enable, configure and manage services and settings relate
279
283
280
284
Users with this role have global permissions within Microsoft Intune Online, when the service is present. Additionally, this role contains the ability to manage users and devices in order to associate policy, as well as create and manage groups. More information at [Role-based administration control (RBAC) with Microsoft Intune](https://docs.microsoft.com/intune/role-based-access-control).
281
285
282
-
This role can create and manage all security groups. However, Intune Admin does not have admin rights over Office groups. That means the admin cannot update owners or memberships of all Office groups in the tenant. However, he/she can manage the Office group that he creates which comes as a part of his/her enduser privileges. So, any Office group (not security group) that he/she creates should be counted against his/her quota of 250.
286
+
This role can create and manage all security groups. However, Intune Admin does not have admin rights over Office groups. That means the admin cannot update owners or memberships of all Office groups in the tenant. However, he/she can manage the Office group that he creates which comes as a part of his/her end-user privileges. So, any Office group (not security group) that he/she creates should be counted against his/her quota of 250.
283
287
284
288
> [!NOTE]
285
289
> In the Microsoft Graph API and Azure AD PowerShell, this role is identified as "Intune Service Administrator ". It is "Intune Administrator" in the [Azure portal](https://portal.azure.com).
@@ -345,7 +349,13 @@ Users with this role can register printers and manage printer status in the Micr
Users with this role can set or reset non-password credentials for all users, including global administrators, and can update passwords for all users. Privileged Authentication Administrators can force users to re-register against existing non-password credential (e.g. MFA, FIDO) and revoke 'remember MFA on the device', prompting for MFA on the next login of all users.
352
+
Users with this role can set or reset non-password credentials for all users, including global administrators, and can update passwords for all users. Privileged Authentication Administrators can force users to re-register against existing non-password credential (such as MFA or FIDO) and revoke 'remember MFA on the device', prompting for MFA on the next sign-in of all users. The [Authentication administrator](#authentication-administrator) role can force re-registration and MFA for only non-admins and users assigned to the following Azure AD roles:
353
+
354
+
* Authentication Administrator
355
+
* Directory Readers
356
+
* Guest Inviter
357
+
* Message Center Reader
358
+
* Reports Reader
349
359
350
360
### [Privileged Role Administrator](#privileged-role-administrator-permissions)
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/roles-custom-overview.md
+17-1Lines changed: 17 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: users-groups-roles
10
10
ms.topic: article
11
-
ms.date: 11/08/2019
11
+
ms.date: 04/22/2020
12
12
ms.author: curtand
13
13
ms.reviewer: vincesm
14
14
ms.custom: it-pro
@@ -32,6 +32,22 @@ Once you’ve created your role definition, you can assign it to a user by creat
32
32
33
33
Azure AD built-in and custom roles operate on concepts similar to [Azure role-based access control](../../role-based-access-control/overview.md). The [difference between these two role-based access control systems](../../role-based-access-control/rbac-and-directory-admin-roles.md) is that Azure RBAC controls access to Azure resources such as virtual machines or storage using Azure Resource Management, and Azure AD custom roles control access to Azure AD resources using Graph API. Both systems leverage the concept of role definitions and role assignments.
34
34
35
+
### How Azure AD determines if a user has access to a resource
36
+
37
+
The following are the high-level steps that Azure AD uses to determine if you have access to a management resource. Use this information to troubleshoot access issues.
38
+
39
+
1. A user (or service principal) acquires a token to the Microsoft Graph or Azure AD Graph endpoint.
40
+
41
+
1. The user makes an API call to Azure Active Directory (Azure AD) via Microsoft Graph or Azure AD Graph using the issued token.
42
+
43
+
1. Depending on the circumstance, Azure AD takes one of the following actions:
44
+
45
+
- Evaluates the user’s role memberships based on the [wids claim](https://docs.microsoft.com/azure/active-directory/develop/access-tokens) in the user’s access token.
46
+
- Retrieves all the role assignments that apply for the user, either directly or via group membership, to the resource on which the action is being taken.
47
+
48
+
1. Azure AD determines if the action in the API call is included in the roles the user has for this resource.
49
+
1. If the user doesn't have a role with the action at the requested scope, access is not granted. Otherwise access is granted.
50
+
35
51
### Role assignments
36
52
37
53
A role assignment is the object that attaches a role definition to a user at a particular scope to grant Azure AD resource access. Access is granted by creating a role assignment, and access is revoked by removing a role assignment. At its core, a role assignment consists of three elements:
0 commit comments