You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-portal/mobile-app/microsoft-entra-id.md
+34-8Lines changed: 34 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Use Microsoft Entra ID with the Azure mobile app
3
3
description: Use the Azure mobile app to manage users and groups with Microsoft Entra ID.
4
-
ms.date: 03/08/2024
4
+
ms.date: 04/04/2024
5
5
ms.topic: conceptual
6
6
---
7
7
@@ -12,7 +12,7 @@ The Azure mobile app provides access to Microsoft Entra ID. You can perform task
12
12
To access Microsoft Entra ID, open the Azure mobile app and sign in with your Azure account. From **Home**, scroll down to select the **Microsoft Entra ID** card.
13
13
14
14
> [!NOTE]
15
-
> Your account must have the appropriate permissions in order to perform these tasks. For example, to invite a user to your tenant, you must have a role that includes this permission, such as [Guest Inviter](/entra/identity/role-based-access-control/permissions-reference)role or [User Administrator](/entra/identity/role-based-access-control/permissions-reference).
15
+
> Your account must have the appropriate permissions in order to perform these tasks. For example, to invite a user to your tenant, you must have a role that includes this permission, such as [Guest Inviter](/entra/identity/role-based-access-control/permissions-reference) or [User Administrator](/entra/identity/role-based-access-control/permissions-reference).
16
16
17
17
## Invite a user to the tenant
18
18
@@ -30,8 +30,8 @@ To add one or more users to a group from the Azure mobile app:
30
30
1. Search or scroll to find the desired group, then tap to select it.
31
31
1. On the **Members** card, select **See All**. The current list of members is displayed.
32
32
1. Select the **+** icon in the top right corner.
33
-
1. Search or scroll to find users you want to add to the group, then select the user(s) by tapping the circle next to their name.
34
-
1. Select **Add** in the top right corner to add the selected users(s) to the group.
33
+
1. Search or scroll to find users you want to add to the group, then select one or more users by tapping the circle next to their name.
34
+
1. Select **Add** in the top right corner to add the selected users to the group.
35
35
36
36
## Add group memberships for a specified user
37
37
@@ -40,20 +40,46 @@ You can also add a single user to one or more groups in the **Users** section of
40
40
1. In **Microsoft Entra ID**, select **Users**, then search or scroll to find and select the desired user.
41
41
1. On the **Groups** card, select **See All** to display all current group memberships for that user.
42
42
1. Select the **+** icon in the top right corner.
43
-
1. Search or scroll to find groups to which this user should be added, then select the group(s) by tapping the circle next to the group name.
44
-
1. Select **Add** in the top right corner to add the user to the selected group(s).
43
+
1. Search or scroll to find groups to which this user should be added, then select one or more groups by tapping the circle next to the group name.
44
+
1. Select **Add** in the top right corner to add the user to the selected groups.
45
45
46
46
## Manage authentication methods or reset password for a user
47
47
48
-
To [manage authentication methods](/entra/identity/authentication/concept-authentication-methods-manage) or [reset a user's password](/entra/fundamentals/users-reset-password-azure-portal), you need to do the following steps:
48
+
To [manage authentication methods](/entra/identity/authentication/concept-authentication-methods-manage) or [reset a user's password](/entra/fundamentals/users-reset-password-azure-portal):
49
49
50
50
1. In **Microsoft Entra ID**, select **Users**, then search or scroll to find and select the desired user.
51
51
1. On the **Authentication methods** card, select **Manage**.
52
-
1. Select **Reset password** to assign a temporary password to the user, or **Authentication methods** to manage to Tap on the desired user, then tap on “Reset password” or “Authentication methods” based on your permissions.
52
+
1. Select **Reset password** to assign a temporary password to the user, or **Authentication methods** to manage authentication methods for self-service password reset.
53
53
54
54
> [!NOTE]
55
55
> You won't see the **Authentication methods** card if you don't have the appropriate permissions to manage authentication methods and/or password changes for a user.
56
56
57
+
## Investigate risky users and sign-ins
58
+
59
+
[Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection) provides organizations with reporting they can use to [investigate identity risks in their environment](/entra/id-protection/howto-identity-protection-investigate-risk).
60
+
61
+
If you have the [necessary permissions and license](/entra/id-protection/overview-identity-protection#required-roles), you'll see details in the **Risky users** and **Risky sign-ins** sections within **Microsoft Entra ID**. You can open these sections to view more information and perform some management tasks.
62
+
63
+
### Manage risky users
64
+
65
+
1. In **Microsoft Entra ID**, scroll down to the **Security** card and then select **Risky users**.
66
+
1. Search or scroll to find and select a specific risky user.
67
+
1. Review basic information for this user, a list of their risky sign-ins, and their risk history.
68
+
1. To [take action on the user](/entra/id-protection/howto-identity-protection-investigate-risk), select the three dots near the top of the screen. You can:
69
+
70
+
* Reset the user's password
71
+
* Confirm user compromise
72
+
* Dismiss user risk
73
+
* Block the user from signing in (or unblock, if previously blocked)
74
+
75
+
### Monitor risky sign-ins
76
+
77
+
1. In **Microsoft Entra ID**, scroll down to the **Security** card and then select **Risky sign-ins**. It may take a minute or two for the list of all risky sign-ins to load.
78
+
79
+
1. Search or scroll to find and select a specific risky sign-in.
If you have been made eligible for an administrative role through Microsoft Entra Privileged Identity Management (PIM), you must activate the role assignment when you need to perform privileged actions. This activation can be done from within the Azure mobile app.
0 commit comments