You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 03/22/2023
7
+
ms.date: 03/31/2023
8
8
ms.author: justinha
9
9
author: justinha
10
10
manager: amycolannino
@@ -86,9 +86,9 @@ Content-Type: application/json
86
86
}
87
87
```
88
88
89
-
## Known issues
89
+
## Known issue
90
90
91
-
-[FIDO2 security key isn't supported on mobile devices](../develop/support-fido2-authentication.md#mobile). This issue might surface when system-preferred MFA is enabled. Until a fix is available, we recommend not using FIDO2 security keys on mobile devices.
91
+
[FIDO2 security keys](../develop/support-fido2-authentication.md#mobile) on mobile devices and [registration for certificate-based authentication (CBA)](concept-certificate-based-authentication.md) aren't supported due to an issue that might surface when system-preferred MFA is enabled. Until a fix is available, we recommend not using FIDO2 security keys on mobile devices or registering for CBA. To disable system-preferred MFA for these users, you can either add them to an excluded group or remove them from an included group.
title: View privileged role assignments in Azure AD Insights
3
+
description: How to view current privileged role assignments in the Azure AD Insights tab.
4
+
services: active-directory
5
+
author: jenniferf-skc
6
+
manager: amycolannino
7
+
ms.service: active-directory
8
+
ms.subservice: ciem
9
+
ms.workload: identity
10
+
ms.topic: how-to
11
+
ms.date: 03/31/2023
12
+
ms.author: jfields
13
+
---
14
+
15
+
# View privileged role assignments in your organization (Preview)
16
+
17
+
The **Azure AD Insights** tab shows you who is assigned to privileged roles in your organization. You can review a list of identities assigned to a privileged role and learn more about each identity.
18
+
19
+
> [!NOTE]
20
+
> Microsoft recommends that you keep two break glass accounts permanently assigned to the global administrator role. Make sure that these accounts don't require the same multi-factor authentication mechanism to sign in as other administrative accounts. This is described further in [Manage emergency access accounts in Microsoft Entra](../roles/security-emergency-access.md).
21
+
22
+
> [!NOTE]
23
+
> Keep role assignments permanent if a user has a an additional Microsoft account (for example, an account they use to sign in to Microsoft services like Skype, or Outlook.com). If you require multi-factor authentication to activate a role assignment, a user with an additional Microsoft account will be locked out.
24
+
25
+
## View information in the Azure AD Insights tab
26
+
27
+
1. From the Permissions Management home page, select the **Azure AD Insights** tab.
28
+
2. Select **Review global administrators** to review the list of Global administrator role assignments.
29
+
3. Select **Review highly privileged roles** or **Review service principals** to review information on principal role assignments for the following roles: *Application administrator*, *Cloud Application administrator*, *Exchange administrator*, *Intune administrator*, *Privileged role administrator*, *SharePoint administrator*, *Security administrator*, *User administrator*.
30
+
31
+
32
+
## Next steps
33
+
34
+
- For information about managing roles, policies and permissions requests in your organization, see [View roles/policies and requests for permission in the Remediation dashboard](ui-remediation.md).
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/troubleshoot-conditional-access.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: troubleshooting
9
-
ms.date: 08/16/2022
9
+
ms.date: 03/31/2023
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -40,17 +40,17 @@ Organizations should avoid the following configurations:
40
40
41
41
The first way is to review the error message that appears. For problems signing in when using a web browser, the error page itself has detailed information. This information alone may describe what the problem is and that may suggest a solution.
42
42
43
-

43
+

44
44
45
45
In the above error, the message states that the application can only be accessed from devices or client applications that meet the company's mobile device management policy. In this case, the application and device don't meet that policy.
46
46
47
47
## Azure AD sign-in events
48
48
49
49
The second method to get detailed information about the sign-in interruption is to review the Azure AD sign-in events to see which Conditional Access policy or policies were applied and why.
50
50
51
-
More information can be found about the problem by clicking **More Details** in the initial error page. Clicking **More Details**will reveal troubleshooting information that is helpful when searching the Azure AD sign-in events for the specific failure event the user saw or when opening a support incident with Microsoft.
51
+
More information can be found about the problem by clicking **More Details** in the initial error page. Clicking **More Details**reveals troubleshooting information that is helpful when searching the Azure AD sign-in events for the specific failure event the user saw or when opening a support incident with Microsoft.
52
52
53
-

53
+

54
54
55
55
To find out which Conditional Access policy or policies applied and why do the following.
56
56
@@ -63,26 +63,24 @@ To find out which Conditional Access policy or policies applied and why do the f
63
63
1.**Username** to see information related to specific users.
64
64
1.**Date** scoped to the time frame in question.
65
65
66
-

66
+

67
67
68
-
1. Once the sign-in event that corresponds to the user's sign-in failure has been found select the **Conditional Access** tab. The Conditional Access tab will show the specific policy or policies that resulted in the sign-in interruption.
68
+
1. Once the sign-in event that corresponds to the user's sign-in failure has been found select the **Conditional Access** tab. The Conditional Access tab shows the specific policy or policies that resulted in the sign-in interruption.
69
69
1. Information in the **Troubleshooting and support** tab may provide a clear reason as to why a sign-in failed such as a device that didn't meet compliance requirements.
70
-
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name**will show the policy configuration user interface for the selected policy for review and editing.
70
+
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name**shows the policy configuration user interface for the selected policy for review and editing.
71
71
1. The **client user** and **device details** that were used for the Conditional Access policy assessment are also available in the **Basic Info**, **Location**, **Device Info**, **Authentication Details**, and **Additional Details** tabs of the sign-in event.
72
72
73
73
### Policy not working as intended
74
74
75
75
Selecting the ellipsis on the right side of the policy in a sign-in event brings up policy details. This option gives administrators additional information about why a policy was successfully applied or not.
76
76
77
-

:::image type="content" source="media/troubleshoot-conditional-access/activity-details-sign-ins.png" alt-text="Screenshot showing Conditional Access Policy details click thru to see why policy applied or not." lightbox="media/troubleshoot-conditional-access/policy-details.png":::
80
78
81
79
The left side provides details collected at sign-in and the right side provides details of whether those details satisfy the requirements of the applied Conditional Access policies. Conditional Access policies only apply when all conditions are satisfied or not configured.
82
80
83
81
If the information in the event isn't enough to understand the sign-in results, or adjust the policy to get desired results, the sign-in diagnostic tool can be used. The sign-in diagnostic can be found under **Basic info** > **Troubleshoot Event**. For more information about the sign-in diagnostic, see the article [What is the sign-in diagnostic in Azure AD](../reports-monitoring/overview-sign-in-diagnostics.md). You can also [use the What If tool to troubleshoot Conditional Access policies](what-if-tool.md).
84
82
85
-
If you need to submit a support incident, provide the request ID and time and date from the sign-in event in the incident submission details. This information will allow Microsoft support to find the specific event you're concerned about.
83
+
If you need to submit a support incident, provide the request ID and time and date from the sign-in event in the incident submission details. This information allows Microsoft support to find the specific event you're concerned about.
86
84
87
85
### Common Conditional Access error codes
88
86
@@ -98,7 +96,7 @@ More information about error codes can be found in the article [Azure AD Authent
98
96
99
97
## Service dependencies
100
98
101
-
In some specific scenarios, users are blocked because there are cloud apps with dependencies on resources that are blocked by Conditional Access policy.
99
+
In some specific scenarios, users are blocked because there are cloud apps with dependencies on resources blocked by Conditional Access policy.
102
100
103
101
To determine the service dependency, check the sign-ins log for the application and resource called by the sign-in. In the following screenshot, the application called is **Azure Portal** but the resource called is **Windows Azure Service Management API**. To target this scenario appropriately all the applications and resources should be similarly combined in Conditional Access policy.
# Managing custom domain names in your Azure Active Directory
22
22
23
-
A domain name is an important part of the identifier for resources in many Azure Active Directory (Azure AD) deployments. It is part of a user name or email address for a user, part of the address for a group, and is sometimes part of the app ID URI for an application. A resource in Azure AD can include a domain name that's owned by the Azure AD organization (sometimes called a tenant) that contains the resource. Only a Global Administrator can manage domains in Azure AD.
23
+
A domain name is an important part of the identifier for resources in many Azure Active Directory (Azure AD) deployments. It's part of a user name or email address for a user, part of the address for a group, and is sometimes part of the app ID URI for an application. A resource in Azure AD can include a domain name that's owned by the Azure AD organization (sometimes called a tenant) that contains the resource. [Global Administrators](../roles/permissions-reference.md#global-administrator) and [Domain name administrators](../roles/permissions-reference.md#domain-name-administrator)can manage domains in Azure AD.
24
24
25
25
## Set the primary domain name for your Azure AD organization
0 commit comments