Skip to content

Commit 46d4b36

Browse files
authored
Merge pull request #181638 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 93c7420 + b064718 commit 46d4b36

File tree

66 files changed

+1000
-460
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+1000
-460
lines changed

articles/active-directory-b2c/partner-f5.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -428,4 +428,4 @@ Your application’s logs would then help understand if it received those attrib
428428

429429
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Apply those settings and select **Apply** again to refresh the access profile list.
430430

431-
See F5’s guidance for more [OAuth client and resource server troubleshooting tips](https://techdocs.f5.com/en-us/bigip-14-1-0/big-ip-access-policy-manager-oauth-configuration-14-1-0/apm-oauth-client-and-resource-server.html#GUID-774384BC-CF63-469D-A589-1595D0DDFBA2)
431+
See F5’s guidance for more [OAuth client and resource server troubleshooting tips](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-sso-13-0-0/37.html#GUID-774384BC-CF63-469D-A589-1595D0DDFBA2)

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,15 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md).
1717

18+
## November 2021
19+
20+
### Updated articles
21+
22+
- [Define an OAuth2 technical profile in an Azure Active Directory B2C custom policy](oauth2-technical-profile.md)
23+
- [Error codes: Azure Active Directory B2C](error-codes.md)
24+
- [Configure authentication options in an Android app by using Azure AD B2C](enable-authentication-android-app-options.md)
25+
- [Set up a force password reset flow in Azure Active Directory B2C](force-password-reset.md)
26+
1827

1928
## October 2021
2029

articles/active-directory/develop/msal-net-token-cache-serialization.md

Lines changed: 118 additions & 129 deletions
Large diffs are not rendered by default.
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
title: Frequently asked questions about the admin consent workflow
3+
titleSuffix: Azure AD
4+
description: Find answers to frequently asked questions (FAQs) about the admin consent workflow.
5+
services: active-directory
6+
author: eringreenlee
7+
manager: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: app-mgmt
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 11/17/2021
13+
ms.author: ergreenl
14+
ms.reviewer: ergreenl
15+
ms.collection: M365-identity-device-management
16+
17+
---
18+
# Azure Active Directory admin consent workflow frequently asked questions
19+
20+
## I enabled a workflow, but when testing the functionality, why can’t I see the new “Approval required” prompt that allows me to request access?
21+
22+
After enabling the feature, it may take up to 60 minutes for users to see the update, though it's usually available to all users within a few minutes.
23+
24+
## As a reviewer, why can’t I see all pending requests?
25+
26+
Reviewers can only see admin requests that are created after they're designated as a reviewer. If you've recently been added as a reviewer, you won't see requests that were created before your assignment.
27+
28+
## As a reviewer, why do I see multiple requests for the same application?
29+
30+
If an application is configured to use static and dynamic consent to request access to their user’s data, you'll see two admin consent requests. One request represents the static permissions, and the other represents the dynamic permissions.
31+
32+
## As a requestor, can I check the status of my request?
33+
34+
No, requestors are only able to receive updates using email notifications.
35+
36+
## As a reviewer, is it possible to approve the application, but not for everyone?
37+
38+
If you're concerned about granting admin consent and allowing all users in the tenant to use the application, you should deny the request. You can then manually grant admin consent by restricting access to the application. Configure the application to require user assignment, and assign users or groups to the application to restrict access. For more information, see [Methods for assigning users and groups](./assign-user-or-group-access-portal.md).
39+
40+
## I have an application that requires user assignment. A user that I assigned to an application is being asked to request admin consent instead of being able to consent themselves. Why is that?
41+
42+
When access to an application is restricted using the "user assignment required" setting, an administrator needs to consent to all the permissions requested by the application.

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 30 additions & 102 deletions
Original file line numberDiff line numberDiff line change
@@ -3,107 +3,69 @@ title: Configure the admin consent workflow
33
titleSuffix: Azure AD
44
description: Learn how to configure a way for end users to request access to applications that require admin consent.
55
services: active-directory
6-
author: davidmu1
6+
author: eringreenlee
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/06/2021
13-
ms.author: davidmu
12+
ms.date: 11/17/2021
13+
ms.author: ergreenl
1414
ms.reviewer: ergreenl
1515
ms.collection: M365-identity-device-management
16+
#customer intent: As an admin, I want to configure the admin consent workflow.
1617
---
1718

1819
# Configure the admin consent workflow
1920

20-
This article describes how to enable the admin consent workflow feature, which gives end users a way to request access to applications that require admin consent.
21+
In this article, you'll learn how to configure the admin consent workflow to enable users to request access to applications that require admin consent. You enable the ability to make requests by using an admin consent workflow. For more information on consenting to applications, see [Azure Active Directory consent framework](../develop/consent-framework.md).
2122

22-
Without an admin consent workflow, a user in a tenant where user consent is disabled will be blocked when they try to access any app that requires permissions to access organizational data. The user sees a generic error message that says they're unauthorized to access the app and they should ask their admin for help. But often, the user doesn't know who to contact, so they either give up or create a new local account in the application. Even when an admin is notified, there isn't always a streamlined process to help the admin grant access and notify their users.
2323
The admin consent workflow gives admins a secure way to grant access to applications that require admin approval. When a user tries to access an application but is unable to provide consent, they can send a request for admin approval. The request is sent via email to admins who have been designated as reviewers. A reviewer takes action on the request, and the user is notified of the action.
2424

2525
To approve requests, a reviewer must be a global administrator, cloud application administrator, or application administrator. The reviewer must already have one of these admin roles assigned; simply designating them as a reviewer doesn't elevate their privileges.
2626

27-
## Enable the admin consent workflow
27+
## Prerequisites
2828

29-
To enable the admin consent workflow and choose reviewers:
29+
To configure the admin consent workflow, you need:
3030

31-
1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator.
32-
2. Click **All services** at the top of the left-hand navigation menu. The **Azure Active Directory Extension** opens.
33-
3. In the filter search box, type "**Azure Active Directory**" and select **the Azure Active Directory** item.
34-
4. From the navigation menu, click **Enterprise applications**.
35-
5. Under **Manage**, select **User settings**.
36-
6. Under **Admin consent requests**, set **Users can request admin consent to apps they are unable to consent to** to **Yes**.
31+
- An Azure account. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
32+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3733

38-
![Configure admin consent workflow settings](media/configure-admin-consent-workflow/admin-consent-requests-settings.png)
34+
## Enable the admin consent workflow
3935

40-
7. Configure the following settings:
36+
To enable the admin consent workflow and choose reviewers:
4137

42-
* **Select users to review admin consent requests**. Select reviewers for this workflow from a set of users that have the global administrator, cloud application administrator, and application administrator roles. **Note that you must designate at least one reviewer before the workflow can be turned on.**
43-
* **Selected users will receive email notifications for requests**. Enable or disable email notifications to the reviewers when a request is made.
44-
* **Selected users will receive request expiration reminders**. Enable or disable reminder email notifications to the reviewers when a request is about to expire.
45-
* **Consent request expires after (days)**. Specify how long requests stay valid.
38+
1. Sign in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites.
39+
1. Search for and select **Azure Active Directory**.
40+
1. Select **Enterprise applications**.
41+
1. Under **Manage**, select **User settings**.
42+
Under **Admin consent requests**, select **Yes** for **Users can request admin consent to apps they are unable to consent to** .
43+
:::image type="content" source="media/configure-admin-consent-workflow/admin-consent-requests-settings.png" alt-text="Configure admin consent workflow settings":::
44+
1. Configure the following settings:
4645

47-
8. Select **Save**. It can take up to an hour for the feature to become enabled.
46+
- **Select users to review admin consent requests** - Select reviewers for this workflow from a set of users that have the global administrator, cloud application administrator, or application administrator roles. You can also add groups and roles that can configure an admin consent workflow. You must designate at least one reviewer before the workflow can be enabled.
47+
- **Selected users will receive email notifications for requests** - Enable or disable email notifications to the reviewers when a request is made.
48+
- **Selected users will receive request expiration reminders** - Enable or disable reminder email notifications to the reviewers when a request is about to expire.
49+
- **Consent request expires after (days)** - Specify how long requests stay valid.
50+
1. Select **Save**. It can take up to an hour for the feature to become enabled.
4851

4952
> [!NOTE]
5053
> You can add or remove reviewers for this workflow by modifying the **Select admin consent requests reviewers** list. Note that a current limitation of this feature is that reviewers can retain the ability to review requests that were made while they were designated as a reviewer.
5154
52-
## How users request admin consent
53-
54-
After the admin consent workflow is enabled, users can request admin approval for an application they're unauthorized to consent to. The following steps describe user's experience when requesting approval.
55-
56-
1. The user attempts to sign in to the application.
57-
58-
2. The **Approval required** message appears. The user types a justification for needing access to the app, and then selects **Request approval**.
59-
60-
![Screenshot shows an Approval required dialog box where you can Request approval.](media/configure-admin-consent-workflow/end-user-justification.png)
61-
62-
3. A **Request sent** message confirms that the request was submitted to the admin. If the user sends several requests, only the first request is submitted to the admin.
63-
64-
![Screenshot shows the Request sent confirmation.](media/configure-admin-consent-workflow/end-user-sent-request.png)
65-
66-
4. The user receives an email notification when their request is approved, denied, or blocked.
67-
68-
## Review and take action on admin consent requests
69-
70-
To review the admin consent requests and take action:
71-
72-
1. Sign in to the [Azure portal](https://portal.azure.com) as one of the registered reviewers of the admin consent workflow.
73-
2. Select **All services** at the top of the left-hand navigation menu. The **Azure Active Directory Extension** opens.
74-
3. In the filter search box, type "**Azure Active Directory**" and select the **Azure Active Directory** item.
75-
4. From the navigation menu, click **Enterprise applications**.
76-
5. Under **Activity**, select **Admin consent requests**.
77-
78-
> [!NOTE]
79-
> Reviewers will only see admin requests that were created after they were designated as a reviewer.
80-
81-
6. Select the application that is being requested.
82-
7. Review details about the request:
83-
84-
* To see who is requesting access and why, select the **Requested by** tab.
85-
* To see what permissions are being requested by the application, select **Review permissions and consent**.
86-
87-
8. Evaluate the request and take the appropriate action:
88-
89-
* **Approve the request**. To approve a request, grant admin consent to the application. Once a request is approved, all requestors are notified that they have been granted access. Approving a request allows all users in your tenant to access the application unless otherwise restricted with user assignment.
90-
* **Deny the request**. To deny a request, you must provide a justification that will be provided to all requestors. Once a request is denied, all requestors are notified that they have been denied access to the application. Denying a request won't prevent users from requesting admin consent to the app again in the future.
91-
* **Block the request**. To block a request, you must provide a justification that will be provided to all requestors. Once a request is blocked, all requestors are notified they've been denied access to the application. Blocking a request creates a service principal object for the application in your tenant in a disabled state. Users won't be able to request admin consent to the application in the future.
92-
9355
## Email notifications
9456

9557
If configured, all reviewers will receive email notifications when:
9658

97-
* A new request has been created
98-
* A request has expired
99-
* A request is nearing the expiration date
59+
- A new request has been created
60+
- A request has expired
61+
- A request is nearing the expiration date
10062

10163
Requestors will receive email notifications when:
10264

103-
* They submit a new request for access
104-
* Their request has expired
105-
* Their request has been denied or blocked
106-
* Their request has been approved
65+
- They submit a new request for access
66+
- Their request has expired
67+
- Their request has been denied or blocked
68+
- Their request has been approved
10769

10870
## Audit logs
10971

@@ -118,40 +80,6 @@ The table below outlines the scenarios and audit values available for the admin
11880
|Reviewers approving an admin consent request |Access Reviews |UserManagement |Approve all requests in business flow |App context |Currently you cannot find the user context or the app ID that was granted admin consent. |
11981
|Reviewers denying an admin consent request |Access Reviews |UserManagement |Approve all requests in business flow |App context | Currently you cannot find the user context of the actor that denied an admin consent request |
12082

121-
## FAQ
122-
123-
**I turned on this workflow, but when testing out the functionality, why can’t I see the new “Approval required” prompt allowing me to request access?**
124-
125-
After turning on the feature, it may take up to 60 minutes for end users to see the update, though it's usually available to all users within a few minutes.
126-
127-
**As a reviewer, why can’t I see all pending requests?**
128-
129-
Reviewers can only see admin requests that were created after they were designated as a reviewer. So if you were recently added as a reviewer, you won't see any requests that were created before your assignment.
130-
131-
**As a reviewer, why do I see multiple requests for the same application?**
132-
133-
If an application developer has configured their app to use static and dynamic consent to request access to their end user’s data, you'll see two admin consent requests. One request represents the static permissions, and the other represents the dynamic permissions.
134-
135-
**As a requestor, can I check the status of my request?**
136-
137-
No, for now requestors are only able to get updates via email notifications.
138-
139-
**As a reviewer, is it possible to approve the application, but not for everyone?**
140-
141-
If you're concerned about granting admin consent and allowing all users in the tenant to use the application, we recommend that you deny the request. Then manually grant admin consent by restricting access to the application by requiring user assignment, and assigning users or groups to the application. For more information, see [Methods for assigning users and groups](./assign-user-or-group-access-portal.md).
142-
143-
**I have an app that requires user assignment. A user that I assigned to an application is being asked to request admin consent instead of being able to consent themself. Why is that?**
144-
145-
When access to an application is restricted via the "user assignment required", an Azure AD administrator needs to consent all the permissions requested by the application.
146-
14783
## Next steps
14884

149-
For more information on consenting to applications, see [Azure Active Directory consent framework](../develop/consent-framework.md).
150-
151-
[Configure how end-users consent to applications](configure-user-consent.md)
152-
15385
[Grant tenant-wide admin consent to an application](grant-admin-consent.md)
154-
155-
[Permissions and consent in the Microsoft identity platform](../develop/v2-permissions-and-consent.md)
156-
157-
[Azure AD on Microsoft Q&A](/answers/topics/azure-active-directory.html)

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.workload: identity
11-
ms.topic: conceptual
11+
ms.topic: how-to
1212
ms.date: 10/23/2021
1313
ms.author: davidmu
1414
ms.reviewer: phsignor

0 commit comments

Comments
 (0)