Skip to content

Commit 4914937

Browse files
authored
Merge pull request #194112 from MicrosoftDocs/main
4/05 PM Publish
2 parents 6727bd7 + c8faddd commit 4914937

File tree

84 files changed

+868
-208
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+868
-208
lines changed

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,8 @@ When you install the extension, you need the *Tenant ID* and admin credentials f
107107
The NPS server must be able to communicate with the following URLs over ports 80 and 443:
108108

109109
* *https:\//strongauthenticationservice.auth.microsoft.com*
110+
* *https:\//strongauthenticationservice.auth.microsoft.us*
111+
* *https:\//strongauthenticationservice.auth.microsoft.cn*
110112
* *https:\//adnotifications.windowsazure.com*
111113
* *https:\//login.microsoftonline.com*
112114
* *https:\//credentials.azure.com*
@@ -266,14 +268,14 @@ For customers that use the Azure Government or Azure China 21Vianet clouds, the
266268

267269
| Registry key | Value |
268270
|--------------------|-----------------------------------|
269-
| AZURE_MFA_HOSTNAME | adnotifications.windowsazure.us |
271+
| AZURE_MFA_HOSTNAME | strongauthenticationservice.auth.microsoft.us |
270272
| STS_URL | https://login.microsoftonline.us/ |
271273

272274
1. For Azure China 21Vianet customers, set the following key values:
273275

274276
| Registry key | Value |
275277
|--------------------|-----------------------------------|
276-
| AZURE_MFA_HOSTNAME | adnotifications.windowsazure.cn |
278+
| AZURE_MFA_HOSTNAME | strongauthenticationservice.auth.microsoft.cn |
277279
| STS_URL | https://login.chinacloudapi.cn/ |
278280

279281
1. Repeat the previous two steps to set the registry key values for each NPS server.
@@ -393,7 +395,7 @@ Verify that AD Connect is running, and that the user is present in both the on-p
393395

394396
### Why do I see HTTP connect errors in logs with all my authentications failing?
395397

396-
Verify that https://adnotifications.windowsazure.com is reachable from the server running the NPS extension.
398+
Verify that https://adnotifications.windowsazure.com, https://strongauthenticationservice.auth.microsoft.com is reachable from the server running the NPS extension.
397399

398400
### Why is authentication not working, despite a valid certificate being present?
399401

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,15 +107,18 @@ This setting works with all browsers. However, to satisfy a device policy, like
107107
| Windows 10 + | Microsoft Edge, [Chrome](#chrome-support), [Firefox 91+](https://support.mozilla.org/kb/windows-sso) |
108108
| Windows Server 2022 | Microsoft Edge, [Chrome](#chrome-support) |
109109
| Windows Server 2019 | Microsoft Edge, [Chrome](#chrome-support) |
110-
| iOS | Microsoft Edge, Safari |
110+
| iOS | Microsoft Edge, Safari (see the notes) |
111111
| Android | Microsoft Edge, Chrome |
112112
| macOS | Microsoft Edge, Chrome, Safari |
113113

114114
These browsers support device authentication, allowing the device to be identified and validated against a policy. The device check fails if the browser is running in private mode or if cookies are disabled.
115115

116116
> [!NOTE]
117-
> Edge 85+ requires the user to be signed in to the browser to properly pass device identity. Otherwise, it behaves like Chrome without the accounts extension. This sign-in might not occur automatically in a Hybrid Azure AD Join scenario.
117+
> Edge 85+ requires the user to be signed in to the browser to properly pass device identity. Otherwise, it behaves like Chrome without the accounts extension. This sign-in might not occur automatically in a Hybrid Azure AD Join scenario.
118+
>
118119
> Safari is supported for device-based Conditional Access, but it can not satisfy the **Require approved client app** or **Require app protection policy** conditions. A managed browser like Microsoft Edge will satisfy approved client app and app protection policy requirements.
120+
> On iOS with 3rd party MDM solution only Microsoft Edge browser supports device policy.
121+
>
119122
> [Firefox 91+](https://support.mozilla.org/kb/windows-sso) is supported for device-based Conditional Access, but "Allow Windows single sign-on for Microsoft, work, and school accounts" needs to be enabled.
120123
121124
#### Why do I see a certificate prompt in the browser

articles/active-directory/enterprise-users/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@
44
items:
55
- name: Azure AD users, groups, and licensing
66
href: directory-overview-user-model.md
7+
- name: What is delegated administration?
8+
href: directory-delegated-administration-primer.md
79
- name: Quickstarts
810
items:
911
- name: Add users to Azure AD
@@ -64,7 +66,7 @@
6466
href: users-restrict-guest-permissions.md
6567
- name: Dynamic groups and guests
6668
href: ../external-identities/use-dynamic-groups.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
67-
- name: Organization
69+
- name: Organization (tenant)
6870
items:
6971
- name: Azure AD tenant organizations
7072
href: ../fundamentals/active-directory-whatis.md?context=%2fazure%2factive-directory%2fenterprise-users%2fcontext%2fugr-context
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: Delegated administration in Azure Active Directory
3+
description: The relationship between older delegated admin permissions and new granular delegated admin permissions in Azure Active Directory
4+
keywords:
5+
author: curtand
6+
manager: karenhoran
7+
ms.author: curtand
8+
ms.reviewer: yuank
9+
ms.date: 03/24/2022
10+
ms.topic: overview
11+
ms.service: active-directory
12+
ms.subservice: enterprise-users
13+
ms.workload: identity
14+
services: active-directory
15+
ms.custom: "it-pro"
16+
17+
#Customer intent: As a new Azure AD identity administrator, access management requires me to understand the permissions of partners who have access to our resources.
18+
ms.collection: M365-identity-device-management
19+
---
20+
# What is delegated administration?
21+
22+
Managing permissions for external partners is a key part of your security posture. We’ve added capabilities to the Azure Active Directory (Azure AD) admin portal experience so that an administrator can see the relationships that their Azure AD tenant has with Microsoft Cloud Service Providers (CSP) who can manage the tenant. This permissions model is called delegated administration. This article introduces the Azure AD administrator to the relationship between the old Delegated Admin Permissions (DAP) permission model and the new Granular Delegated Admin Permissions (GDAP) permission model.
23+
24+
## Delegated administration relationships
25+
26+
Delegated administration relationships enable technicians at a Microsoft CSP to administer Microsoft services such as Microsoft 365, Dynamics, 365, and Azure on behalf of your organization. These technicians administer these services for you using the same roles and permissions as administrators in your organization. These roles are assigned to security groups in the CSP’s Azure AD tenant, which is why CSP technicians don’t need user accounts in your tenant in order to administer services for you.
27+
28+
There are two types of delegated administration relationships that are visible in the Azure AD admin portal experience. The newer type of delegated admin relationship is known as Granular Delegated Admin Permission. The older type of relationship is known as Delegated Admin Permission. You can see both types of relationship if you sign in to the Azure AD admin portal and then select **Delegated administration**.
29+
30+
## Granular delegated admin permission
31+
32+
When a Microsoft CSP creates a GDAP relationship request for your tenant, a GDAP relationship is created in the tenant when a global administrator approves the request. The GDAP relationship request specifies:
33+
34+
* The CSP partner tenant
35+
* The roles that the partner needs to delegate to their technicians
36+
* The expiration date
37+
38+
If you have any GDAP relationships in your tenant, you will see a notification banner on the **Delegated Administration** page in the Azure AD admin portal. Select the notification banner to see and manage GDAP relationships in the **Partners** page in Microsoft Admin Center.
39+
40+
## Delegated admin permission
41+
42+
When a Microsoft CSP creates a DAP relationship request for your tenant, a GDAP relationship is created in the tenant when a global administrator approves the request. All DAP relationships enable the CSP to delegate Global administrator and Helpdesk administrator roles to their technicians. Unlike a GDAP relationship, a DAP relationship persists until they are revoked either by you or by your CSP.
43+
44+
If you have any DAP relationships in your tenant, you will see them in the list on the Delegated Administration page in the Azure AD admin portal. To remove a DAP relationship for a CSP, follow the link to the Partners page in the Microsoft Admin Center.
45+
46+
## Next steps
47+
48+
If you're a beginning Azure AD administrator, get the basics down in [Azure Active Directory Fundamentals](../fundamentals/index.yml).

articles/active-directory/governance/entitlement-management-access-package-first.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ For a step-by-step demonstration of the process of deploying Azure Active Direct
3939

4040
>[!VIDEO https://www.youtube.com/embed/zaaKvaaYwI4]
4141
42-
This rest of this article uses the Azure portal to configure and demonstrate Azure AD entitlement management. You can also follow a tutorial to [manage access to resources via Microsoft Graph](/graph/tutorial-access-package-api?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json) or [via PowerShell](/powershell/microsoftgraph/tutorial-entitlement-management?view=graph-powershell-beta).
42+
This rest of this article uses the Azure portal to configure and demonstrate Azure AD entitlement management.
4343

4444
## Prerequisites
4545

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,5 +173,4 @@ Here are some example license scenarios to help you determine the number of lice
173173

174174
- If you are interested in using the Azure portal to manage access to resources, see [Tutorial: Manage access to resources - Azure portal](entitlement-management-access-package-first.md).
175175
- if you are interested in using Microsoft Graph to manage access to resources, see [Tutorial: manage access to resources - Microsoft Graph](/graph/tutorial-access-package-api?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json)
176-
- If you are interested in using Microsoft PowerShell to manage access to resources, see [Tutorial: manage access to resources - PowerShell](/powershell/microsoftgraph/tutorial-entitlement-management?view=graph-powershell-beta)
177176
- [Common scenarios](entitlement-management-scenarios.md)

articles/active-directory/governance/identity-governance-automation.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,4 +208,3 @@ There are two places where you can see the expiration date in the Azure portal.
208208
## Next steps
209209

210210
- [Create an Automation account using the Azure portal](../../automation/quickstarts/create-account-portal.md)
211-
- [Manage access to resources in Active Directory entitlement management using Microsoft Graph PowerShell](/powershell/microsoftgraph/tutorial-entitlement-management?view=graph-powershell-beta)

articles/active-directory/hybrid/plan-connect-design-concepts.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -180,6 +180,9 @@ When you are selecting the attribute for providing the value of UPN to be used i
180180

181181
In express settings, the assumed choice for the attribute is userPrincipalName. If the userPrincipalName attribute does not contain the value you want your users to sign in to Azure, then you must choose **Custom Installation**.
182182

183+
>[!NOTE]
184+
>It's recommended as a best practice that the UPN prefix contains more than one character.
185+
183186
### Custom domain state and UPN
184187
It is important to ensure that there is a verified domain for the UPN suffix.
185188

articles/active-directory/roles/delegate-by-task.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ You can further restrict permissions by assigning roles at smaller scopes or by
124124
> [!div class="mx-tableFixed"]
125125
> | Task | Least privileged role | Additional roles |
126126
> | ---- | --------------------- | ---------------- |
127-
> | Create Azure AD Domain Services instance | [Application Administrator](../roles/permissions-reference.md#application-administrator) and [Groups Administrator](../roles/permissions-reference.md#groups-administrator)|[Domain Services Contributor](/azure/role-based-access-control/built-in-roles#domain-services-contributor) |
127+
> | Create Azure AD Domain Services instance | [Application Administrator](../roles/permissions-reference.md#application-administrator)<br>[Groups Administrator](../roles/permissions-reference.md#groups-administrator)<br> [Domain Services Contributor](/azure/role-based-access-control/built-in-roles#domain-services-contributor)| |
128128
> | Perform all Azure AD Domain Services tasks | [AAD DC Administrators group](../../active-directory-domain-services/tutorial-create-management-vm.md#administrative-tasks-you-can-perform-on-a-managed-domain) | |
129129
> | Read all configuration | Reader on Azure subscription containing AD DS service | |
130130

articles/aks/coredns-custom.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -43,15 +43,15 @@ metadata:
4343
namespace: kube-system
4444
data:
4545
test.server: | # you may select any name here, but it must end with the .server file extension
46-
<domain to be rewritten>.com:53 {
47-
log
48-
errors
49-
rewrite stop {
50-
name regex (.*)\.<domain to be rewritten>.com {1}.default.svc.cluster.local
51-
answer name (.*)\.default\.svc\.cluster\.local {1}.<domain to be rewritten>.com
52-
}
53-
forward . /etc/resolv.conf # you can redirect this to a specific DNS server such as 10.0.0.10, but that server must be able to resolve the rewritten domain name
54-
}
46+
<domain to be rewritten>.com:53 {
47+
log
48+
errors
49+
rewrite stop {
50+
name regex (.*)\.<domain to be rewritten>.com {1}.default.svc.cluster.local
51+
answer name (.*)\.default\.svc\.cluster\.local {1}.<domain to be rewritten>.com
52+
}
53+
forward . /etc/resolv.conf # you can redirect this to a specific DNS server such as 10.0.0.10, but that server must be able to resolve the rewritten domain name
54+
}
5555
```
5656
5757
> [!IMPORTANT]

0 commit comments

Comments
 (0)