Skip to content

Commit 49c4b9c

Browse files
authored
Merge pull request #87539 from MicrosoftDocs/master
9/5 AM Publish
2 parents aebe5a1 + 24c22ba commit 49c4b9c

File tree

111 files changed

+1710
-679
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

111 files changed

+1710
-679
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16884,6 +16884,11 @@
1688416884
"redirect_url": "/azure/service-fabric/service-fabric-tutorial-deploy-app-to-party-cluster",
1688516885
"redirect_document_id": false
1688616886
},
16887+
{
16888+
"source_path": "articles/migrate/how-to-prepare-linux-for-migration.md",
16889+
"redirect_url": "tutorial-prepare-vmware",
16890+
"redirect_document_id": false
16891+
},
1688716892
{
1688816893
"source_path": "articles/migrate/how-to-create-group-dependencies.md",
1688916894
"redirect_url": "how-to-create-a-group#refine-a-group-with-dependency-mapping",

articles/active-directory/reports-monitoring/reference-sign-ins-error-codes.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -150,6 +150,8 @@ You can also programmatically access the sign-in data using the [reporting API](
150150
|70018|Invalid verification code due to User typing in wrong user code for device code flow. Authorization is not approved.|
151151
|70019|Verification code expired. Have the user retry the sign-in.|
152152
|70037|Incorrect challenge response provided. Remote auth session denied.|
153+
|70043|Azure Conditional Access session management forces the session to expire|
154+
|70044|Azure Conditional Access session management forces the session to expire|
153155
|75001|An error occurred during SAML message binding.|
154156
|75003|The application returned an error related to unsupported Binding (SAML protocol response cannot be sent via bindings other than HTTP POST). Contact the application owner.|
155157
|75005|Azure AD doesn’t support the SAML Request sent by the application for Single Sign-on. Contact the application owner.|

articles/active-directory/users-groups-roles/roles-create-custom.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create a custom role definition in Azure AD role-based access control - Azure Active Directory | Microsoft Docs
3-
description: Create custom Azure AD roles with resource scope on Azure Active Directory resources.
2+
title: Create and assign a custom role in Azure AD role-based access control - Azure Active Directory | Microsoft Docs
3+
description: Create and assign custom Azure AD roles with resource scope on Azure Active Directory resources.
44
services: active-directory
55
author: curtand
66
manager: mtillman
@@ -9,20 +9,20 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: users-groups-roles
1111
ms.topic: article
12-
ms.date: 07/31/2019
12+
ms.date: 09/04/2019
1313
ms.author: curtand
1414
ms.reviewer: vincesm
1515
ms.custom: it-pro
1616

1717
ms.collection: M365-identity-device-management
1818
---
19-
# Create a custom role and assign at resource scope in Azure Active Directory
19+
# Create and assign a custom role in Azure Active Directory
2020

21-
This article describes how to create new custom roles in Azure Active Directory (Azure AD). Custom roles can be created in the [Roles and administrators](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators) tab on the Azure AD overview page. The role can be assigned either at the directory-level scope or an app registration resource scope only.
21+
This article describes how to create new custom roles in Azure Active Directory (Azure AD). For the basics of custom roles, see the [custom roles overview](roles-custom-overview.md). The role can be assigned either at the directory-level scope or an app registration resource scope only.
2222

23-
For more information, see the [custom roles overview](roles-custom-overview.md) for the basics of custom roles.
23+
Custom roles can be created in the [Roles and administrators](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators) tab on the Azure AD overview page.
2424

25-
## Using the Azure AD portal
25+
## Create a role in the Azure portal
2626

2727
### Create a new custom role to grant access to manage app registrations
2828

@@ -45,22 +45,7 @@ For more information, see the [custom roles overview](roles-custom-overview.md)
4545

4646
Your custom role will show up in the list of available roles to assign.
4747

48-
## Assign a role scoped to a resource
49-
50-
Like built-in roles, custom roles can be assigned at organization-wide scope to grant access over all app registrations. But custom roles can also be assigned at resource scope. This allows you to give the assignee the permission to update credentials and basic properties of a single app without having to create a second custom role.
51-
52-
1. If not already, sign in to the [Azure AD admin center](https://aad.portal.azure.com) with Application developer permissions in the Azure AD organization.
53-
1. Select **App registrations**.
54-
1. Select the app registration to which you are granting access to manage. You might have to select **All applications** to see the complete list of app registrations in your Azure AD organization.
55-
56-
![Select the app registration as a resource scope for a role assignment](./media/roles-create-custom/appreg-all-apps.png)
57-
58-
1. In the app registration, select **Roles and administrators**. If you haven't already created one, instructions are in the [preceding procedure](#create-a-new-custom-role-to-grant-access-to-manage-app-registrations).
59-
60-
1. Select the role to open the **Assignments** page.
61-
1. Select **Add assignment** to add a user. The user won't be granted any permissions over any app registration other than the selected one.
62-
63-
## Create a custom role using Azure AD PowerShell
48+
## Create a role using PowerShell
6449

6550
### Prepare PowerShell
6651

@@ -121,7 +106,7 @@ $resourceScope = '/' + $appRegistration.objectId
121106
$roleAssignment = New-AzureADMSRoleAssignment -ResourceScope $resourceScope -RoleDefinitionId $roleDefinition.Id -PrincipalId $user.objectId
122107
```
123108

124-
## Create a custom role using Microsoft Graph API
109+
## Create a role with Graph API
125110

126111
1. Create the role definition.
127112

@@ -172,6 +157,21 @@ $roleAssignment = New-AzureADMSRoleAssignment -ResourceScope $resourceScope -Rol
172157
}
173158
```
174159
160+
## Assign a custom role scoped to a resource
161+
162+
Like built-in roles, custom roles are assigned by default at the default organization-wide scope to grant access permissions over all app registrations in your organization. But unlike built-in roles, custom roles can also be assigned at the scope of a single Azure AD resource. This allows you to give the user the permission to update credentials and basic properties of a single app without having to create a second custom role.
163+
164+
1. Sign in to the [Azure AD admin center](https://aad.portal.azure.com) with Application developer permissions in the Azure AD organization.
165+
1. Select **App registrations**.
166+
1. Select the app registration to which you are granting access to manage. You might have to select **All applications** to see the complete list of app registrations in your Azure AD organization.
167+
168+
![Select the app registration as a resource scope for a role assignment](./media/roles-create-custom/appreg-all-apps.png)
169+
170+
1. In the app registration, select **Roles and administrators**. If you haven't already created one, instructions are in the [preceding procedure](#create-a-new-custom-role-to-grant-access-to-manage-app-registrations).
171+
172+
1. Select the role to open the **Assignments** page.
173+
1. Select **Add assignment** to add a user. The user will be granted any permissions over only the selected app registration.
174+
175175
## Next steps
176176
177177
- Feel free to share with us on the [Azure AD administrative roles forum](https://feedback.azure.com/forums/169401-azure-active-directory?category_id=166032).

articles/active-directory/users-groups-roles/roles-custom-overview.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: users-groups-roles
1010
ms.topic: article
11-
ms.date: 07/31/2019
11+
ms.date: 09/04/2019
1212
ms.author: curtand
1313
ms.reviewer: vincesm
1414
ms.custom: it-pro
@@ -18,30 +18,31 @@ ms.collection: M365-identity-device-management
1818

1919
# Custom administrator roles in Azure Active Directory (preview)
2020

21-
This article describes how to understand the new custom roles-based access control (RBAC) and resource scopes in Azure Active Directory (Azure AD). Custom RBAC roles surfaces the underlying permissions of the [built-in roles](directory-assign-admin-roles.md) , so you can create and organize your own custom roles. This approach allows you to grant access in a more granular way than built-in roles, when needed. This first release of custom RBAC roles includes the ability to create a role to assign permissions for managing app registrations. Over time, additional permissions for organization resources like enterprise applications, users, and devices will be added.
21+
This article describes how to understand Azure AD custom roles in Azure Active Directory (Azure AD) with roles-based access control and resource scopes. Custom Azure AD roles surface the underlying permissions of the [built-in roles](directory-assign-admin-roles.md), so that you can create and organize your own custom roles. This approach allows you to grant access in a more granular way than built-in roles, whenever they're needed. This first release of Azure AD custom roles includes the ability to create a role to assign permissions for managing app registrations. Over time, additional permissions for organization resources like enterprise applications, users, and devices will be added.
2222

23-
Additionally, custom RBAC roles support assignments on a per-resource basis, in addition to the more traditional organization-wide assignments. This approach gives you the ability to grant access to manage some resources (for example, one app registration) without giving access to all resources (all app registrations).
23+
Additionally, Azure AD custom roles support assignments on a per-resource basis, in addition to the more traditional organization-wide assignments. This approach gives you the ability to grant access to manage some resources (for example, one app registration) without giving access to all resources (all app registrations).
2424

2525
Azure AD role-based access control is a public preview feature of Azure AD and is available with any paid Azure AD license plan. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2626

2727
## Understand Azure AD role-based access control
2828

29-
Granting permission using custom RBAC roles is a two-step process that involves creating a custom role definition and then assigning it using a role assignment. A custom role definition is a collection of permissions that you add from a preset list. These permissions are the same permissions used in the built-in roles.
29+
Granting permission using custom Azure AD roles is a two-step process that involves creating a custom role definition and then assigning it using a role assignment. A custom role definition is a collection of permissions that you add from a preset list. These permissions are the same permissions used in the built-in roles.
3030

31-
Once you’ve created your role definition, you can assign it to someone by creating a role assignment. A role assignment grants someone the permissions in a role definition at a specific scope. This two-step process allows you to create one role definition and assign it many times at different scopes. A scope defines the set of resources the role member has access to. The most common scope is organization-wide (org-wide) scope. A custom role can be assigned at org-wide scope, meaning the role member has the role permissions over all resources in the organization. A custom role can also be assigned at an object scope. An example of an object scope would be a single application. This way the same role can be assigned to Sally over all applications in the organization and then Naveen over just the Contoso Expense Reports app.
31+
Once you’ve created your role definition, you can assign it to a user by creating a role assignment. A role assignment grants the user the permissions in a role definition at a specified scope. This two-step process allows you to create a single role definition and assign it many times at different scopes. A scope defines the set of Azure AD resources the role member has access to. The most common scope is organization-wide (org-wide) scope. A custom role can be assigned at org-wide scope, meaning the role member has the role permissions over all resources in the organization. A custom role can also be assigned at an object scope. An example of an object scope would be a single application. The same role can be assigned to one user over all applications in the organization and then to another user with a scope of only the Contoso Expense Reports app.
3232

33-
Azure AD RBAC operates on concepts similar to [Azure role-based access control](../../role-based-access-control/overview.md). The difference being Azure RBAC controls access to Azure resources such as virtual machines and websites, and Azure AD RBAC controls access to Azure AD. Both systems leverage the concept of role definitions and role assignments.
33+
Azure AD built-in and custom roles operate on concepts similar to [Azure role-based access control](../../role-based-access-control/overview.md). The [difference between these two role-based access control systems](../../role-based-access-control/rbac-and-directory-admin-roles.md) is that Azure RBAC controls access to Azure resources such as virtual machines or storage using Azure Resource Management, and Azure AD custom roles control access to Azure AD resources using Graph API. Both systems leverage the concept of role definitions and role assignments.
3434

3535
### Role assignments
3636

37-
A role assignment is the process of attaching a role definition to a user at a particular scope for the purpose of granting access. Access is granted by creating a role assignment, and access is revoked by removing a role assignment. A role assignment consists of three elements:
38-
- User
37+
A role assignment is the object that attaches a role definition to a user at a particular scope to grant Azure AD resource access. Access is granted by creating a role assignment, and access is revoked by removing a role assignment. At its core, a role assignment consists of three elements:
38+
39+
- User (an individual who has a user profile in Azure Active Directory)
3940
- Role definition
4041
- Resource scope
4142

42-
You can [create role assignments](roles-create-custom.md) using the Azure portal, Azure AD PowerShell, or Graph API. You can also [view the assignments for a custom role](roles-view-assignments.md#view-the-assignments-of-a-role-with-single-application-scope-using-the-azure-ad-portal-preview).
43+
You can [create role assignments](roles-create-custom.md) using the Azure portal, Azure AD PowerShell, or Graph API. You can also [view the assignments for a custom role](roles-view-assignments.md#view-the-assignments-of-a-role).
4344

44-
The following diagram shows an example of a role assignment. In this example, Chris Green has been assigned the App registration administrator custom role at the scope of the Contoso Widget Builder app registration. This assignment grants Chris the permissions of the App registration administrator role only on this specific app registration.
45+
The following diagram shows an example of a role assignment. In this example, Chris Green has been assigned the App registration administrator custom role at the scope of the Contoso Widget Builder app registration. The assignment grants Chris the permissions of the App registration administrator role for only this specific app registration.
4546

4647
![Role assignment is how permissions are enforced and has three parts](./media/roles-custom-overview/rbac-overview.png)
4748

@@ -53,7 +54,7 @@ A security principal represents the user that is to be assigned access to Azure
5354

5455
A role definition, or role, is a collection of permissions. A role definition lists the operations that can be performed on Azure AD resources, such as create, read, update, and delete. There are two types of roles in Azure AD:
5556

56-
- Built-in roles created by Microsoft that can't be changed. The Global administrator built-in role has all permissions on all Azure AD resources.
57+
- Built-in roles created by Microsoft that can't be changed.
5758
- Custom roles created and managed by your organization.
5859

5960
### Scope
@@ -62,7 +63,7 @@ A scope is the restriction of permitted actions to a particular Azure AD resourc
6263

6364
> [!Note]
6465
> Custom roles can be assigned at directory scope and resource scoped. They cannot yet be assigned at Administrative Unit scope.
65-
> Built-in roles can can be assigned at directory scope, and in some cases Administrative Unit scope. They cannot yet be assigned at object scope.
66+
> Built-in roles can can be assigned at directory scope, and in some cases, Administrative Unit scope. They cannot yet be assigned at Azure AD resource scope.
6667
6768
## Required license plan
6869

@@ -71,4 +72,4 @@ A scope is the restriction of permitted actions to a particular Azure AD resourc
7172
## Next steps
7273

7374
- Create custom role assignments using [the Azure portal, Azure AD PowerShell, and Graph API](roles-create-custom.md)
74-
- [View the assignments for a custom role](roles-view-assignments.md#view-the-assignments-of-a-role-with-single-application-scope-using-the-azure-ad-portal-preview)
75+
- [View the assignments for a custom role](roles-view-assignments.md#view-assignments-of-a-role-with-single-application-scope-preview)

articles/active-directory/users-groups-roles/roles-delegate-app-roles.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.workload: identity
1212
ms.subservice: users-groups-roles
1313
ms.topic: article
14-
ms.date: 08/06/2019
14+
ms.date: 09/04/2019
1515
ms.author: curtand
1616
ms.reviewer: vincesm
1717
ms.custom: it-pro
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
# Delegate app registration permissions in Azure Active Directory
2424

25-
This article describes how to use app permissions in custom roles in Azure Active Directory (Azure AD) to address your application management needs. Azure Active Directory (Azure AD) allows you to delegate Application creation and management permissions in the following ways:
25+
This article describes how to use permissions granted by custom roles in Azure Active Directory (Azure AD) to address your application management needs. In Azure AD, you can delegate Application creation and management permissions in the following ways:
2626

2727
- [Restricting who can create applications](#restrict-who-can-create-applications) and manage the applications they create. By default in Azure AD, all users can register application registrations and manage all aspects of applications they create. This can be restricted to only allow selected people that permission.
2828
- [Assigning one or more owners to an application](#assign-application-owners). This is a simple way to grant someone the ability to manage all aspects of Azure AD configuration for a specific application.
@@ -38,7 +38,7 @@ By default in Azure AD, all users can register application registrations and man
3838
### To disable the default ability to create application registrations or consent to applications
3939

4040
1. Sign in to your Azure AD organization with an account that eligible for the Global administrator role in your Azure AD organization.
41-
1. When you have obtained sufficient permissions, set one or both of the following:
41+
1. Set one or both of the following:
4242

4343
- On the [User settings page for your organization](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/UserSettings), set the **Users can register applications** setting to No. This will disable the default ability for users to create application registrations.
4444
- On the [user settings for enterprise applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/UserSettings/menuId/), set the **Users can consent to applications accessing company data on their behalf** setting to No. This will disable the default ability for users to consent to applications accessing company data on their behalf.

0 commit comments

Comments
 (0)