Skip to content

Commit 57fceee

Browse files
authored
Merge pull request #210579 from MicrosoftGuyJFlo/RoleCaseUpdate
[Azure AD] Conditional Access/Devices/Identity Protection Role Case U…
2 parents 2d73ce0 + cff0ef3 commit 57fceee

30 files changed

+69
-69
lines changed

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ When creating Conditional Access policies, administrators have asked for the abi
2222
There are multiple scenarios that organizations can now enable using filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
2323

2424
- **Restrict access to privileged resources**. For this example, lets say you want to allow access to Microsoft Azure Management from a user who is assigned a privilged role Global Admin, has satisfied multifactor authentication and accessing from a device that is [privileged or secure admin workstations](/security/compass/privileged-access-devices) and attested as compliant. For this scenario, organizations would create two Conditional Access policies:
25-
- Policy 1: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
26-
- Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block. Learn how to [update extensionAttributes on an Azure AD device object](/graph/api/device-update?view=graph-rest-1.0&tabs=http&preserve-view=true).
25+
- Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
26+
- Policy 2: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block. Learn how to [update extensionAttributes on an Azure AD device object](/graph/api/device-update?view=graph-rest-1.0&tabs=http&preserve-view=true).
2727
- **Block access to organization resources from devices running an unsupported Operating System**. For this example, lets say you want to block access to resources from Windows OS version older than Windows 10. For this scenario, organizations would create the following Conditional Access policy:
2828
- All users, accessing all cloud apps, excluding a filter for devices using rule expression device.operatingSystem equals Windows and device.operatingSystemVersion startsWith "10.0" and for Access controls, Block.
2929
- **Do not require multifactor authentication for specific accounts on specific devices**. For this example, lets say you want to not require multifactor authentication when using service accounts on specific devices like Teams phones or Surface Hub devices. For this scenario, organizations would create the following two Conditional Access policies:
@@ -42,14 +42,14 @@ Filter for devices is an option when creating a Conditional Access policy in the
4242
4343
The following steps will help create two Conditional Access policies to support the first scenario under [Common scenarios](#common-scenarios).
4444

45-
Policy 1: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
45+
Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
4646

47-
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
47+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
4848
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
4949
1. Select **New policy**.
5050
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
5151
1. Under **Assignments**, select **Users or workload identities**..
52-
1. Under **Include**, select **Directory roles** and choose **Global administrator**.
52+
1. Under **Include**, select **Directory roles** and choose **Global Administrator**.
5353

5454
> [!WARNING]
5555
> Conditional Access policies support built-in roles. Conditional Access policies are not enforced for other role types including [administrative unit-scoped](../roles/admin-units-assign-roles.md) or [custom roles](../roles/custom-create.md).
@@ -61,12 +61,12 @@ Policy 1: All users with the directory role of Global administrator, accessing t
6161
1. Confirm your settings and set **Enable policy** to **On**.
6262
1. Select **Create** to create to enable your policy.
6363

64-
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
64+
Policy 2: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
6565

6666
1. Select **New policy**.
6767
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
6868
1. Under **Assignments**, select **Users or workload identities**..
69-
1. Under **Include**, select **Directory roles** and choose **Global administrator**.
69+
1. Under **Include**, select **Directory roles** and choose **Global Administrator**.
7070

7171
> [!WARNING]
7272
> Conditional Access policies support built-in roles. Conditional Access policies are not enforced for other role types including [administrative unit-scoped](../roles/admin-units-assign-roles.md) or [custom roles](../roles/custom-create.md).

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The following options are available to include when creating a Conditional Acces
3535
- All guest and external users
3636
- This selection includes any [B2B guests and external users](../external-identities/external-identities-overview.md) including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
3737
- Directory roles
38-
- Allows administrators to select specific [built-in Azure AD directory roles](../roles/permissions-reference.md) used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types aren't supported, including administrative unit-scoped roles and custom roles.
38+
- Allows administrators to select specific [built-in Azure AD directory roles](../roles/permissions-reference.md) used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the Global Administrator role. Other role types aren't supported, including administrative unit-scoped roles and custom roles.
3939
- Users and groups
4040
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of user group in Azure AD, including dynamic or assigned security and distribution groups. Policy will be applied to nested users and groups.
4141

@@ -60,7 +60,7 @@ The following options are available to exclude when creating a Conditional Acces
6060
- All guest and external users
6161
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
6262
- Directory roles
63-
- Allows administrators to select specific Azure AD directory roles used to determine assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role.
63+
- Allows administrators to select specific Azure AD directory roles used to determine assignment. For example, organizations may create a more restrictive policy on users assigned the Global Administrator role.
6464
- Users and groups
6565
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of group in Azure AD, including dynamic or assigned security and distribution groups. Policy will be applied to nested users and groups.
6666

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ If you aren't using CAE-capable clients, your default access token lifetime will
121121

122122
### User condition change flow
123123

124-
In the following example, a Conditional Access administrator has configured a location based Conditional Access policy to only allow access from specific IP ranges:
124+
In the following example, a Conditional Access Administrator has configured a location based Conditional Access policy to only allow access from specific IP ranges:
125125

126126
![User condition event flow](./media/concept-continuous-access-evaluation/user-condition-change-flow.png)
127127

articles/active-directory/conditional-access/howto-conditional-access-insights-reporting.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,11 @@ To enable the insights and reporting workbook, your tenant must have a Log Analy
2525

2626
The following roles can access insights and reporting:
2727

28-
- Conditional Access administrator
28+
- Conditional Access Administrator
2929
- Security reader
3030
- Security administrator
31-
- Global reader
32-
- Global administrator
31+
- Global Reader
32+
- Global Administrator
3333

3434
Users also need one of the following Log Analytics workspace roles:
3535

@@ -101,7 +101,7 @@ You can also investigate the sign-ins of a specific user by searching for sign-i
101101

102102
To configure a Conditional Access policy in report-only mode:
103103

104-
1. Sign into the **Azure portal** as a Conditional Access administrator, security administrator, or global administrator.
104+
1. Sign into the **Azure portal** as a Conditional Access Administrator, security administrator, or Global Administrator.
105105
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
106106
1. Select an existing policy or create a new policy.
107107
1. Under **Enable policy** set the toggle to **Report-only** mode.

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,18 +55,18 @@ Organizations can choose to deploy this policy using the steps outlined below or
5555

5656
The following steps will help create a Conditional Access policy to require those assigned administrative roles to perform multifactor authentication.
5757

58-
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
58+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
5959
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
6060
1. Select **New policy**.
6161
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
6262
1. Under **Assignments**, select **Users or workload identities**.
6363
1. Under **Include**, select **Directory roles** and choose built-in roles like:
64-
- Global administrator
64+
- Global Administrator
6565
- Application administrator
6666
- Authentication Administrator
6767
- Billing administrator
6868
- Cloud application administrator
69-
- Conditional Access administrator
69+
- Conditional Access Administrator
7070
- Exchange administrator
7171
- Helpdesk administrator
7272
- Password administrator

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Organizations can choose to deploy this policy using the steps outlined below or
4848

4949
The following steps will help create a Conditional Access policy to require all users do multifactor authentication.
5050

51-
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
51+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
5252
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
5353
1. Select **New policy**.
5454
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

articles/active-directory/conditional-access/howto-conditional-access-policy-azure-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The following steps will help create a Conditional Access policy to require user
5151
> [!CAUTION]
5252
> Make sure you understand how Conditional Access works before setting up a policy to manage access to Microsoft Azure Management. Make sure you don't create conditions that could block your own access to the portal.
5353
54-
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
54+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
5555
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
5656
1. Select **New policy**.
5757
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

articles/active-directory/conditional-access/howto-conditional-access-policy-block-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The following steps will help create Conditional Access policies to block access
3939

4040
The first policy blocks access to all apps except for Microsoft 365 applications if not on a trusted location.
4141

42-
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
42+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
4343
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
4444
1. Select **New policy**.
4545
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

articles/active-directory/conditional-access/howto-conditional-access-policy-block-legacy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Organizations can choose to deploy this policy using the steps outlined below or
2727

2828
The following steps will help create a Conditional Access policy to block legacy authentication requests. This policy is put in to [Report-only mode](howto-conditional-access-insights-reporting.md) to start so administrators can determine the impact they'll have on existing users. When administrators are comfortable that the policy applies as they intend, they can switch to **On** or stage the deployment by adding specific groups and excluding others.
2929

30-
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
30+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
3131
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
3232
1. Select **New policy**.
3333
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

articles/active-directory/conditional-access/howto-conditional-access-policy-compliant-device.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Organizations can choose to deploy this policy using the steps outlined below or
3636

3737
The following steps will help create a Conditional Access policy to require devices accessing resources be marked as compliant with your organization's Intune compliance policies.
3838

39-
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
39+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
4040
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
4141
1. Select **New policy**.
4242
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

0 commit comments

Comments
 (0)