Skip to content

Commit 5a1d601

Browse files
authored
Merge pull request #57689 from MicrosoftDocs/master
11/9 PM Publish
2 parents 96527c1 + 672ad49 commit 5a1d601

File tree

136 files changed

+2328
-830
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

136 files changed

+2328
-830
lines changed

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ To enable / disable a device, you have two options:
150150
**Remarks:**
151151

152152
- You need to be a global administrator in Azure AD to enable / disable a device.
153-
- Disabling a device prevents a device from accessing your Azure AD resources.
153+
- Disabling a device prevents a device from successfully authenticating with Azure AD, therby preventing the device from accessing your Azure AD resources that are guarded by device CA or using your WH4B credentials.
154154

155155

156156

articles/active-directory/devices/faq.md

Lines changed: 55 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -18,29 +18,10 @@ ms.author: markvi
1818
ms.reviewer: jairoc
1919

2020
---
21-
# Azure Active Directory device management FAQ
22-
23-
**Q: Can I register Android or iOS BYOD devices?**
24-
25-
**A:** Yes, but only with Azure device registration service and for hybrid customers. It is not supported with on-premises device registration service in AD FS.
26-
27-
**Q: How can I register a macOS device?**
28-
29-
**A:** To register macOS device:
30-
31-
1. [Create a compliance policy](https://docs.microsoft.com/intune/compliance-policy-create-mac-os)
32-
2. [Define a conditional access policy for macOS devices](../active-directory-conditional-access-azure-portal.md)
3321

34-
**Remarks:**
35-
36-
- The users that are included in your conditional access policy need a [supported version of Office for macOS](../conditional-access/technical-reference.md#client-apps-condition) to access resources.
37-
38-
- During the first access attempt, your users are prompted to enroll the device using the company portal.
39-
40-
---
41-
42-
**Q: I registered the device recently. Why can’t I see the device under my user info in the Azure portal?**
22+
# Azure Active Directory device management FAQ
4323

24+
**Q: I registered the device recently. Why can’t I see the device under my user info in the Azure portal? Or Why is device owner marked as N/A for hybrid Azure AD joined devices?**
4425
**A:** Windows 10 devices that are hybrid Azure AD joined do not show up under the USER devices.
4526
You need to use All devices view in Azure portal. You can also use PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice?view=azureadps-1.0) cmdlet.
4627

@@ -54,15 +35,20 @@ Only the following devices are listed under the USER devices:
5435

5536
**Q: How do I know what the device registration state of the client is?**
5637

57-
**A:** You can use the Azure portal, go to All devices and search for the device using device ID. Check the value under the join type column.
58-
59-
If you want to check the local device registration state from a registered device:
38+
**A:** You can use the Azure portal, go to All devices and search for the device using device ID. Check the value under the join type column. Sometimes, the device could have been reset or re-imaged. So, it is essential to also check device registration state on the device too:
6039

6140
- For Windows 10 and Windows Server 2016 or later devices, run dsregcmd.exe /status.
6241
- For down-level OS versions, run "%programFiles%\Microsoft Workplace Join\autoworkplace.exe"
6342

6443
---
6544

45+
**Q: I see the device record under the USER info in the Azure portal and can see the state as registered on the device. Am I setup correctly for using conditional access?**
46+
47+
**A:** The device join state, reflected by deviceID, must match with that on Azure AD and meet any evaluation criteria for conditional access.
48+
For more information, see [Require managed devices for cloud app access with conditional access](../conditional-access/require-managed-devices.md).
49+
50+
---
51+
6652
**Q: I have deleted in the Azure portal or using Windows PowerShell, but the local state on the device says that it is still registered?**
6753

6854
**A:** This is by design. The device will not have access to resources in the cloud.
@@ -83,25 +69,6 @@ For down-level Windows OS versions that are on-premises AD domain-joined:
8369
2. Type `"%programFiles%\Microsoft Workplace Join\autoworkplace.exe /l"`.
8470
3. Type `"%programFiles%\Microsoft Workplace Join\autoworkplace.exe /j"`.
8571

86-
---
87-
**Q: How do I unjoin an Azure AD Joined device locally on the device?**
88-
89-
**A:**
90-
- For hybrid Azure AD Joined devices, make sure to turn off auto registration so that the scheduled task does not register the device again. Next, open command prompt as an administrator and type `dsregcmd.exe /debug /leave`. Alternatively, this command can be run as a script across multiple devices to unjoin in bulk.
91-
92-
- For pure Azure AD Joined devices, make sure you have an offline local administrator account or create one, as you won't be able to sign in with any Azure AD user credentials. Next, go to **Settings** > **Accounts** > **Access Work or School**. Select your account and click on **Disconnect**. Follow the prompts and provide the local administrator credentials when prompted. Reboot the device to complete the unjoin process.
93-
94-
---
95-
96-
**Q: My users cannot search printers from Azure AD Joined devices. How can I enable printing from Azure AD Joined devices ?**
97-
98-
**A:** For deploying printers for Azure AD Joined devices, see [Hybrid cloud print](https://docs.microsoft.com/windows-server/administration/hybrid-cloud-print/hybrid-cloud-print-deploy). You will need an on-premises Windows Server to deploy hybrid cloud print. Currently, cloud-based print service is not available.
99-
100-
---
101-
102-
**Q: How do I connect to a remote Azure AD joined device?**
103-
**A:** Refer to the article https://docs.microsoft.com/windows/client-management/connect-to-remote-aadj-pc for details.
104-
10572
---
10673

10774
**Q: Why do I see duplicate device entries in Azure portal?**
@@ -124,7 +91,27 @@ For down-level Windows OS versions that are on-premises AD domain-joined:
12491

12592
>[!Note]
12693
>For enrolled devices, we recommend wiping the device to ensure that users cannot access the resources. For more information, see [Enroll devices for management in Intune](https://docs.microsoft.com/intune/deploy-use/enroll-devices-in-microsoft-intune).
94+
---
95+
96+
# Azure AD Join FAQ
97+
98+
**Q: How do I unjoin an Azure AD Joined device locally on the device?**
99+
100+
**A:**
101+
- For hybrid Azure AD Joined devices, make sure to turn off auto registration so that the scheduled task does not register the device again. Next, open command prompt as an administrator and type `dsregcmd.exe /debug /leave`. Alternatively, this command can be run as a script across multiple devices to unjoin in bulk.
102+
103+
- For pure Azure AD Joined devices, make sure you have an offline local administrator account or create one, as you won't be able to sign in with any Azure AD user credentials. Next, go to **Settings** > **Accounts** > **Access Work or School**. Select your account and click on **Disconnect**. Follow the prompts and provide the local administrator credentials when prompted. Reboot the device to complete the unjoin process.
104+
105+
---
106+
107+
**Q: My users cannot search printers from Azure AD Joined devices. How can I enable printing from Azure AD Joined devices ?**
108+
109+
**A:** For deploying printers for Azure AD Joined devices, see [Hybrid cloud print](https://docs.microsoft.com/windows-server/administration/hybrid-cloud-print/hybrid-cloud-print-deploy). You will need an on-premises Windows Server to deploy hybrid cloud print. Currently, cloud-based print service is not available.
127110

111+
---
112+
113+
**Q: How do I connect to a remote Azure AD joined device?**
114+
**A:** Refer to the article https://docs.microsoft.com/windows/client-management/connect-to-remote-aadj-pc for details.
128115

129116
---
130117

@@ -141,13 +128,6 @@ Please evaluate the conditional access policy rules and ensure that the device i
141128

142129
---
143130

144-
**Q: I see the device record under the USER info in the Azure portal and can see the state as registered on the device. Am I setup correctly for using conditional access?**
145-
146-
**A:** The device join state, reflected by deviceID, must match with that on Azure AD and meet any evaluation criteria for conditional access.
147-
For more information, see [Require managed devices for cloud app access with conditional access](../conditional-access/require-managed-devices.md).
148-
149-
---
150-
151131
**Q: Why do I get a "username or password is incorrect" message for a device I have just joined to Azure AD?**
152132

153133
**A:** Common reasons for this scenario are:
@@ -156,7 +136,7 @@ For more information, see [Require managed devices for cloud app access with con
156136

157137
- Your computer is unable to communicate with Azure Active Directory. Check for any network connectivity issues.
158138

159-
- Federated logins requires your federation server to support a WS-Trust active endpoint.
139+
- Federated logins requires your federation server to support WS-Trust endpoints enabled and accessible.
160140

161141
- You have enabled Pass through Authentication and the user has a temporary password that needs to be changed on logon.
162142

@@ -168,15 +148,16 @@ For more information, see [Require managed devices for cloud app access with con
168148

169149
---
170150

171-
**Q: Why did my attempt to join a PC fail although I didn't get any error information?**
151+
**Q: Why did my attempt to Azure AD join a PC fail although I didn't get any error information?**
172152

173153
**A:** A likely cause is that the user is logged in to the device using the local built-in administrator account.
174154
Please create a different local account before using Azure Active Directory Join to complete the setup.
175155

176-
177156
---
178157

179-
**Q: Where can I find troubleshooting information about the automatic device registration?**
158+
# Hybrid Azure AD Join FAQ
159+
160+
**Q: Where can I find troubleshooting information for diagnosing hybrid Azure AD join failures?**
180161

181162
**A:** For troubleshooting information, see:
182163

@@ -187,3 +168,23 @@ Please create a different local account before using Azure Active Directory Join
187168

188169
---
189170

171+
# Azure AD Register FAQ
172+
173+
**Q: Can I register Android or iOS BYOD devices?**
174+
175+
**A:** Yes, but only with Azure device registration service and for hybrid customers. It is not supported with on-premises device registration service in AD FS.
176+
177+
**Q: How can I register a macOS device?**
178+
179+
**A:** To register macOS device:
180+
181+
1. [Create a compliance policy](https://docs.microsoft.com/intune/compliance-policy-create-mac-os)
182+
2. [Define a conditional access policy for macOS devices](../active-directory-conditional-access-azure-portal.md)
183+
184+
**Remarks:**
185+
186+
- The users that are included in your conditional access policy need a [supported version of Office for macOS](../conditional-access/technical-reference.md#client-apps-condition) to access resources.
187+
188+
- During the first access attempt, your users are prompted to enroll the device using the company portal.
189+
190+
---

articles/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 09/19/2017
16+
ms.date: 11/10/2018
1717
ms.author: daveba
1818
---
1919

@@ -29,20 +29,16 @@ In this article, you learn how to enable and disable system and user-assigned ma
2929

3030
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md).
3131
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
32-
- To perform the management operations in this article, your account needs the following Azure role based access control assignments:
33-
34-
> [!NOTE]
35-
> No additional Azure AD directory role assignments required.
36-
37-
- [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) to enable and remove system-assigned managed identity from an Azure VM.
3832

3933
## System-assigned managed identity
4034

4135
In this section, you learn how to enable and disable the system-assigned managed identity for VM using the Azure portal.
4236

4337
### Enable system-assigned managed identity during creation of a VM
4438

45-
To enable system-assigned managed identity during the creation of a VM, under the **Management** tab in the **Identity** section, switch **Managed service identity** to **On**.
39+
To enable system-assigned managed identity on a VM during its creation, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
40+
41+
- Under the **Management** tab in the **Identity** section, switch **Managed service identity** to **On**.
4642

4743
![Enable system-assigned identity during VM creation](./media/msi-qs-configure-portal-windows-vm/enable-system-assigned-identity-vm-creation.png)
4844

@@ -54,7 +50,7 @@ Refer to the following Quickstarts to create a VM:
5450

5551
### Enable system-assigned managed identity on an existing VM
5652

57-
To enable the system-assigned managed identity on a VM that was originally provisioned without it:
53+
To enable system-assigned managed identity on a VM that was originally provisioned without it, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
5854

5955
1. Sign in to the [Azure portal](https://portal.azure.com) using an account associated with the Azure subscription that contains the VM.
6056

@@ -66,6 +62,8 @@ To enable the system-assigned managed identity on a VM that was originally provi
6662

6763
### Remove system-assigned managed identity from a VM
6864

65+
To remove system-assigned managed identity from a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
66+
6967
If you have a Virtual Machine that no longer needs system-assigned managed identity:
7068

7169
1. Sign in to the [Azure portal](https://portal.azure.com) using an account associated with the Azure subscription that contains the VM.
@@ -82,13 +80,17 @@ If you have a Virtual Machine that no longer needs system-assigned managed ident
8280

8381
### Assign a user-assigned identity during the creation of a VM
8482

83+
To assign a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) and [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignments. No additional Azure AD directory role assignments are required.
84+
8585
Currently, the Azure portal does not support assigning a user-assigned managed identity during the creation of a VM. Instead, refer to one of the following VM creation Quickstart articles to first create a VM, and then proceed to the next section for details on assigning a user-assigned managed identity to the VM:
8686

8787
- [Create a Windows virtual machine with the Azure portal](../../virtual-machines/windows/quick-create-portal.md#create-virtual-machine)
8888
- [Create a Linux virtual machine with the Azure portal](../../virtual-machines/linux/quick-create-portal.md#create-virtual-machine)
8989

9090
### Assign a user-assigned managed identity to an existing VM
9191

92+
To assign a user-assigned identity to a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) and [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignments. No additional Azure AD directory role assignments are required.
93+
9294
1. Sign in to the [Azure portal](https://portal.azure.com) using an account associated with the Azure subscription that contains the VM.
9395
2. Navigate to the desired VM and click **Identity**, **User assigned** and then **\+Add**.
9496

@@ -100,6 +102,8 @@ Currently, the Azure portal does not support assigning a user-assigned managed i
100102

101103
### Remove a user-assigned managed identity from a VM
102104

105+
To remove a user-assigned identity from a VM, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
106+
103107
1. Sign in to the [Azure portal](https://portal.azure.com) using an account associated with the Azure subscription that contains the VM.
104108
2. Navigate to the desired VM and click **Identity**, **User assigned**, the name of the user-assigned managed identity you want to delete and then click **Remove** (click **Yes** in the confirmation pane).
105109

articles/active-directory/users-groups-roles/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,8 @@
128128
href: directory-assign-admin-roles.md
129129
- name: View and assign roles
130130
href: directory-manage-roles-portal.md
131+
- name: Least-privileged roles by task
132+
href: roles-delegate-by-task.md
131133
- name: Administrator role security
132134
items:
133135
- name: Role security planning

0 commit comments

Comments
 (0)