You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,27 +2,29 @@
2
2
3
3
Thank you for taking the time to contribute to the Microsoft Azure documentation.
4
4
5
-
This guide covers some general topics related to contribution and refers to the [contributors guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
5
+
This guide covers some general topics related to contribution and refers to the [contributor guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
6
6
7
7
## Code of Conduct
8
8
9
9
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
10
-
For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/), or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
10
+
11
+
For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
11
12
12
13
## How can I contribute?
13
14
14
-
There are many ways to contribute to the documentation, review the sections below to find out which one is right for you.
15
+
There are many ways to contribute to the documentation. Review the following sections to find out which one is right for you.
15
16
16
-
### Reporting Bugs and Suggesting Enhancements
17
+
### Reporting bugs and suggesting enhancements
17
18
18
19
Please use the Feedback tool at the bottom of any article to submit bugs and suggestions.
19
20
20
21

21
22
22
23
### Editing in GitHub
23
24
24
-
Follow the guidance for [Quick edits to existing documents](/contribute/#quick-edits-to-existing-documents) in our contributors guide.
25
+
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-existing-documents) in our contributor guide.
26
+
27
+
### Pull requests
25
28
26
-
### Pull Request
29
+
Review the guidance for [pull requests](https://docs.microsoft.com/contribute/how-to-write-workflows-major#pull-request-processing) and the contribution workflow in our contributor guide.
27
30
28
-
Review the guidance for [Pull Requests](/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.
If there was an outage of the primary authentication service, the Azure Active Directory (Azure AD) Backup Authentication Service may automatically issue access tokens to applications for existing sessions. This functionality may significantly increase Azure AD resilience, because reauthentications for existing sessions account for more than 90% of authentications to Azure AD. The Backup Authentication Service doesn't support new sessions or authentications by guest users.
21
21
@@ -24,7 +24,10 @@ For authentications protected by Conditional Access, policies are reevaluated be
24
24
1. Which Conditional Access policies apply?
25
25
1. For policies that do apply, were the required controls are satisfied?
26
26
27
-
During an outage, not all conditions can be evaluated in real time by the Backup Authentication Service to determine whether a Conditional Access policy should apply. Conditional Access resilience defaults are a new session control that lets admins decide whether to block authentications during an outage whenever a policy condition cannot be evaluated in real-time or allow policies to be evaluated using data collected at the beginning of the user’s session.
27
+
During an outage, not all conditions can be evaluated in real time by the Backup Authentication Service to determine whether a Conditional Access policy should apply. Conditional Access resilience defaults are a new session control that lets admins decide between:
28
+
29
+
- Whether to block authentications during an outage whenever a policy condition can’t be evaluated in real-time.
30
+
- Allow policies to be evaluated using data collected at the beginning of the user’s session.
28
31
29
32
> [!IMPORTANT]
30
33
> Resilience defaults are automatically enabled for all new and existing policies, and Microsoft highly recommends leaving the resilience defaults enabled to mitigate the impact of an outage. Admins may disable resilience defaults for individual Conditional Access policies.
@@ -58,7 +61,7 @@ When resilience defaults are enabled, the Backup Authentication Service may use
58
61
59
62
## Resilience defaults disabled
60
63
61
-
When resilience defaults are disabled, the Backup Authentication Service won't use data collected at the beginning of the session to evaluate conditions. During an outage, if a policy condition cannot be evaluated in real-time, access will be denied.
64
+
When resilience defaults are disabled, the Backup Authentication Service won't use data collected at the beginning of the session to evaluate conditions. During an outage, if a policy condition can’t be evaluated in real-time, access will be denied.
62
65
63
66
**Example**: A policy with resilience defaults disabled requires all global admins accessing the Azure portal to do MFA. Before an outage, if a user who isn't a global admin accesses the Azure portal, the policy wouldn't apply, and the user would be granted access without being prompted for MFA. During an outage, the Backup Authentication Service would reevaluate the policy to determine whether the user should be prompted for MFA. **Since the Backup Authentication Service cannot evaluate role membership in real-time, it would block the user from accessing the Azure Portal.**
64
67
@@ -67,7 +70,7 @@ When resilience defaults are disabled, the Backup Authentication Service won't u
67
70
68
71
## Testing resilience defaults
69
72
70
-
It isn't possible to conduct a dry run using the Backup Authentication Service or simulate the result of a policy with resilience defaults enabled or disabled at this time. Azure AD will conduct monthly exercises using the Backup Authentication Service and the sign-in logs will display if the Backup Authentication Service was used to issue the access token.
73
+
It isn't possible to conduct a dry run using the Backup Authentication Service or simulate the result of a policy with resilience defaults enabled or disabled at this time. Azure AD will conduct monthly exercises using the Backup Authentication Service. The sign-in logs will display if the Backup Authentication Service was used to issue the access token.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/security-best-practices-for-app-registration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ It's important to keep Redirect URIs of your application up to date. A lapse in
49
49
50
50
## Implicit flow token configuration
51
51
52
-
Scenarios that require**implicit flow** can now use **Auth code flow** to reduce the risk of compromise associated with implicit grant flow misuse. If you configured your application registration to get Access tokens using implicit flow, but don't actively use it, we recommend you turn off the setting to protect from misuse.
52
+
Scenarios that required**implicit flow** can now use **Auth code flow** to reduce the risk of compromise associated with implicit grant flow misuse. If you configured your application registration to get Access tokens using implicit flow, but don't actively use it, we recommend you turn off the setting to protect from misuse.
53
53
54
54

Copy file name to clipboardExpand all lines: articles/active-directory/devices/enterprise-state-roaming-enable.md
+14-15Lines changed: 14 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,14 +11,13 @@ ms.date: 02/15/2022
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
13
13
manager: karenhoran
14
-
ms.reviewer: na
14
+
ms.reviewer: guovivian
15
15
ms.custom: references_regions
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
# Enable Enterprise State Roaming in Azure Active Directory
19
19
20
-
Enterprise State Roaming is available to any organization with an Azure AD Premium or Enterprise Mobility + Security
21
-
(EMS) license. For more information on how to get an Azure AD subscription, see the [Azure AD product page](https://azure.microsoft.com/services/active-directory).
20
+
Enterprise State Roaming is available to any organization with an Azure AD Premium or Enterprise Mobility + Security (EMS) license. For more information on how to get an Azure AD subscription, see the [Azure AD product page](https://azure.microsoft.com/services/active-directory).
22
21
23
22
When you enable Enterprise State Roaming, your organization is automatically granted a free, limited-use license for Azure Rights Management protection from Azure Information Protection. This free subscription is limited to encrypting and decrypting enterprise settings and application data synced by Enterprise State Roaming. You must have [a paid subscription](https://azure.microsoft.com/services/information-protection/) to use the full capabilities of the Azure Rights Management service.
24
23
@@ -27,17 +26,17 @@ When you enable Enterprise State Roaming, your organization is automatically gra
27
26
28
27
## To enable Enterprise State Roaming
29
28
30
-
1. Sign in to [Azure AD admin center](https://aad.portal.azure.com/).
31
-
1.Select**Azure Active Directory** > **Devices** > **Enterprise State Roaming**.
29
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
30
+
1.Browse to**Azure Active Directory** > **Devices** > **Enterprise State Roaming**.
32
31
1. Select **Users may sync settings and app data across devices**. For more information, see [how to configure device settings](./device-management-azure-portal.md).
33
32
34
33

35
34
36
-
For a Windows 10 or newer device to use the Enterprise State Roaming service, the device must authenticate using an Azure AD identity. For devices that are joined to Azure AD, the user’s primary sign-in identity is their Azure AD identity, so no additional configuration is required. For devices that use on-premises Active Directory, the IT admin must [Configure hybrid Azure Active Directory joined devices](./hybrid-azuread-join-plan.md).
35
+
For a Windows 10 or newer device to use the Enterprise State Roaming service, the device must authenticate using an Azure AD identity. For devices that are joined to Azure AD, the user’s primary sign-in identity is their Azure AD identity, so no other configuration is required. For devices that use on-premises Active Directory, the IT admin must [Configure hybrid Azure Active Directory joined devices](./hybrid-azuread-join-plan.md).
37
36
38
37
## Data storage
39
38
40
-
Enterprise State Roaming data is hosted in one or more [Azure regions](https://azure.microsoft.com/regions/) that best align with the country/region value set in the Azure Active Directory instance. Enterprise State Roaming data is partitioned based on three major geographic regions: North America, EMEA, and APAC. Enterprise State Roaming data for the tenant is locally located with the geographical region, and is not replicated across regions. For example:
39
+
Enterprise State Roaming data is hosted in one or more [Azure regions](https://azure.microsoft.com/regions/) that best align with the country/region value set in the Azure Active Directory instance. Enterprise State Roaming data is partitioned based on three major geographic regions: North America, EMEA, and APAC. Enterprise State Roaming data for the tenant is locally located with the geographical region, and isn't replicated across regions. For example:
41
40
42
41
| Country/region value | has their data hosted in |
@@ -46,7 +45,7 @@ Enterprise State Roaming data is hosted in one or more [Azure regions](https://a
46
45
| An APAC country/region such as Australia or New Zealand | One or more of the Azure regions within Asia |
47
46
| South American and Antarctica regions | One or more Azure regions within the US |
48
47
49
-
The country/region value is set as part of the Azure AD directory creation process and cannot be subsequently modified. If you need more details on your data storage location, file a ticket with [Azure support](https://azure.microsoft.com/support/options/).
48
+
The country/region value is set as part of the Azure AD directory creation process and can’t be modified later. If you need more details on your data storage location, file a ticket with [Azure support](https://azure.microsoft.com/support/options/).
50
49
51
50
## View per-user device sync status
52
51
@@ -60,27 +59,27 @@ Follow these steps to view a per-user device sync status report.
60
59
61
60
## Data retention
62
61
63
-
Data synced to the Microsoft cloud using Enterprise State Roaming is retained until it is manually deleted or until the data in question is determined to be stale.
62
+
Data synced to the Microsoft cloud using Enterprise State Roaming is retained until it's manually deleted or until the data is determined to be stale.
64
63
65
64
### Explicit deletion
66
65
67
-
Explicit deletion is when an Azure admin deletes a user or a directory or otherwise requests explicitly that data is to be deleted.
66
+
Explicit deletion is when an administrator deletes a user, directory, or requests explicitly that data is to be deleted.
68
67
69
68
***User deletion**: When a user is deleted in Azure AD, the user account roaming data is deleted after 90 to 180 days.
70
69
***Directory deletion**: Deleting an entire directory in Azure AD is an immediate operation. All the settings data associated with that directory is deleted after 90 to 180 days.
71
70
***On request deletion**: If the Azure AD admin wants to manually delete a specific user’s data or settings data, the admin can file a ticket with [Azure support](https://azure.microsoft.com/support/).
72
71
73
72
### Stale data deletion
74
73
75
-
Data that has not been accessed for one year (“the retention period”) will be treated as stale and may be deleted from the Microsoft cloud. The retention period is subject to change but will not be less than 90 days. The stale data may be a specific set of Windows/application settings or all settings for a user. For example:
74
+
Data that hasn't been accessed for one year (“the retention period”) will be treated as stale and may be deleted from the Microsoft cloud. The retention period is subject to change but won't be less than 90 days. The stale data may be a specific set of Windows/application settings or all settings for a user. For example:
76
75
77
-
* If no devices access a particular settings collection (for example, an application is removed from the device, or a settings group such as “Theme” is disabled for all of a user’s devices), then that collection becomes stale after the retention period and may be deleted.
78
-
* If a user has turned off settings sync on all their devices, then none of the settings data will be accessed, and all the settings data for that user will become stale and may be deleted after the retention period.
79
-
* If the Azure AD directory admin turns off Enterprise State Roaming for the entire directory, then all users in that directory will stop syncing settings, and all settings data for all users will become stale and may be deleted after the retention period.
76
+
* If no devices access a particular settings collection like language, then that collection becomes stale after the retention period and may be deleted.
77
+
* If a user has turned off settings sync on all their devices, then none of the settings data will be accessed. All the settings data for that user will become stale and may be deleted after the retention period.
78
+
* If the Azure AD directory admin turns off Enterprise State Roaming for the entire directory, then all users in that directory will stop syncing settings. All settings data for all users will become stale and may be deleted after the retention period.
80
79
81
80
### Deleted data recovery
82
81
83
-
The data retention policy is not configurable. Once the data is permanently deleted, it is not recoverable. However, The settings data is deleted only from the Microsoft cloud, not from the end-user device. If any device later reconnects to the Enterprise State Roaming service, the settings are again synced and stored in the Microsoft cloud.
82
+
The data retention policy isn't configurable. Once the data is permanently deleted, it isn't recoverable. However, The settings data is deleted only from the Microsoft cloud, not from the end-user device. If any device later reconnects to the Enterprise State Roaming service, the settings are again synced and stored in the Microsoft cloud.
0 commit comments