You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -217,7 +217,13 @@ The **Settings** option allows you to change the settings for the migration proc
217
217
218
218
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/settings.png" alt-text="Screenshot of settings.":::
219
219
220
-
- Migrate – This setting allows you to specify which method(s) should be migrated for the selection of users
220
+
- Migrate – there are three options for migrating the user's default authentication method:
221
+
- Always migrate
222
+
- Only migrate if not already set in Azure AD
223
+
- Set to the most secure method available if not already set in Azure AD
224
+
225
+
These options provide flexibility when you migrate the default method. In addition, the Authentication methods policy is checked during migration. If the default method being migrated isn't allowed by policy, it's set to the most secure method available instead.
226
+
221
227
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName:
222
228
- The migration utility tries direct matching to UPN before using the on-premises Active Directory attribute.
223
229
- If no match is found, it calls a Windows API to find the Azure AD UPN and get the SID, which it uses to search the MFA Server user list.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/certificate-credentials.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -138,4 +138,4 @@ Client assertions can be used anywhere a client secret would be used. For exampl
138
138
139
139
The [MSAL.NET library handles this scenario](msal-net-client-assertions.md) in a single line of code.
140
140
141
-
The [.NET Core daemon console application using Microsoft identity platform](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2) code sample on GitHub shows how an application uses its own credentials for authentication. It also shows how you can [create a self-signed certificate](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/1-Call-MSGraph#optional-use-the-automation-script) using the `New-SelfSignedCertificate` PowerShell cmdlet. You can also use the [app creation scripts](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/blob/master/1-Call-MSGraph/AppCreationScripts-withCert/AppCreationScripts.md) in the sample repo to create certificates, compute the thumbprint, and so on.
141
+
The [.NET Core daemon console application using Microsoft identity platform](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2) code sample on GitHub shows how an application uses its own credentials for authentication. It also shows how you can [create a self-signed certificate](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/1-Call-MSGraph#optional-use-the-automation-script) using the `New-SelfSignedCertificate` PowerShell cmdlet. You can also use the [app creation scripts](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/blob/master/1-Call-MSGraph/AppCreationScripts/AppCreationScripts.md) in the sample repo to create certificates, compute the thumbprint, and so on.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-spa-app-registration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ You've now completed the registration of your single-page application (SPA) and
49
49
50
50
Follow the [tutorial](tutorial-v2-javascript-auth-code.md) for further guidance.
51
51
52
-
## Redirect URI: [MSAL.js 1.0 with implicit flow](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-core)
52
+
## Redirect URI: [MSAL.js 1.0 with implicit flow](/javascript/api/overview/msal-overview)
53
53
54
54
Follow these steps to add a redirect URI for a single-page app that uses MSAL.js 1.3 or earlier and the implicit grant flow. Applications that use MSAL.js 1.3 or earlier do not support the auth code flow.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-spa-sign-in.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ The choice between a pop-up or redirect experience depends on your application f
34
34
35
35
- If you don't want users to move away from your main application page during authentication, we recommend the pop-up method. Because the authentication redirect happens in a pop-up window, the state of the main application is preserved.
36
36
37
-
- If users have browser constraints or policies where pop-up windows are disabled, you can use the redirect method. Use the redirect method with the Internet Explorer browser, because there are [known issues with pop-up windows on Internet Explorer](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-browser/docs/internet-explorer.md#popups).
37
+
- If users have browser constraints or policies where pop-up windows are disabled, you can use the redirect method. Use the redirect method with the Internet Explorer browser, because there are [known issues with pop-up windows on Internet Explorer](/azure/active-directory/develop/msal-js-use-ie-browser).
Copy file name to clipboardExpand all lines: articles/active-directory/enterprise-users/clean-up-stale-guest-accounts.md
+39-12Lines changed: 39 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,12 @@
1
1
---
2
-
title: Clean up stale guest accounts
3
-
description: Clean up stale guest accounts using access reviews
2
+
title: Monitor and clean up stale guest accounts
3
+
description: Monitor and clean up stale guest accounts using access reviews
4
4
services: active-directory
5
-
author: gargi-sinha
6
-
ms.author: gasinh
7
-
manager: martinco
8
-
ms.date: 08/29/2022
5
+
author: billmath
6
+
ms.author: billmath
7
+
manager: amycolannino
8
+
ms.date: 06/29/2023
9
+
ms.reviewer: gasinh
9
10
ms.topic: how-to
10
11
ms.service: active-directory
11
12
ms.subservice: enterprise-users
@@ -14,19 +15,45 @@ ms.custom: it-pro
14
15
ms.collection: M365-identity-device-management
15
16
---
16
17
17
-
# Clean up stale guest accounts using access reviews
18
+
# Monitor and clean up stale guest accounts using access reviews
18
19
19
-
As users collaborate with external partners, it’s possible that many guest accounts get created in Azure Active Directory (Azure AD) tenants over time. When collaboration ends and the users no longer access your tenant, the guest accounts may become stale. Admins can use Access Reviews to automatically review inactive guest users and block them from signing in, and later, delete them from the directory.
20
+
As users collaborate with external partners, it’s possible that many guest accounts get created in Azure Active Directory (Azure AD) tenants over time. When collaboration ends and the users no longer access your tenant, the guest accounts may become stale. Administrators can monitor guest accounts at scale using inactive guest insights. Administrators can also use Access Reviews to automatically review inactive guest users, block them from signing in, and, delete them from the directory.
20
21
21
22
Learn more about [how to manage inactive user accounts in Azure AD](../reports-monitoring/howto-manage-inactive-user-accounts.md).
22
23
23
-
There are a few recommended patterns that are effective at cleaning up stale guest accounts:
24
+
There are a few recommended patterns that are effective at monitoring and cleaning up stale guest accounts:
24
25
25
-
1.Create a multi-stage review whereby guests self-attest whether they still need access. A second-stage reviewer assesses results and makes a final decision. Guests with denied access are disabled and later deleted.
26
+
1.Monitor guest accounts at scale with intelligent insights into inactive guests in your organization using inactive guest report. Customize the inactivity threshold depending on your organization’s needs, narrow down the scope of guest users you want to monitor and identify the guest users that may be inactive.
26
27
27
-
2. Create a review to remove inactive external guests. Admins define inactive as period of days. They disable and later delete guests that don’t sign in to the tenant within that time frame. By default, this doesn't affect recently created users. [Learn more about how to identify inactive accounts](../reports-monitoring/howto-manage-inactive-user-accounts.md#how-to-detect-inactive-user-accounts).
28
+
2. Create a multi-stage review whereby guests self-attest whether they still need access. A second-stage reviewer assesses results and makes a final decision. Guests with denied access are disabled and later deleted.
29
+
30
+
3. Create a review to remove inactive external guests. Admins define inactive as period of days. They disable and later delete guests that don’t sign in to the tenant within that time frame. By default, this doesn't affect recently created users. [Learn more about how to identify inactive accounts](../reports-monitoring/howto-manage-inactive-user-accounts.md#how-to-detect-inactive-user-accounts).
31
+
32
+
Use the following instructions to learn how to enhance monitoring of inactive guest accounts at scale and create Access Reviews that follow these patterns. Consider the configuration recommendations and then make the needed changes that suit your environment.
33
+
34
+
## Monitor guest accounts at scale with inactive guest insights (Preview)
35
+
1. Sign in to the Azure portal and open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
36
+
37
+
2. Access the inactive guest account report by navigating to "Guest access governance" card and click on "View inactive guests"
38
+
39
+
3. You will see the inactive guest report which will provide insights about inactive guest users based on 90 days of inactivity. The threshold is set to 90 days by default but can be configured using "Edit inactivity threshold" based on your organization's needs.
40
+
41
+
4. The following insights are provided as part of this report:
42
+
43
+
- Guest account overview (total guests and inactive guests with further categorization of guests who have never signed in or signed in at least once)
44
+
- Guest inactivity distribution (Percentage distribution of guest users based on days since last sign in)
- Guest accounts summary (A tabular view with details of all guest accounts with insights into their activity state. The Activity state could be active or inactive based on the configured inactivity threshold)
47
+
48
+
5. The inactive days are calculated based on last sign in date if the user has signed in atleast once. For users who have never signed in, the inactive days are calculated based on creation date.
> When you access the report for the first time, the insights in this report may not be available immediately and may take some time to generate. If you are getting an error, please follow the instructions ensuring you have Microsoft Entra ID Governance license or wait for some time to see the report generated.
55
+
> The inactive days calculation is based on the 2 parameters (last sign in date and creation date). If both of the dates are not available in the system, then we consider User state change date i.e. the date when the user state was last changed. This will give us the closest accurate inactivity duration for those special situations.
28
56
29
-
Use the following instructions to learn how to create Access Reviews that follow these patterns. Consider the configuration recommendations and then make the needed changes that suit your environment.
30
57
31
58
## Create a multi-stage review for guests to self-attest continued access
0 commit comments