Skip to content

Commit 674716b

Browse files
authored
Merge pull request #232814 from MicrosoftDocs/main
3/30 AM Publish
2 parents 97bb2a3 + dbc2dbf commit 674716b

File tree

337 files changed

+7321
-3509
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

337 files changed

+7321
-3509
lines changed

articles/active-directory-b2c/user-profile-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Your Azure Active Directory B2C (Azure AD B2C) directory user profile comes with
2121
Most of the attributes that can be used with Azure AD B2C user profiles are also supported by Microsoft Graph. This article describes supported Azure AD B2C user profile attributes. It also notes those attributes that are not supported by Microsoft Graph, as well as Microsoft Graph attributes that should not be used with Azure AD B2C.
2222

2323
> [!IMPORTANT]
24-
> You should'nt use built-in or extension attributes to store sensitive personal data, such as account credentials, government identification numbers, cardholder data, financial account data, healthcare information, or sensitive background information.
24+
> You shouldn't use built-in or extension attributes to store sensitive personal data, such as account credentials, government identification numbers, cardholder data, financial account data, healthcare information, or sensitive background information.
2525
2626
You can also integrate with external systems. For example, you can use Azure AD B2C for authentication, but delegate to an external customer relationship management (CRM) or customer loyalty database as the authoritative source of customer data. For more information, see the [remote profile](https://github.com/azure-ad-b2c/samples/tree/master/policies/remote-profile) solution.
2727

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 03/27/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -192,15 +192,15 @@ Migrating user data doesn't remove or alter any data in the Multi-Factor Authent
192192

193193
The MFA Server Migration utility targets a single Azure AD group for all migration activities. You can add users directly to this group, or add other groups. You can also add them in stages during the migration.
194194

195-
To begin the migration process, enter the name or GUID of the Azure AD group you want to migrate. Once complete, press Tab or click outside the window and the utility will begin searching for the appropriate group. The window will populate all users in the group. A large group can take several minutes to finish.
195+
To begin the migration process, enter the name or GUID of the Azure AD group you want to migrate. Once complete, press Tab or click outside the window to begin searching for the appropriate group. All users in the group are populated. A large group can take several minutes to finish.
196196

197197
To view attribute data for a user, highlight the user, and select **View**:
198198

199199
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/view-user.png" alt-text="Screenshot of how to view use settings.":::
200200

201-
This window displays the attributes for the selected user in both Azure AD and the on-premises MFA Server. You can use this window to view how data was written to a user after they’ve been migrated.
201+
This window displays the attributes for the selected user in both Azure AD and the on-premises MFA Server. You can use this window to view how data was written to a user after migration.
202202

203-
The settings option allows you to change the settings for the migration process:
203+
The **Settings** option allows you to change the settings for the migration process:
204204

205205
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/settings.png" alt-text="Screenshot of settings.":::
206206

@@ -209,17 +209,21 @@ The settings option allows you to change the settings for the migration process:
209209
- The migration utility tries direct matching to UPN before using the on-premises Active Directory attribute.
210210
- If no match is found, it calls a Windows API to find the Azure AD UPN and get the SID, which it uses to search the MFA Server user list.
211211
- If the Windows API doesn’t find the user or the SID isn’t found in the MFA Server, then it will use the configured Active Directory attribute to find the user in the on-premises Active Directory, and then use the SID to search the MFA Server user list.
212-
- Automatic synchronization – Starts a background service that will continually monitor any authentication method changes to users in the on-premises MFA Server, and write them to Azure AD at the specified time interval defined
212+
- Automatic synchronization – Starts a background service that will continually monitor any authentication method changes to users in the on-premises MFA Server, and write them to Azure AD at the specified time interval defined.
213+
- Synchronization server – Allows the MFA Server Migration Sync service to run on a secondary MFA Server rather than only run on the primary. To configure the Migration Sync service to run on a secondary server, the `Configure-MultiFactorAuthMigrationUtility.ps1` script must be run on the server to register a certificate with the MFA Server Migration Utility app registration. The certificate is used to authenticate to Microsoft Graph.
213214

214-
The migration process can be an automatic process, or a manual process.
215+
The migration process can be automatic or manual.
215216

216217
The manual process steps are:
217218

218219
1. To begin the migration process for a user or selection of multiple users, press and hold the Ctrl key while selecting each of the user(s) you wish to migrate.
219220
1. After you select the desired users, click **Migrate Users** > **Selected users** > **OK**.
220221
1. To migrate all users in the group, click **Migrate Users** > **All users in AAD group** > **OK**.
222+
1. You can migrate users even if they are unchanged. By default, the utility is set to **Only migrate users that have changed**. Click **Migrate all users** to re-migrate previously migrated users that are unchanged. Migrating unchanged users can be useful during testing if an administrator needs to reset a user’s Azure MFA settings and wants to re-migrate them.
221223

222-
For the automatic process, click **Automatic synchronization** in the settings dialog, and then select whether you want all users to be synced, or only members of a given Azure AD group.
224+
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/migrate-users.png" alt-text="Screenshot of Migrate users dialog.":::
225+
226+
For the automatic process, click **Automatic synchronization** in **Settings**, and then select whether you want all users to be synced, or only members of a given Azure AD group.
223227

224228
The following table lists the sync logic for the various methods.
225229

6.88 KB
Loading
8.87 KB
Loading

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,8 @@
122122
href: troubleshoot-conditional-access-what-if.md
123123
- name: Troubleshoot continuous access evaluation
124124
href: howto-continuous-access-evaluation-troubleshoot.md
125+
- name: Approved client app migration
126+
href: migrate-approved-client-app.md
125127
- name: Custom controls
126128
href: controls.md
127129
- name: Classic policies

articles/active-directory/conditional-access/howto-policy-approved-app-or-app-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,4 +94,4 @@ After confirming your settings using [report-only mode](howto-conditional-access
9494

9595
[Conditional Access common policies](concept-conditional-access-policy-common.md)
9696

97-
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
97+
[Migrate approved client app to application protection policy in Conditional Access](migrate-approved-client-app.md)
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Migrate approved client app to application protection policy in Conditional Access
3+
description: The approved client app control is going away. Migrate to App protection policies.
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: conditional-access
8+
ms.topic: how-to
9+
ms.date: 03/28/2023
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: amycolannino
14+
ms.reviewer: jogro
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Migrate approved client app to application protection policy in Conditional Access
19+
20+
In this article, you learn how to migrate from the approved client app Conditional Access grant to the application protection policy grant. App protection policies provide the same data loss and protection as approved client app policies, but with other benefits. For more information about the benefits of using app protection policies, see the article [App protection policies overview](/mem/intune/apps/app-protection-policy).
21+
22+
The approved client app grant is retiring in early March 2026. Organizations must transition all current Conditional Access policies that use only the Require Approved Client App grant to Require Approved Client App or Application Protection Policy by March 2026. Additionally, for any new Conditional Access policy, only apply the Require application protection policy grant.
23+
24+
After March 2026, Microsoft will stop enforcing require approved client app control, and it will be as if this grant isn't selected. Use the following steps before March 2026 to protect your organization’s data.
25+
26+
## Edit an existing Conditional Access policy
27+
28+
Require approved client apps or app protection policy with mobile devices
29+
30+
The following steps make an existing Conditional Access policy require an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an app protection policy created in Microsoft Intune.
31+
32+
Organizations can choose to update their policies using the following steps.
33+
34+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
35+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
36+
1. Select a policy that uses the approved client app grant.
37+
1. Under **Access controls** > **Grant**, select **Grant access**.
38+
1. Select **Require approved client app** and **Require app protection policy**
39+
1. **For multiple controls** select **Require one of the selected controls**
40+
1. Confirm your settings and set **Enable policy** to **Report-only**.
41+
1. Select **Create** to create to enable your policy.
42+
43+
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
44+
45+
Repeat the previous steps on all of your policies that use the approved client app grant.
46+
47+
> [!WARNING]
48+
> Not all applications that are supported as approved applications or support application protection policies. For a list of some common client apps, see [App protection policy requirement](concept-conditional-access-grant.md#require-app-protection-policy). If your application is not listed there, contact the application developer.
49+
50+
## Create a Conditional Access policy
51+
52+
Require app protection policy with mobile devices
53+
54+
The following steps help create a Conditional Access policy requiring an approved client app or an app protection policy when using an iOS/iPadOS or Android device. This policy works in tandem with an [app protection policy created in Microsoft Intune](/mem/intune/apps/app-protection-policies).
55+
56+
Organizations can choose to deploy this policy using the following steps.
57+
58+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
59+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
60+
1. Select **New policy**.
61+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
62+
1. Under **Assignments**, select **Users or workload identities**.
63+
1. Under **Include**, select **All users**.
64+
1. Under **Exclude**, select **Users and groups** and exclude at least one account to prevent yourself from being locked out. If you don't exclude any accounts, you can't create the policy.
65+
1. Under **Cloud apps or actions**, select **All cloud apps**.
66+
1. Under **Conditions** > **Device platforms**, set **Configure** to **Yes**.
67+
1. Under **Include**, **Select device platforms**.
68+
1. Choose **Android** and **iOS**
69+
1. Select **Done**.
70+
1. Under **Access controls** > **Grant**, select **Grant access**.
71+
1. Select **Require approved client app** and **Require app protection policy**
72+
1. **For multiple controls** select **Require one of the selected controls**
73+
1. Confirm your settings and set **Enable policy** to **Report-only**.
74+
1. Select **Create** to create to enable your policy.
75+
76+
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
77+
78+
> [!NOTE]
79+
> If an app does not support **Require app protection policy**, end users trying to access resources from that app will be blocked.
80+
81+
## Next steps
82+
83+
For more information on application protection policies, see:
84+
85+
[App protection policies overview](/mem/intune/apps/app-protection-policy)

articles/active-directory/develop/console-quickstart-portal-nodejs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: OwenRichards1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
9-
ms.topic: portal
9+
ms.topic: conceptual
1010
ms.date: 08/22/2022
1111
ROBOTS: NOINDEX
1212
ms.author: owenrichards

articles/active-directory/develop/daemon-quickstart-portal-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: OwenRichards1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
9-
ms.topic: portal
9+
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.date: 08/22/2022
1212
ROBOTS: NOINDEX

articles/active-directory/develop/daemon-quickstart-portal-netcore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: OwenRichards1
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
9-
ms.topic: portal
9+
ms.topic: conceptual
1010
ms.workload: identity
1111
ms.date: 08/22/2022
1212
ROBOTS: NOINDEX

0 commit comments

Comments
 (0)