Skip to content

Commit 67c5529

Browse files
authored
Merge pull request #250102 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 9/1
2 parents a51c908 + e407ddf commit 67c5529

File tree

137 files changed

+1399
-920
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+1399
-920
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2523,6 +2523,11 @@
25232523
"redirect_url": "/azure/frontdoor/manager",
25242524
"redirect_document_id": false
25252525
},
2526+
{
2527+
"source_path_from_root": "/articles/frontdoor/standard-premium/faq.md",
2528+
"redirect_url": "/azure/frontdoor/front-door-faq",
2529+
"redirect_document_id": false
2530+
},
25262531
{
25272532
"source_path_from_root": "/articles/aks/aks-resource-health.md",
25282533
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ The following table lists the cookies used in Azure AD B2C.
4747
| `x-ms-cpim-ctx` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Context |
4848
| `x-ms-cpim-rp` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for storing membership data for the resource provider tenant. |
4949
| `x-ms-cpim-rc` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for storing the relay cookie. |
50+
| `x-ms-cpim-geo` | b2clogin.com, login.microsoftonline.com, branded domain | 1 Hour | Used as a hint to determine the resource tenants home geographic location. |
5051

5152
## Cross-Site request forgery token
5253

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Next, if one or more of the users that will need access to the application do no
4343
The following sections outline how to create extension attributes for a tenant with cloud only users, and for a tenant with Active Directory users.
4444

4545
## Create an extension attribute in a tenant with cloud only users
46-
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you do not have any users who need that attribute and originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
46+
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you have any users who need that attribute and do not originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
4747

4848
Once schema extensions are created, these extension attributes are automatically discovered when you next visit the provisioning page in the Azure portal, in most cases.
4949

@@ -82,7 +82,7 @@ Content-type: application/json
8282
"extension_inputAppId_extensionName": "extensionValue"
8383
}
8484
```
85-
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get).
85+
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get). Note that the Graph v1.0 does not by default return any of a user's directory extension attributes, unless the attributes are specified in the request as one of the properties to return.
8686

8787
```json
8888
GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_inputAppId_extensionName

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
10-
ms.date: 08/22/2023
10+
ms.date: 08/31/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -99,7 +99,7 @@ This setting allows configuration of lifetime for token issued by Azure Active D
9999

100100
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants. You can start by looking at the sign-in logs to understand which session lifetime policies were applied during sign-in.
101101

102-
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-in-log-activity-details.md#authentication-details).
102+
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see the [Learn about the sign-in log activity details](../reports-monitoring/concept-sign-in-log-activity-details.md) article.
103103

104104
![Screenshot of authentication details.](./media/concepts-azure-multi-factor-authentication-prompts-session-lifetime/details.png)
105105

articles/active-directory/enterprise-users/domains-admin-takeover.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 06/23/2022
12+
ms.date: 08/31/2023
1313
ms.author: barclayn
1414
ms.reviewer: sumitp
1515
ms.custom: it-pro, seo-update-azuread-jan, has-azure-ad-ps-ref
@@ -114,6 +114,7 @@ The key and templates aren't moved over when the unmanaged organization is in a
114114
Although RMS for individuals is designed to support Azure AD authentication to open protected content, it doesn't prevent users from also protecting content. If users did protect content with the RMS for individuals subscription, and the key and templates weren't moved over, that content isn't accessible after the domain takeover.
115115

116116
### Azure AD PowerShell cmdlets for the ForceTakeover option
117+
117118
You can see these cmdlets used in [PowerShell example](#powershell-example).
118119

119120
cmdlet | Usage

articles/active-directory/enterprise-users/licensing-groups-assign.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Assign licenses to a group
3-
description: How to assign licenses to users by means of Azure Active Directory group licensing
3+
description: How to assign licenses to users with Azure Active Directory group licensing
44
services: active-directory
55
keywords: Azure AD licensing
66
documentationcenter: ''
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.subservice: enterprise-users
1212
ms.topic: how-to
1313
ms.workload: identity
14-
ms.date: 06/24/2022
14+
ms.date: 08/31/2023
1515
ms.author: barclayn
1616
ms.reviewer: sumitp
1717
ms.custom: it-pro

articles/active-directory/enterprise-users/licensing-groups-resolve-problems.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.subservice: enterprise-users
1212
ms.topic: how-to
1313
ms.workload: identity
14-
ms.date: 06/24/2022
14+
ms.date: 08/31/2023
1515
ms.author: barclayn
1616
ms.reviewer: sumitp
1717
ms.custom: it-pro
@@ -63,8 +63,8 @@ To see which users and groups are consuming licenses, select a product. Under **
6363
**Problem:** One of the products that's specified in the group contains a service plan that conflicts with another service plan that's already assigned to the user via a different product. Some service plans are configured in a way that they can't be assigned to the same user as another, related service plan.
6464

6565
> [!TIP]
66-
> Exchange Online Plan1 and Plan2 were previously non-duplicable service plans. However, now they are service plans that can be duplicated.
67-
> If you are experiencing conflicts with these service plans, please try reprocessing them.
66+
> Previously, Exchange Online Plan1 and Plan2 were unique and couldn't be duplicated. Now, both service plans have been updated to allow duplication.
67+
> If you are experiencing conflicts with these service plans, try reprocessing them.
6868
6969
The decision about how to resolve conflicting product licenses always belongs to the administrator. Azure AD doesn't automatically resolve license conflicts.
7070

@@ -114,7 +114,7 @@ Updating license assignment on a user causes the proxy address calculation to be
114114
## LicenseAssignmentAttributeConcurrencyException in audit logs
115115
116116
**Problem:** User has LicenseAssignmentAttributeConcurrencyException for license assignment in audit logs.
117-
When group-based licensing tries to process concurrent license assignment of same license to a user, this exception is recorded on the user. This usually happens when a user is a member of more than one group with same assigned license. Azure AD will retry processing the user license and will resolve the issue. There is no action required from the customer to fix this issue.
117+
When group-based licensing tries to process concurrent license assignment of same license to a user, this exception is recorded on the user. This usually happens when a user is a member of more than one group with same assigned license. Azure AD retries processing the user license until the issue is resolved. There is no action required from the customer to fix this issue.
118118
119119
## More than one product license assigned to a group
120120

articles/active-directory/enterprise-users/users-revoke-access.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ author: barclayn
1010
ms.author: barclayn
1111
manager: amycolannino
1212
ms.reviewer: krbain
13-
ms.date: 06/24/2022
13+
ms.date: 08/31/2023
1414
ms.custom: it-pro, has-azure-ad-ps-ref
1515
ms.collection: M365-identity-device-management
1616
---
@@ -99,6 +99,7 @@ As an administrator in Azure Active Directory, open PowerShell, run ``Connect-Az
9999
100100
>[!NOTE]
101101
> For information on specific roles that can perform these steps review [Azure AD built-in roles](../roles/permissions-reference.md)
102+
102103
## When access is revoked
103104
104105
Once admins have taken the above steps, the user can't gain new tokens for any application tied to Azure Active Directory. The elapsed time between revocation and the user losing their access depends on how the application is granting access:

articles/active-directory/manage-apps/assign-user-or-group-access-portal.md

Lines changed: 21 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Assign users and groups
2+
title: Manage users and groups assignment to an application
33
description: Learn how to assign and unassign users, and groups, for an app using Azure Active Directory for identity management.
44
services: active-directory
55
author: omondiatieno
@@ -16,7 +16,7 @@ zone_pivot_groups: enterprise-apps-all
1616
#customer intent: As an admin, I want to manage user assignment for an app in Azure Active Directory using PowerShell
1717
---
1818

19-
# Assign users and groups to an application
19+
# Manage users and groups assignment to an application
2020

2121
This article shows you how to assign users and groups to an enterprise application in Azure Active Directory (Azure AD) using PowerShell. When you assign a user to an application, the application appears in the user's [My Apps](https://myapps.microsoft.com/) portal for easy access. If the application exposes app roles, you can also assign a specific app role to the user.
2222

@@ -36,13 +36,16 @@ To assign users to an enterprise application, you need:
3636
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3737
- Azure Active Directory Premium P1 or P2 for group-based assignment. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
3838

39-
39+
## Assign users, and groups, to an application
40+
4041
:::zone pivot="portal"
4142

4243
To assign a user or group account to an enterprise application:
4344

44-
1. Sign in to the [Azure portal](https://portal.azure.com), then select **Enterprise applications**, and then search for and select the application to which you want to assign the user or group account.
45-
1. Browse to **Azure Active Directory** > **Users and groups**, and then select **Add user/group**.
45+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
46+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
47+
1. Enter the name of the existing application in the search box, and then select the application from the search results.
48+
1. Select **Users and groups**, and then select **Add user/group**.
4649

4750
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to an application in your Azure AD tenant.":::
4851

@@ -51,12 +54,18 @@ To assign a user or group account to an enterprise application:
5154
1. Select **Select**.
5255
1. On the **Add Assignment** pane, select **Assign** at the bottom of the pane.
5356

57+
## Unassign users, and groups, from an application
58+
59+
1. Follow the steps on the [Assign users, and groups, to an application](#assign-users-and-groups-to-an-application) section to navigate to the **Users and groups** pane.
60+
1. Search for and select the user or group that you want to unassign from the application.
61+
1. Select **Remove** to unassign the user or group from the application.
62+
5463
:::zone-end
5564

5665
:::zone pivot="aad-powershell"
5766

5867
1. Open an elevated Windows PowerShell command prompt.
59-
1. Run `Connect-AzureAD -Scopes "Application.Read.All", "Directory.Read.All", "Application.ReadWrite.All", "Directory.ReadWrite.All"` and sign in with a Global Administrator user account.
68+
1. Run `Connect-AzureAD` and sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6069
1. Use the following script to assign a user and role to an application:
6170

6271
```powershell
@@ -118,7 +127,8 @@ This example assigns the user Britta Simon to the Microsoft Workplace Analytics
118127
## Unassign users, and groups, from an application
119128
120129
1. Open an elevated Windows PowerShell command prompt.
121-
1. Run `Connect-AzureAD -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"` and sign in with a Global Administrator user account. Use the following script to remove a user and role from an application.
130+
1. Run `Connect-AzureAD` and sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
131+
1. Use the following script to remove a user and role from an application.
122132
123133
```powershell
124134
# Store the proper parameters
@@ -165,7 +175,7 @@ $assignments | ForEach-Object {
165175
:::zone pivot="ms-powershell"
166176

167177
1. Open an elevated Windows PowerShell command prompt.
168-
1. Run `Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"` and sign in with a Global Administrator user account.
178+
1. Run `Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"` and sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
169179
1. Use the following script to assign a user and role to an application:
170180

171181
```powershell
@@ -194,7 +204,7 @@ New-MgUserAppRoleAssignment -UserId $userId -BodyParameter $params |
194204
## Unassign users, and groups, from an application
195205

196206
1. Open an elevated Windows PowerShell command prompt.
197-
1. Run `Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"` and sign in with a Global Administrator user account. Use the following script to remove a user and role from an application.
207+
1. Run `Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"` and sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator). Use the following script to remove a user and role from an application.
198208
```powershell
199209
# Get the user and the service principal
200210
@@ -229,7 +239,7 @@ $assignments | ForEach-Object {
229239

230240
:::zone pivot="ms-graph"
231241

232-
1. To assign users and groups to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
242+
1. To assign users and groups to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
233243

234244
You'll need to consent to the following permissions:
235245

@@ -269,6 +279,7 @@ $assignments | ForEach-Object {
269279
In the example, both the resource-servicePrincipal-id and resourceId represent the enterprise application.
270280
271281
## Unassign users, and groups, from an application
282+
272283
To unassign user and groups from the application, run the following query.
273284
274285
1. Get the enterprise application. Filter by displayName.

0 commit comments

Comments
 (0)