You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/access-tokens.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -260,9 +260,9 @@ Refresh tokens can be invalidated or revoked at any time, for different reasons.
260
260
|[Single sign-out](v1-protocols-openid-connect-code.md#single-sign-out) on web | Revoked | Stays alive | Revoked | Stays alive | Stays alive |
261
261
262
262
> [!NOTE]
263
-
> A "Non-password based" login is one where the user didn't type in a password to get it. For example, using your face with Windows Hello, a FIDO key, or a PIN.
263
+
> A "Non-password based" login is one where the user didn't type in a password to get it. For example, using your face with Windows Hello, a FIDO2 key, or a PIN.
264
264
>
265
-
> A known issue exists with the Windows Primary Refresh Token. If the PRT is obtained via a password, and then the user logs in via Hello, this does not change the origination of the PRT, and it will be revoked if the user changes their password.
265
+
> Primary Refresh Tokens (PRT) on Windows 10 are segregated based on the credential. For example, Windows Hello and password have their respective PRTs, isolated from one another. When a user signs-in with a Hello credential (PIN or biometrics) and then changes the password, the password based PRT obtained previously will be revoked. Signing back in with a password invalidates the old PRT and requests a new one.
266
266
>
267
267
> Refresh tokens aren't invalidated or revoked when used to fetch a new access token and refresh token.
If the user has already signed in, `acquireTokenSilentAsync()` allows apps to request tokens silently as shown in `initializeUI()`, in the `callGraphApiSilentButton` click handler:
288
288
289
289
```java
290
290
/**
291
-
* Once you've signed the user in,
292
-
* you can perform acquireTokenSilent to obtain resources without interrupting the user.
293
-
*/
291
+
* Once you've signed the user in,
292
+
* you can perform acquireTokenSilent to obtain resources without interrupting the user.
@@ -391,7 +391,7 @@ An example of a multiple account app is a mail app that allows you to work with
391
391
In the `MultipleAccountModeFragment.java` file, in `onCreateView()`, a multiple account app object (`IMultipleAccountPublicClientApplication`) is created using the config information stored in the `auth_config_multiple_account.json file`:
392
392
393
393
```java
394
-
// Creates a PublicClientApplication object with res/raw/auth_config_single_account.json
394
+
// Creates a PublicClientApplication object with res/raw/auth_config_multiple_account.json
The code to remove an account, and any cached tokens for the account, is in the `MultipleAccountModeFragment.java` file in `initializeUI()` in the handler for the remove account button. Before you can remove an account, you need an account object, which you obtain from MSALfunctions like `getAccounts()` and `acquireToken()`.Because removing an account is an asynchronous operation, the `onRemoved` callback is supplied to update the UI.
487
+
The code to remove an account, and any cached tokens for the account, is in the `MultipleAccountModeFragment.java` file in `initializeUI()` in the handler for the remove account button. Before you can remove an account, you need an account object, which you obtain from MSALmethods like `getAccounts()` and `acquireToken()`.Because removing an account is an asynchronous operation, the `onRemoved` callback is supplied to update the UI.
488
488
489
489
```java
490
490
/**
491
-
* Removes the selected account and cached tokens from this app (or device, if the device is in shared mode).
492
-
*/
491
+
* Removes the selected account and cached tokens from this app (or device, if the device is in shared mode).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/v2-supported-account-types.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ In the Microsoft Azure public Cloud, most types of apps can sign in users with a
37
37
- With their work or school or personal Microsoft account.
38
38
- With only personal Microsoft account.
39
39
> [!NOTE]
40
-
> Currently the Microsoft identity platform supports personal Microsoft accounts only by registering an app for **work or school or Microsoft personal accounts**, and then, restrict sign-in in the code for the application by specifying an Azure AD authority, when building the application, such as `https://login.onmicrosoftonline.com/consumers`.
40
+
> Currently the Microsoft identity platform supports personal Microsoft accounts only by registering an app for **work or school or Microsoft personal accounts**, and then, restrict sign-in in the code for the application by specifying an Azure AD authority, when building the application, such as `https://login.microsoftonline.com/consumers`.
41
41
42
42
- If you're writing a business to consumers application, you can also sign in users with their social identities, using Azure AD B2C.
43
43
@@ -57,4 +57,4 @@ Some account types can't be used with certain authentication flows. For instance
57
57
## Next steps
58
58
59
59
- Learn more about [Tenancy in Azure Active Directory](./single-and-multi-tenant-apps.md)
60
-
- Learn more about [National Clouds](./authentication-national-cloud.md)
60
+
- Learn more about [National Clouds](./authentication-national-cloud.md)
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/add-users-azure-active-directory.md
+20-14Lines changed: 20 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,60 +9,66 @@ ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: fundamentals
11
11
ms.topic: conceptual
12
-
ms.date: 04/01/2019
12
+
ms.date: 11/11/2019
13
13
ms.author: ajburnle
14
14
ms.reviewer: jeffsta
15
15
ms.custom: "it-pro, seodec18"
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
19
19
# Add or delete users using Azure Active Directory
20
-
Add new users or delete existing users from your Azure Active Directory (Azure AD) organization. To add or delete users you must be a User administrator or Global administrator.
20
+
21
+
Add new users or delete existing users from your Azure Active Directory (Azure AD) organization. To add or delete users you must be a User administrator or Global administrator.
21
22
22
23
## Add a new user
24
+
23
25
You can create a new user using the Azure Active Directory portal.
24
26
25
27
### To add a new user
28
+
26
29
1. Sign in to the [Azure portal](https://portal.azure.com/) as a User administrator for the organization.
27
30
28
31
2. Select **Azure Active Directory**, select **Users**, and then select **New user**.
29
32
30
33

31
34
32
-
3. On the **User** page, fill out the required information.
35
+
3. On the **New user** page, select **Create user** and then add the user's information.
33
36
34
37

35
38
36
-
-**Name (required).** The first and last name of the new user. For example, Mary Parker.
39
+
-**Name (required)**: The first and last name of the new user. For example, Chris Green.
40
+
41
+
-**User name (required)**: The user name of the new user. For example, [email protected].
37
42
38
-
-**User name (required).** The user name of the new user. For example, [email protected].
39
-
40
-
The domain part of the user name must use either the initial default domain name, <_yourdomainname_>.onmicrosoft.com, or a custom domain name, such as contoso.com. For more information about how to create a custom domain name, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md).
43
+
The domain part of the user name must use either the initial default domain name, <_yourdomainname_>.onmicrosoft.com, or a custom domain name in your Azure AD organization such as contoso.com. For more information about how to create a custom domain name, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md).
41
44
42
-
-**Profile.** Optionally, you can add more information about the user. You can also add user information at a later time. For more information about adding user info, see [How to add or change user profile information](active-directory-users-profile-azure-portal.md).
45
+
-**Groups**: You can add the user to one or more existing groups, or you can do it later. For more information about adding users to groups, see [How to create a basic group and add members](active-directory-groups-create-azure-portal.md).
43
46
44
-
-**Groups.** Optionally, you can add the user to one or more existing groups. You can also add the user to groups at a later time. For more information about adding users to groups, see [How to create a basic group and add members](active-directory-groups-create-azure-portal.md).
47
+
-**Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Azure AD. For more information about assigning roles, see [How to assign roles to users](active-directory-users-assign-role-azure-portal.md).
45
48
46
-
-**Directory role.** Optionally, you can add the user to an Azure AD administrator role. You can assign the user to be a Global administrator or one or more of the limited administrator roles in Azure AD. For more information about assigning roles, see [How to assign roles to users](active-directory-users-assign-role-azure-portal.md).
49
+
-**Job info**: You can add more information about the user here, or do it later. For more information about adding user info, see [How to add or change user profile information](active-directory-users-profile-azure-portal.md).
47
50
48
51
4. Copy the auto-generated password provided in the **Password** box. You'll need to give this password to the user for the initial sign-in process.
49
52
50
53
5. Select **Create**.
51
54
52
-
The user is created and added to your Azure AD tenant.
55
+
The user is created and added to your Azure AD organization.
53
56
54
57
## Add a new user within a hybrid environment
58
+
55
59
If you have an environment with both Azure Active Directory (cloud) and Windows Server Active Directory (on-premises), you can add new users by syncing the existing user account data. For more information about hybrid environments and users, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).
56
60
57
61
## Delete a user
62
+
58
63
You can delete an existing user using Azure Active Directory portal.
59
64
60
65
### To delete a user
66
+
61
67
1. Sign in to the [Azure portal](https://portal.azure.com/) using a User administrator account for the organization.
62
68
63
-
2. Select **Azure Active Directory**, select **Users**, and then search for and select the user you want to delete from your Azure AD tenant. For example, _Mary Parker_.
69
+
1. Select **Azure Active Directory**, select **Users**, and then search for and select the user you want to delete from your Azure AD tenant. For example, _Mary Parker_.
64
70
65
-
3. Select **Delete user**.
71
+
1. Select **Delete user**.
66
72
67
73

68
74
@@ -83,4 +89,4 @@ After you've added your users, you can perform the following basic processes:
83
89
84
90
-[Work with dynamic groups and users](../users-groups-roles/groups-create-rule.md)
85
91
86
-
Or you can perform other user management tasks, such as [adding guest users from another directory](../b2b/what-is-b2b.md) or [restoring a deleted user](active-directory-users-restore.md). For more information about other available actions, see [Azure Active Directory user management documentation](../users-groups-roles/index.yml).
92
+
Or you can perform other user management tasks, such as [adding guest users from another Azure AD organization](../b2b/what-is-b2b.md) or [restoring a deleted user](active-directory-users-restore.md). For more information about other available actions, see [Azure Active Directory user management documentation](../users-groups-roles/index.yml).
0 commit comments