Skip to content

Commit 6eb5d1c

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 159b9ac + 716c8e8 commit 6eb5d1c

File tree

87 files changed

+929
-366
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+929
-366
lines changed

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ If enabled for Authenticator Lite, users are prompted to register their account
138138
GET auditLogs/signIns
139139
```
140140

141-
If the sign-in was done by phone app notification, under **authenticationAppDeivceDetails** the **clientApp** field returns **microsoftAuthenticator** or **Outlook**.
141+
If the sign-in was done by phone app notification, under **authenticationAppDeviceDetails** the **clientApp** field returns **microsoftAuthenticator** or **Outlook**.
142142

143143
If a user has registered Authenticator Lite, the user’s registered authentication methods include **Microsoft Authenticator (in Outlook)**.
144144

articles/active-directory/devices/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@
5858
href: troubleshoot-device-dsregcmd.md
5959
- name: Troubleshoot hybrid Azure AD joined down level Windows devices
6060
href: troubleshoot-hybrid-join-windows-legacy.md
61+
- name: Local Administrator Password Solution
62+
href: howto-manage-local-admin-passwords.md
6163
- name: Manage device identities
6264
href: device-management-azure-portal.md
6365
- name: Troubleshooting Windows devices

articles/active-directory/devices/concept-primary-refresh-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ A PRT is invalidated in the following scenarios:
142142

143143
* **Invalid user**: If a user is deleted or disabled in Azure AD, their PRT is invalidated and can't be used to obtain tokens for applications. If a deleted or disabled user already signed in to a device before, cached sign-in would log them in, until CloudAP is aware of their invalid state. Once CloudAP determines that the user is invalid, it blocks subsequent logons. An invalid user is automatically blocked from sign in to new devices that don’t have their credentials cached.
144144
* **Invalid device**: If a device is deleted or disabled in Azure AD, the PRT obtained on that device is invalidated and can't be used to obtain tokens for other applications. If a user is already signed in to an invalid device, they can continue to do so. But all tokens on the device are invalidated and the user doesn't have SSO to any resources from that device.
145-
* **Password change**: After a user changes their password, the PRT obtained with the previous password is invalidated by Azure AD. Password change results in the user getting a new PRT. This invalidation can happen in two different ways:
145+
* **Password change**: If a user obtained the PRT with their password, the PRT is invalidated by Azure AD when the user changes their password. Password change results in the user getting a new PRT. This invalidation can happen in two different ways:
146146
* If user signs in to Windows with their new password, CloudAP discards the old PRT and requests Azure AD to issue a new PRT with their new password. If user doesn't have an internet connection, the new password can't be validated, Windows may require the user to enter their old password.
147147
* If a user has logged in with their old password or changed their password after signing into Windows, the old PRT is used for any WAM-based token requests. In this scenario, the user is prompted to reauthenticate during the WAM token request and a new PRT is issued.
148148
* **TPM issues**: Sometimes, a device’s TPM can falter or fail, leading to inaccessibility of keys secured by the TPM. In this case, the device is incapable of getting a PRT or requesting tokens using an existing PRT as it can't prove possession of the cryptographic keys. As a result, any existing PRT is invalidated by Azure AD. When Windows 10 detects a failure, it initiates a recovery flow to re-register the device with new cryptographic keys. With Hybrid Azure Ad join, just like the initial registration, the recovery happens silently without user input. For Azure AD joined or Azure AD registered devices, the recovery needs to be performed by a user who has administrator privileges on the device. In this scenario, the recovery flow is initiated by a Windows prompt that guides the user to successfully recover the device.
Lines changed: 160 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,160 @@
1+
---
2+
title: Use Windows Local Administrator Password Solution (LAPS) with Azure AD (preview)
3+
description: Manage your device's local administrator password with Azure AD LAPS.
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: devices
8+
ms.topic: how-to
9+
ms.date: 04/21/2023
10+
11+
ms.author: sandeo
12+
author: sandeo-MSFT
13+
ms.reviewer: joflore
14+
ms.custom: references_regions
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Windows Local Administrator Password Solution in Azure AD (preview)
19+
20+
> [!IMPORTANT]
21+
> Azure AD support for Windows Local Administrator Password Solution is currently in preview.
22+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
23+
24+
Every Windows device comes with a built-in local administrator account that you must secure and protect to mitigate any Pass-the-Hash (PtH) and lateral traversal attacks. Many customers have been using our standalone, on-premises [Local Administrator Password Solution (LAPS)](https://www.microsoft.com/download/details.aspx?id=46899) product for local administrator password management of their domain joined Windows machines. With Azure AD support for Windows LAPS, we're providing a consistent experience for both Azure AD joined and hybrid Azure AD joined devices.
25+
26+
Azure AD support for LAPS includes the following capabilities:
27+
28+
- **Enabling Windows LAPS with Azure AD** - Enable a tenant wide policy and a client-side policy to backup local administrator password to Azure AD.
29+
- **Local administrator password management** - Configure client-side policies to set account name, password age, length, complexity, manual password reset and so on.
30+
- **Recovering local administrator password** - Use API/Portal experiences for local administrator password recovery.
31+
- **Enumerating all Windows LAPS enabled devices** - Use API/Portal experiences to enumerate all Windows devices in Azure AD enabled with Windows LAPS.
32+
- **Authorization of local administrator password recovery** - Use role based access control (RBAC) policies with custom roles and administrative units.
33+
- **Auditing local administrator password update and recovery** - Use audit logs API/Portal experiences to monitor password update and recovery events.
34+
- **Conditional Access policies for local administrator password recovery** - Configure Conditional Access policies on directory roles that have the authorization of password recovery.
35+
36+
> [!NOTE]
37+
> Windows LAPS with Azure AD is not supported for Windows devices that are [Azure AD registered](concept-azure-ad-register.md).
38+
39+
Local Administrator Password Solution isn't supported on non-Windows platforms.
40+
41+
To learn about Windows LAPS in more detail, start with the following articles in the Windows documentation:
42+
43+
- [What is Windows LAPS?](/windows-server/identity/laps/laps-scenarios-azure-active-directory) – Introduction to Windows LAPS and the Windows LAPS documentation set.
44+
- [Windows LAPS CSP](/windows/client-management/mdm/laps-csp) – View the full details for LAPS settings and options. Intune policy for LAPS uses these settings to configure the LAPS CSP on devices.
45+
- [Microsoft Intune support for Windows LAPS](/mem/intune/protect/windows-laps-overview)
46+
- [Windows LAPS architecture](/windows-server/identity/laps/laps-concepts#windows-laps-architecture)
47+
48+
## Requirements
49+
50+
### Supported Azure regions and Windows distributions
51+
52+
This feature is now available in the following Azure clouds:
53+
54+
- Azure Global
55+
- Azure Government
56+
- Azure China 21Vianet
57+
58+
### Operating system updates
59+
60+
This feature is now available on the following Windows OS platforms with the specified update or later installed:
61+
62+
- [Windows 11 22H2 - April 11 2023 Update](https://support.microsoft.com/help/5025239)
63+
- [Windows 11 21H2 - April 11 2023 Update](https://support.microsoft.com/help/5025224)
64+
- [Windows 10 20H2, 21H2 and 22H2 - April 11 2023 Update](https://support.microsoft.com/help/5025221)
65+
- [Windows Server 2022 - April 11 2023 Update](https://support.microsoft.com/help/5025230)
66+
- [Windows Server 2019 - April 11 2023 Update](https://support.microsoft.com/help/5025229)
67+
68+
### Join types
69+
70+
LAPS is supported on Azure AD joined or hybrid Azure AD joined devices only. Azure AD registered devices aren't supported.
71+
72+
### License requirements
73+
74+
LAPS is available to all customers with Azure AD Free or higher licenses. Other related features like administrative units, custom roles, Conditional Access, and Intune have other licensing requirements.
75+
76+
### Required roles or permission
77+
78+
Other than the built-in Azure AD roles of Cloud Device Administrator, Intune Administrator, and Global Administrator that are granted *device.LocalCredentials.Read.All*, you can use [Azure AD custom roles](/azure/active-directory/roles/custom-create) or administrative units to authorize local administrator password recovery. For example,
79+
80+
- Custom roles must be assigned the *microsoft.directory/deviceLocalCredentials/password/read* permission to authorize local administrator password recovery. During the preview, you must create a custom role and grant permissions using the [Microsoft Graph API](/azure/active-directory/roles/custom-create#create-a-role-with-the-microsoft-graph-api) or [PowerShell](/azure/active-directory/roles/custom-create#create-a-role-using-powershell). Once you have created the custom role, you can assign it to users.
81+
82+
- You can also create an Azure AD [administrative unit](/azure/active-directory/roles/administrative-units), add devices, and assign the Cloud Device Administrator role scoped to the administrative unit to authorize local administrator password recovery.
83+
84+
## Enabling Windows LAPS with Azure AD
85+
86+
To enable Windows LAPS with Azure AD, you must take actions in Azure AD and the devices you wish to manage. We recommend organizations [manage Windows LAPS using Microsoft Intune](/mem/intune/protect/windows-laps-policy). However, if your devices are Azure AD joined but you're not using Microsoft Intune or Microsoft Intune isn't supported (like for Windows Server 2019/2022), you can still deploy Windows LAPS for Azure AD manually. For more information, see the article [Configure Windows LAPS policy settings](/windows-server/identity/laps/laps-management-policy-settings).
87+
88+
1. Sign in to the **Azure portal** as a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
89+
1. Browse to **Azure Active Directory** > **Devices** > **Device settings**
90+
1. Select **Yes** for the Enable Local Administrator Password Solution (LAPS) setting and select **Save**. You may also use the Microsoft Graph API [Update deviceRegistrationPolicy](/graph/api/deviceregistrationpolicy-update?view=graph-rest-beta&preserve-view=true).
91+
1. Configure a client-side policy and set the **BackUpDirectory** to be Azure AD.
92+
93+
- If you're using Microsoft Intune to manage client side policies, see [Manage Windows LAPS using Microsoft Intune](/mem/intune/protect/windows-laps-policy)
94+
- If you're using Group Policy Objects (GPO) to manage client side policies, see [Windows LAPS Group Policy](/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy)
95+
96+
## Recovering local administrator password
97+
98+
To view the local administrator password for a Windows device joined to Azure AD, you must be granted the *deviceLocalCredentials.Read.All* permission, and you must be assigned one of the following roles:
99+
100+
- [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator)
101+
- [Intune Service Administrator](../roles/permissions-reference.md#intune-administrator)
102+
- [Global Administrator](../roles/permissions-reference.md#global-administrator)
103+
104+
You can also use Microsoft Graph API [Get deviceLocalCredentialInfo](/graph/api/devicelocalcredentialinfo-get?view=graph-rest-beta&preserve-view=true) to recover local administrative password. If you use the Microsoft Graph API, the password returned is in Base64 encoded value that you need to decode before using it.
105+
106+
## List all Windows LAPS enable devices
107+
108+
To list all Windows LAPS enabled devices in Azure AD, you can browse to **Azure Active Directory** > **Devices** > **Local administrator password recovery (Preview)** or use the Microsoft Graph API.
109+
110+
## Auditing local administrator password update and recovery
111+
112+
To view audit events, you can browse to **Azure Active Directory** > **Devices** > **Audit logs**, then use the **Activity** filter and search for **Update device local administrator password** or **Recover device local administrator password** to view the audit events.
113+
114+
## Conditional Access policies for local administrator password recovery
115+
116+
Conditional Access policies can be scoped to the built-in roles like Cloud Device Administrator, Intune Administrator, and Global Administrator to protect access to recover local administrator passwords. You can find an example of a policy that requires multifactor authentication in the article, [Common Conditional Access policy: Require MFA for administrators](../conditional-access/howto-conditional-access-policy-admin-mfa.md).
117+
118+
> [!NOTE]
119+
> Other role types including administrative unit-scoped roles and custom roles aren't supported
120+
121+
## Frequently asked questions
122+
123+
### Is Windows LAPS with Azure AD management configuration supported using Group Policy Objects (GPO)?
124+
125+
Yes, for [hybrid Azure AD joined](concept-azure-ad-join-hybrid.md) devices only. See see [Windows LAPS Group Policy](/windows-server/identity/laps/laps-management-policy-settings#windows-laps-group-policy).
126+
127+
### Is Windows LAPS with Azure AD management configuration supported using MDM?
128+
129+
Yes, for [Azure AD join](concept-azure-ad-join.md)/[hybrid Azure AD join](concept-azure-ad-join-hybrid.md) ([co-managed](/mem/configmgr/comanage/overview)) devices. Customers can use [Microsoft Intune](/mem/intune/protect/windows-laps-overview) or any other third party MDM of their choice.
130+
131+
### What happens when a device is deleted in Azure AD?
132+
133+
When a device is deleted in Azure AD, the LAPS credential that was tied to that device is lost and the password that is stored in Azure AD is lost. Unless you have a custom workflow to retrieve LAPS passwords and store them externally, there's no method in Azure AD to recover the LAPS managed password for a deleted device.
134+
135+
### What roles are needed to recover LAPS passwords?
136+
137+
The following built-in roles Azure AD roles have permission to recover LAPS passwords: Global Administrator, Cloud Device Administrator, and Intune Administrator.
138+
139+
### What roles are needed to read LAPS metadata?
140+
141+
The following built-in roles are supported to view metadata about LAPS including the device name, last password rotation, and next password rotation: Global Administrator, Cloud Device Administrator, Intune Administrator, Helpdesk Administrator, Security Reader, Security Administrator, and Global Reader.
142+
143+
### Are custom roles supported?
144+
145+
Yes. If you have Azure AD Premium, you can create a custom role with the following RBAC permissions:
146+
147+
- To read LAPS metadata: *microsoft.directory/deviceLocalCredentials/standard/read*
148+
- To read LAPS passwords: *microsoft.directory/deviceLocalCredentials/password/read*
149+
150+
### What happens when the local administrator account specified by policy is changed?
151+
152+
Because Windows LAPS can only manage one local admin account on a device at a time, the original account is no longer managed by LAPS policy. If policy has the device back up that account, the new account is backed up and details about the previous account are no longer available from within the Intune admin center or from the Directory that is specified to store the account information.
153+
154+
## Next steps
155+
156+
- [Choosing a device identity](overview.md#modern-device-scenario)
157+
- [Microsoft Intune support for Windows LAPS](/mem/intune/protect/windows-laps-overview)
158+
- [Create policy for LAPS](/mem/intune/protect/windows-laps-policy)
159+
- [View reports for LAPS](/mem/intune/protect/windows-laps-reports)
160+
- [Account protection policy for endpoint security in Intune](/mem/intune/protect/endpoint-security-account-protection-policy)

articles/active-directory/fundamentals/how-to-create-delete-users.md

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,39 @@ When you invite an external guest user by sending an email invitation, you can c
159159

160160
![Screenshot of the user details with the invitation status options highlighted.](media/how-to-create-delete-users/external-user-invitation-state.png)
161161

162+
## Add other users
163+
164+
There might be scenarios in which you want to manually create consumer accounts in your Azure Active Directory B2C (Azure AD B2C) directory. For more information about creating consumer accounts, see [Create and delete consumer users in Azure AD B2C](../../active-directory-b2c/manage-users-portal.md).
165+
166+
If you have an environment with both Azure Active Directory (cloud) and Windows Server Active Directory (on-premises), you can add new users by syncing the existing user account data. For more information about hybrid environments and users, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).
167+
168+
## Delete a user
169+
170+
You can delete an existing user using Azure portal.
171+
172+
- You must have a Global Administrator, Privileged Authentication Administrator, or User Administrator role assignment to delete users in your organization.
173+
- Global Administrators and Privileged Authentication Administrators can delete any users including other administrators.
174+
- User Administrators can delete any non-admin users, Helpdesk Administrators, and other User Administrators.
175+
- For more information, see [Administrator role permissions in Azure AD](../roles/permissions-reference.md).
176+
177+
To delete a user, follow these steps:
178+
179+
1. Sign in to the [Azure portal](https://portal.azure.com/) using one of the appropriate roles.
180+
181+
1. Go to **Azure Active Directory** > **Users**.
182+
183+
1. Search for and select the user you want to delete from your Azure AD tenant.
184+
185+
1. Select **Delete user**.
186+
187+
![Screenshot of the All users page with a user selected and the Delete button highlighted.](media/how-to-create-delete-users/delete-existing-user.png)
188+
189+
The user is deleted and no longer appears on the **Users - All users** page. The user can be seen on the **Deleted users** page for the next 30 days and can be restored during that time. For more information about restoring a user, see [Restore or remove a recently deleted user using Azure Active Directory](active-directory-users-restore.md).
190+
191+
When a user is deleted, any licenses consumed by the user are made available for other users.
192+
193+
>[!Note]
194+
>To update the identity, contact information, or job information for users whose source of authority is Windows Server Active Directory, you must use Windows Server Active Directory. After you complete the update, you must wait for the next synchronization cycle to complete before you'll see the changes.
162195
## Next steps
163196

164197
* [Learn about B2B collaboration users](../external-identities/add-users-administrator.md)
60.4 KB
Loading

articles/active-directory/governance/how-to-lifecycle-workflow-sync-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,9 @@ For more information on expressions, see [Reference for writing expressions for
5252

5353
The expression examples above use endDate for SAP and StatusHireDate for Workday. However, you may opt to use different attributes.
5454

55-
For example, you might use StatusContinuesFirstDayOfWork instead of StatusHireDate for Workday. In this instance your expression would be:
55+
For example, you might use StatusContinuousFirstDayOfWork instead of StatusHireDate for Workday. In this instance your expression would be:
5656

57-
`FormatDateTime([StatusContinuesFirstDayOfWork], , "yyyy-MM-ddzzz", "yyyyMMddHHmmss.fZ")`
57+
`FormatDateTime([StatusContinuousFirstDayOfWork], , "yyyy-MM-ddzzz", "yyyyMMddHHmmss.fZ")`
5858

5959

6060
The following table has a list of suggested attributes and their scenario recommendations.

0 commit comments

Comments
 (0)