Skip to content

Commit 7639402

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 6ad3a2d + 6857df4 commit 7639402

File tree

153 files changed

+2909
-1018
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

153 files changed

+2909
-1018
lines changed

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,8 +103,8 @@ When a user signs in, the authentication process checks which authentication met
103103
1. [Telephony](concept-authentication-phone-options.md)<sup>2</sup>
104104

105105
<sup>1</sup> Includes hardware or software TOTP from Microsoft Authenticator, Authenticator Lite, or third-party applications.
106-
<sup>2</sup> Includes SMS and voice calls.
107106

107+
<sup>2</sup> Includes SMS and voice calls.
108108

109109
### How does system-preferred MFA affect AD FS or NPS extension?
110110

@@ -113,6 +113,7 @@ System-preferred MFA doesn't affect users who sign in by using Active Directory
113113
### What happens for users who aren't specified in the Authentication methods policy but enabled in the legacy MFA tenant-wide policy?
114114

115115
The system-preferred MFA also applies for users who are enabled for MFA in the legacy MFA policy.
116+
116117
:::image type="content" border="true" source="./media/how-to-mfa-number-match/legacy-settings.png" alt-text="Screenshot of legacy MFA settings.":::
117118

118119
## Next steps

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 4 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -17,40 +17,15 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable combined security information registration in Azure Active Directory
1919

20-
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Azure AD Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure AD Multi-Factor Authentication and SSPR.
20+
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. Users were confused that similar methods were used for Azure AD Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure AD Multi-Factor Authentication and SSPR.
2121

2222
> [!NOTE]
23-
> Effective Oct. 1st, 2022, we will begin to enable combined registration for all users in Azure AD tenants created before August 15th, 2020. Tenants created after this date are enabled with combined registration.
23+
> Effective Mar. 14th, 2023 combined registration is now the default MFA and SSPR registration experience for all organizations.
2424
25-
To make sure you understand the functionality and effects before you enable the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
25+
To help you understand the functionality and effects of the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
2626

2727
![Combined security information registration enhanced experience](media/howto-registration-mfa-sspr-combined/combined-security-info-more-required.png)
2828

29-
## Enable combined registration
30-
31-
To enable combined registration, complete these steps:
32-
33-
1. Sign in to the Azure portal as a user administrator or global administrator.
34-
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature settings**.
35-
3. Under **Users can use the combined security information registration experience**, choose to enable for a **Selected** group of users or for **All** users.
36-
37-
![Enable the combined security info experience for users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info.png)
38-
39-
> [!IMPORTANT]
40-
> If your Azure tenant has already been enabled for combined registration, you might not see the configuration option for **Users can use the combined security information registration experience** or even see it grayed out.
41-
42-
> [!NOTE]
43-
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Azure AD Multi-Factor Authentication and SSPR, if those methods are enabled in the Azure AD Multi-Factor Authentication and SSPR policies.
44-
>
45-
> If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` are required to perform multi-factor authentication before they can access the page.
46-
47-
If you have configured the *Site to Zone Assignment List* in Internet Explorer, the following sites have to be in the same zone:
48-
49-
* *[https://login.microsoftonline.com](https://login.microsoftonline.com)*
50-
* *[https://Login.windows.net](https://login.windows.net)*
51-
* *[https://mysignins.microsoft.com](https://mysignins.microsoft.com)*
52-
* *[https://account.activedirectory.windowsazure.com](https://account.activedirectory.windowsazure.com)*
53-
5429
## Conditional Access policies for combined registration
5530

5631
To secure when and how users register for Azure AD Multi-Factor Authentication and self-service password reset, you can use user actions in Conditional Access policy. This functionality may be enabled in organizations that want users to register for Azure AD Multi-Factor Authentication and SSPR from a central location, such as a trusted network location during HR onboarding.
@@ -91,6 +66,6 @@ Complete the following steps to create a policy that applies to all selected use
9166

9267
If you need help, see [troubleshoot combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md) or learn [What is the location condition in Azure AD Conditional Access?](../conditional-access/location-condition.md)
9368

94-
Once users are enabled for combined registration, you can then [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
69+
Review how you can [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md) in your tenant.
9570

9671
If needed, learn how to [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,6 @@ A Conditional Access policy must include a user, group, or workload identity ass
2121

2222
> [!VIDEO https://www.youtube.com/embed/5DsW1hB3Jqs]
2323
24-
> [!NOTE]
25-
> Some Conditional Access features are currently in public preview and might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
26-
2724
## Include users
2825

2926
This list of users typically includes all of the users an organization is targeting in a Conditional Access policy.
@@ -35,7 +32,7 @@ The following options are available to include when creating a Conditional Acces
3532
- All users
3633
- All users that exist in the directory including B2B guests.
3734
- Select users and groups
38-
- Guest or external users (preview)
35+
- Guest or external users
3936
- This selection provides several choices that can be used to target Conditional Access policies to specific guest or external user types and specific tenants containing those types of users. There are [several different types of guest or external users that can be selected](../external-identities/authentication-conditional-access.md#conditional-access-for-external-users), and multiple selections can be made:
4037
- B2B collaboration guest users
4138
- B2B collaboration member users

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Create a location based Conditional Access policy that applies to service princi
4747
1. Select **New policy**.
4848
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
4949
1. Under **Assignments**, select **Users or workload identities**.
50-
1. Under **What does this policy apply to?**, select **Workload identities (Preview)**.
50+
1. Under **What does this policy apply to?**, select **Workload identities**.
5151
1. Under **Include**, choose **Select service principals**, and select the appropriate service principals from the list.
5252
1. Under **Cloud apps or actions**, select **All cloud apps**. The policy will apply only when a service principal requests a token.
5353
1. Under **Conditions** > **Locations**, include **Any location** and exclude **Selected locations** where you want to allow access.
@@ -66,10 +66,10 @@ Create a risk-based Conditional Access policy that applies to service principals
6666
1. Select **New policy**.
6767
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
6868
1. Under **Assignments**, select **Users or workload identities**.
69-
1. Under **What does this policy apply to?**, select **Workload identities (Preview)**.
69+
1. Under **What does this policy apply to?**, select **Workload identities**.
7070
1. Under **Include**, choose **Select service principals**, and select the appropriate service principals from the list.
7171
1. Under **Cloud apps or actions**, select **All cloud apps**. The policy will apply only when a service principal requests a token.
72-
1. Under **Conditions** > **Service principal risk (Preview)**
72+
1. Under **Conditions** > **Service principal risk**
7373
1. Set the **Configure** toggle to **Yes**.
7474
1. Select the levels of risk where you want this policy to trigger.
7575
1. Select **Done**.

articles/active-directory/roles/permissions-reference.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -931,7 +931,7 @@ This administrator manages federation between Azure AD organizations and externa
931931
932932
## Global Administrator
933933

934-
Users with this role have access to all administrative features in Azure Active Directory, as well as services that use Azure Active Directory identities like the Microsoft 365 Defender portal, the Microsoft Purview compliance portal, Exchange Online, SharePoint Online, and Skype for Business Online. Furthermore, Global Administrators can [elevate their access](../../role-based-access-control/elevate-access-global-admin.md) to manage all Azure subscriptions and management groups. This allows Global Administrators to get full access to all Azure resources using the respective Azure AD Tenant. The person who signs up for the Azure AD organization becomes a Global Administrator. There can be more than one Global Administrator at your company. Global Administrators can reset the password for any user and all other administrators. A Global Administrator cannot remove their own Global Administrator assignment. This is to prevent a situation where an organization has zero Global Administrators.
934+
Users with this role have access to all administrative features in Azure Active Directory, as well as services that use Azure Active Directory identities like the Microsoft 365 Defender portal, the Microsoft Purview compliance portal, Exchange Online, SharePoint Online, and Skype for Business Online. Global Administrators can view Directory Activity logs. Furthermore, Global Administrators can [elevate their access](../../role-based-access-control/elevate-access-global-admin.md) to manage all Azure subscriptions and management groups. This allows Global Administrators to get full access to all Azure resources using the respective Azure AD Tenant. The person who signs up for the Azure AD organization becomes a Global Administrator. There can be more than one Global Administrator at your company. Global Administrators can reset the password for any user and all other administrators. A Global Administrator cannot remove their own Global Administrator assignment. This is to prevent a situation where an organization has zero Global Administrators.
935935

936936
> [!NOTE]
937937
> As a best practice, Microsoft recommends that you assign the Global Administrator role to fewer than five people in your organization. For more information, see [Best practices for Azure AD roles](best-practices.md).
@@ -1465,7 +1465,7 @@ Users with this role have global permissions to manage settings within Microsoft
14651465
14661466
## Knowledge Administrator
14671467

1468-
Users in this role have full access to all knowledge, learning and intelligent features settings in the Microsoft 365 admin center. They have a general understanding of the suite of products, licensing details and has responsibility to control access. Knowledge Administrator can create and manage content, like topics, acronyms and learning resources. Additionally, these users can create content centers, monitor service health, and create service requests.
1468+
Users in this role have full access to all knowledge, learning and intelligent features settings in the Microsoft 365 admin center. They have a general understanding of the suite of products, licensing details and have responsibility to control access. Knowledge Administrator can create and manage content, like topics, acronyms and learning resources. Additionally, these users can create content centers, monitor service health, and create service requests.
14691469

14701470
> [!div class="mx-tableFixed"]
14711471
> | Actions | Description |
@@ -2403,7 +2403,7 @@ Users with this role **cannot** do the following:
24032403
Users with this role can do the following tasks:
24042404

24052405
- Manage and configure all aspects of Virtual Visits in Bookings in the Microsoft 365 admin center, and in the Teams EHR connector
2406-
- View usage reports for Virtual Visits in the Teams admin center, Microsoft 365 admin center, and PowerBI
2406+
- View usage reports for Virtual Visits in the Teams admin center, Microsoft 365 admin center, and Power BI
24072407
- View features and settings in the Microsoft 365 admin center, but can't edit any settings
24082408

24092409
Virtual Visits are a simple way to schedule and manage online and video appointments for staff and attendees. For example, usage reporting can show how sending SMS text messages before appointments can reduce the number of people who don't show up for appointments.

0 commit comments

Comments
 (0)