You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-authentication-oath-tokens.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ OATH TOTP hardware tokens typically come with a secret key, or seed, pre-program
40
40
41
41
Programmable OATH TOTP hardware tokens that can be reseeded can also be set up with Azure AD in the software token setup flow.
42
42
43
-
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
43
+
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
44
44
45
45
:::image type="content" border="true" source="./media/concept-authentication-methods/oath-tokens.png" alt-text="Screenshot of OATH token management." lightbox="./media/concept-authentication-methods/oath-tokens.png":::
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-use-email-signin.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.reviewer: calui
17
17
# Sign-in to Azure AD with email as an alternate login ID (Preview)
18
18
19
19
> [!NOTE]
20
-
> Sign-in to Azure AD with email as an alternate login ID is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
20
+
> Sign-in to Azure AD with email as an alternate login ID is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
21
21
22
22
Many organizations want to let users sign in to Azure Active Directory (Azure AD) using the same credentials as their on-premises directory environment. With this approach, known as hybrid authentication, users only need to remember one set of credentials.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-mfasettings.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,7 +139,7 @@ OATH TOTP hardware tokens typically come with a secret key, or seed, pre-program
139
139
140
140
Programmable OATH TOTP hardware tokens that can be reseeded can also be set up with Azure AD in the software token setup flow.
141
141
142
-
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms).
142
+
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
143
143
144
144

In the Azure portal, you can manage the [Azure AD Joined Device Local Administrator](/azure/active-directory/roles/permissions-reference#azure-ad-joined-device-local-administrator) role from **Device settings**.
47
+
You can manage the [Azure AD Joined Device Local Administrator](/azure/active-directory/roles/permissions-reference#azure-ad-joined-device-local-administrator) role from **Device settings**.
48
48
49
-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
49
+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
50
50
1. Browse to **Azure Active Directory** > **Devices** > **Device settings**.
51
51
1. Select **Manage Additional local administrators on all Azure AD joined devices**.
52
52
1. Select **Add assignments** then choose the other administrators you want to add and select **Add**.
@@ -111,5 +111,5 @@ Additionally, you can also add users using the command prompt:
111
111
112
112
## Next steps
113
113
114
-
- To get an overview of how to manage device in the Azure portal, see [managing devices using the Azure portal](manage-device-identities.md).
114
+
- To get an overview of how to manage devices, see [managing devices using the Azure portal](manage-device-identities.md).
115
115
- To learn more about device-based Conditional Access, see [Conditional Access: Require compliant or hybrid Azure AD joined device](../conditional-access/howto-conditional-access-policy-compliant-device.md).
Copy file name to clipboardExpand all lines: articles/active-directory/devices/device-join-out-of-box.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Your device may restart several times as part of the setup process. Your device
43
43
:::image type="content" source="media/device-join-out-of-box/windows-11-first-run-experience-device-sign-in-info.png" alt-text="Screenshot of Windows 11 out-of-box experience showing the sign-in experience.":::
44
44
1. Continue to follow the prompts to set up your device.
45
45
1. Azure AD checks if an enrollment in mobile device management is required and starts the process.
46
-
1. Windows registers the device in the organization’s directory in Azure AD and enrolls it in mobile device management, if applicable.
46
+
1. Windows registers the device in the organization’s directory and enrolls it in mobile device management, if applicable.
47
47
1. If you sign in with a managed user account, Windows takes you to the desktop through the automatic sign-in process. Federated users are directed to the Windows sign-in screen to enter your credentials.
48
48
:::image type="content" source="media/device-join-out-of-box/windows-11-first-run-experience-complete-automatic-sign-in-desktop.png" alt-text="Screenshot of Windows 11 at the desktop after first run experience Azure AD joined.":::
49
49
@@ -57,7 +57,7 @@ To verify whether a device is joined to your Azure AD, review the **Access work
57
57
58
58
## Next steps
59
59
60
-
- For more information about managing devices in the Azure portal, see [managing devices using the Azure portal](manage-device-identities.md).
60
+
- For more information about managing devices, see [managing devices using the Azure portal](manage-device-identities.md).
61
61
-[What is Microsoft Intune?](/mem/intune/fundamentals/what-is-intune)
62
62
-[Overview of Windows Autopilot](/mem/autopilot/windows-autopilot)
63
63
-[Passwordless authentication options for Azure Active Directory](../authentication/concept-authentication-passwordless.md)
1. Sign in to the [Azure portal](https://portal.azure.com).
29
+
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
30
30
1. Browse to **Azure Active Directory** > **Devices** > **Enterprise State Roaming**.
31
31
1. Select **Users may sync settings and app data across devices**. For more information, see [how to configure device settings](./manage-device-identities.md).
32
32
@@ -49,7 +49,7 @@ The country/region value is set as part of the Azure AD directory creation proce
49
49
50
50
Follow these steps to view a per-user device sync status report.
51
51
52
-
1. Sign in to the [Azure portal](https://portal.azure.com).
52
+
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
53
53
1. Browse to **Azure Active Directory** > **Users** > **All users**.
54
54
1. Select the user, and then select **Devices**.
55
55
1. Select **View devices syncing settings and app data** to show sync status.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/enterprise-state-roaming-troubleshooting.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ Enterprise State Roaming requires the device to be registered with Azure AD. Alt
70
70
71
71
**Potential issue**: **WamDefaultSet** and **AzureAdJoined** both have “NO” in the field value, the device was domain-joined and registered with Azure AD, and the device doesn't sync. If it's showing this, the device may need to wait for policy to be applied or the authentication for the device failed when connecting to Azure AD. The user may have to wait a few hours for the policy to be applied. Other troubleshooting steps may include retrying autoregistration by signing out and back in, or launching the task in Task Scheduler. In some cases, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
72
72
73
-
**Potential issue**: The field for **SettingsUrl** is empty and the device doesn't sync. The user may have last logged in to the device before Enterprise State Roaming was enabled in the Azure portal. Restart the device and have the user login. Optionally, in the portal, try having the IT Admin navigate to **Azure Active Directory** > **Devices** > **Enterprise State Roaming** disable and re-enable **Users may sync settings and app data across devices**. Once re-enabled, restart the device and have the user login. If this doesn't resolve the issue, **SettingsUrl** may be empty if there's a bad device certificate. In this case, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
73
+
**Potential issue**: The field for **SettingsUrl** is empty and the device doesn't sync. The user may have last logged in to the device before Enterprise State Roaming was enabled. Restart the device and have the user login. Optionally, in the portal, try having the IT Admin navigate to **Azure Active Directory** > **Devices** > **Enterprise State Roaming** disable and re-enable **Users may sync settings and app data across devices**. Once re-enabled, restart the device and have the user login. If this doesn't resolve the issue, **SettingsUrl** may be empty if there's a bad device certificate. In this case, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
74
74
75
75
## Enterprise State Roaming and multifactor authentication
Copy file name to clipboardExpand all lines: articles/active-directory/devices/faq.yml
+11-11Lines changed: 11 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -20,10 +20,10 @@ summary: |
20
20
sections:
21
21
- name: General FAQ
22
22
questions:
23
-
- question: I registered the device recently. Why can't I see the device under my user info in the Azure portal? Or why is the device owner marked as N/A for hybrid Azure Active Directory (Azure AD) joined devices?
23
+
- question: I registered the device recently. Why can't I see the device under my user info? Or why is the device owner marked as N/A for hybrid Azure Active Directory (Azure AD) joined devices?
24
24
answer: |
25
25
Windows 10 or newer devices that are hybrid Azure AD joined don't show up under **USER devices**.
26
-
Use the **All devices** view in the Azure portal. You can also use a PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice) cmdlet.
26
+
Use the **All devices** view. You can also use a PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice) cmdlet.
27
27
28
28
Only the following devices are listed under **USER devices**:
29
29
@@ -35,7 +35,7 @@ sections:
35
35
36
36
- question: How do I know what the device registration state of the client is?
37
37
answer: |
38
-
In the Azure portal, go to **All devices**. Search for the device by using the device ID. Check the value under the join type column. Sometimes, the device might be reset or reimaged. So it's essential to also check the device registration state on the device:
38
+
Go to **All devices**. Search for the device by using the device ID. Check the value under the join type column. Sometimes, the device might be reset or reimaged. So it's essential to also check the device registration state on the device:
39
39
40
40
- For Windows 10 or newer and Windows Server 2016 or later devices, run `dsregcmd.exe /status`.
41
41
- For down-level OS versions, run `%programFiles%\Microsoft Workplace Join\autoworkplace.exe`.
@@ -47,7 +47,7 @@ sections:
47
47
48
48
49
49
50
-
- question: I see the device record under the USER info in the Azure portal. And I see the state as registered on the device. Am I set up correctly to use Conditional Access?
50
+
- question: I see the device record under the USER info and I see the state as registered. Am I set up correctly to use Conditional Access?
51
51
answer: |
52
52
The device join state, shown by **deviceID**, must match the state on Azure AD and meet any evaluation criteria for Conditional Access.
53
53
For more information, see [Require managed devices for cloud app access with Conditional Access](../conditional-access/concept-conditional-access-grant.md).
@@ -59,15 +59,15 @@ sections:
59
59
On Windows 10/11 devices joined or registered with Azure AD, users are issued a [Primary refresh token (PRT)](concept-primary-refresh-token.md) which enables single sign-on. The validity of the PRT is based on the validity of the device itself. Users see this message if the device is either deleted or disabled in Azure AD without initiating the action from the device itself. A device can be deleted or disabled in Azure AD one of the following scenarios:
60
60
61
61
- User disables the device from the My Apps portal.
62
-
- An administrator (or user) deletes or disables the device in the Azure portal or by using PowerShell
63
-
- Hybrid Azure AD joined only: An administrator removes the devices OU out of sync scope resulting in the devices being deleted from Azure AD
64
-
- Hybrid Azure AD joined only: An administrator disables the computer account on premises, resulting in the device being disabled in Azure AD
62
+
- An administrator (or user) deletes or disables the device.
63
+
- Hybrid Azure AD joined only: An administrator removes the devices OU out of sync scope resulting in the devices being deleted from Azure AD.
64
+
- Hybrid Azure AD joined only: An administrator disables the computer account on premises, resulting in the device being disabled in Azure AD.
65
65
- Upgrading Azure AD connect to the version 1.4.xx.x. [Understanding Azure AD Connect 1.4.xx.x and device disappearance](/troubleshoot/azure/active-directory/reference-connect-device-disappearance).
66
66
67
67
68
68
69
69
70
-
- question: I disabled or deleted my device in the Azure portal or by using Windows PowerShell. But the local state on the device says it's still registered. What should I do?
70
+
- question: I disabled or deleted my device, but the local state on the device says it's still registered. What should I do?
71
71
answer: |
72
72
This operation is by design. In this case, the device doesn't have access to resources in the cloud. Administrators can perform this action for stale, lost, or stolen devices to prevent unauthorized access. If this action was performed unintentionally, you need to re-enable or re-register the device using the steps that follow:
73
73
@@ -104,7 +104,7 @@ sections:
104
104
105
105
106
106
107
-
- question: Why do I see duplicate device entries in the Azure portal?
107
+
- question: Why do I see duplicate device entries?
108
108
answer: |
109
109
- For Windows 10 or newer and Windows Server 2016 or later, repeated tries to unjoin and rejoin the same device might cause duplicate entries.
110
110
- Each Windows user who uses **Add Work or School Account** creates a new device record with the same device name.
@@ -116,7 +116,7 @@ sections:
116
116
- question: Does Windows 10/11 device registration in Azure AD support TPMs in FIPS mode?
117
117
answer: Windows 10/11 device registration is only supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join or Hybrid Azure AD join. Microsoft doesn't provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Contact your hardware OEM for support.
118
118
119
-
- question: Why can a user still access resources from a device I disabled in the Azure portal?
119
+
- question: Why can a user still access resources from a device I disabled?
120
120
answer: |
121
121
It takes up to an hour for a revoke to be applied from the time the Azure AD device is marked as disabled.
122
122
@@ -161,7 +161,7 @@ sections:
161
161
162
162
- question: Can a guest user sign in to an Azure AD joined device?
163
163
answer: |
164
-
No, currently, guest users can not sign in to an Azure AD joined device.
164
+
No, currently, guest users can't sign in to an Azure AD joined device.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/how-to-hybrid-join-verify.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,10 +31,10 @@ For downlevel devices, see the article [Troubleshooting hybrid Azure Active Dire
31
31
32
32
## Using the Azure portal
33
33
34
-
1.Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
35
-
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](./manage-device-identities.md).
36
-
3. If the **Registered** column says **Pending**, then hybrid Azure AD join hasn't completed. In federated environments, this state happens only if it failed to register and Azure AD Connect is configured to sync the devices. Wait for Azure AD Connect to complete a sync cycle.
37
-
4. If the **Registered** column contains a **date/time**, then hybrid Azure AD join has completed.
34
+
1.Sign in to the [Azure portal](https://portal.azure.com) as at least a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
35
+
1. Browse to **Azure Active Directory** > **Devices** > **All devices**.
36
+
1. If the **Registered** column says **Pending**, then hybrid Azure AD join hasn't completed. In federated environments, this state happens only if it failed to register and Azure AD Connect is configured to sync the devices. Wait for Azure AD Connect to complete a sync cycle.
37
+
1. If the **Registered** column contains a **date/time**, then hybrid Azure AD join has completed.
0 commit comments