You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/microsoft-graph-operations.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -232,6 +232,10 @@ The initialized *GraphServiceClient* is then used in _UserService.cs_ to perform
232
232
233
233
[Make API calls using the Microsoft Graph SDKs](/graph/sdks/create-requests) includes information on how to read and write information from Microsoft Graph, use `$select` to control the properties returned, provide custom query parameters, and use the `$filter` and `$orderBy` query parameters.
234
234
235
+
## Next steps
236
+
237
+
For code samples in JavaScript and Node.js, please see: [Manage B2C user accounts with MSAL.js and Microsoft Graph SDK](https://github.com/Azure-Samples/ms-identity-b2c-javascript-nodejs-management)
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension-errors.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ If you encounter errors with the NPS extension for Azure AD Multi-Factor Authent
27
27
|**CONTACT_SUPPORT**|[Contact support](#contact-microsoft-support), and mention the list of steps for collecting logs. Provide as much information as you can about what happened before the error, including tenant ID, and user principal name (UPN). |
28
28
|**CLIENT_CERT_INSTALL_ERROR**| There may be an issue with how the client certificate was installed or associated with your tenant. Follow the instructions in [Troubleshooting the MFA NPS extension](howto-mfa-nps-extension.md#troubleshooting) to investigate client cert problems. |
29
29
|**ESTS_TOKEN_ERROR**| Follow the instructions in [Troubleshooting the MFA NPS extension](howto-mfa-nps-extension.md#troubleshooting) to investigate client cert and security token problems. |
30
-
|**HTTPS_COMMUNICATION_ERROR**| The NPS server is unable to receive responses from Azure AD MFA. Verify that your firewalls are open bidirectionally for traffic to and from `https://adnotifications.windowsazure.com` and that TLS 1.2 is enabled (default). If TLS 1.2 is disabled, user authentication will fail and event ID 36871 with source SChannel is entered in the System log in Event Viewer. To verify TLS 1.2 is enabled, see [TLS registry settings](/windows-server/security/tls/tls-registry-settings.md#tls-dtls-and-ssl-protocol-version-settings). |
30
+
|**HTTPS_COMMUNICATION_ERROR**| The NPS server is unable to receive responses from Azure AD MFA. Verify that your firewalls are open bidirectionally for traffic to and from `https://adnotifications.windowsazure.com` and that TLS 1.2 is enabled (default). If TLS 1.2 is disabled, user authentication will fail and event ID 36871 with source SChannel is entered in the System log in Event Viewer. To verify TLS 1.2 is enabled, see [TLS registry settings](/windows-server/security/tls/tls-registry-settings#tls-dtls-and-ssl-protocol-version-settings). |
31
31
|**HTTP_CONNECT_ERROR**| On the server that runs the NPS extension, verify that you can reach `https://adnotifications.windowsazure.com` and `https://login.microsoftonline.com/`. If those sites don't load, troubleshoot connectivity on that server. |
32
32
|**NPS Extension for Azure AD MFA:** <br> NPS Extension for Azure AD MFA only performs Secondary Auth for Radius requests in AccessAccept State. Request received for User username with response state AccessReject, ignoring request. | This error usually reflects an authentication failure in AD or that the NPS server is unable to receive responses from Azure AD. Verify that your firewalls are open bidirectionally for traffic to and from `https://adnotifications.windowsazure.com` and `https://login.microsoftonline.com` using ports 80 and 443. It is also important to check that on the DIAL-IN tab of Network Access Permissions, the setting is set to "control access through NPS Network Policy". This error can also trigger if the user is not assigned a license. |
33
33
|**REGISTRY_CONFIG_ERROR**| A key is missing in the registry for the application, which may be because the [PowerShell script](howto-mfa-nps-extension.md#install-the-nps-extension) wasn't run after installation. The error message should include the missing key. Make sure you have the key under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa. |
Copy file name to clipboardExpand all lines: articles/active-directory/devices/faq.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -219,7 +219,7 @@ sections:
219
219
220
220
- question: What are the MS-Organization-P2P-Access certificates present on our Windows 10/11 devices?
221
221
answer: |
222
-
The MS-Organization-P2P-Access certificates are issued by Azure AD to both, Azure AD joined and hybrid Azure AD joined devices. These certificates are used to enable trust between devices in the same tenant for remote desktop scenarios. One certificate is issued to the device and another is issued to the user. The device certificate is present in `Local Computer\Personal\Certificates` and is valid for one day. This certificate is renewed (by issuing a new certificate) if the device is still active in Azure AD. The user certificate is present in `Current User\Personal\Certificates` and this certificate is also valid for one day, but it is issued on-demand when a user attempts a remote desktop session to another Azure AD joined device. It is not renewed on expiry. Both these certificates are issued using the MS-Organization-P2P-Access certificate present in the `Local Computer\AAD Token Issuer\Certificates`. This certificate is issued by Azure AD during device registration.
222
+
The MS-Organization-P2P-Access certificates are issued by Azure AD to both, Azure AD joined and hybrid Azure AD joined devices. These certificates are used to enable trust between devices in the same tenant for remote desktop scenarios. One certificate is issued to the device and another is issued to the user. The device certificate is present in `Local Computer\Personal\Certificates` and is valid for one day. This certificate is renewed (by issuing a new certificate) if the device is still active in Azure AD. The user certificate is not persistent and is valid for one hour, but it is issued on-demand when a user attempts a remote desktop session to another Azure AD joined device. It is not renewed on expiry. Both these certificates are issued using the MS-Organization-P2P-Access certificate present in the `Local Computer\AAD Token Issuer\Certificates`. This certificate is issued by Azure AD during device registration.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/active-directory-groups-membership-azure-portal.md
+4-12Lines changed: 4 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,32 +9,24 @@ ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: fundamentals
11
11
ms.topic: how-to
12
-
ms.date: 6/22/2022
12
+
ms.date: 10/19/2018
13
13
ms.author: ajburnle
14
14
ms.custom: "it-pro, seodec18"
15
15
ms.reviewer: krbain
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
19
19
# Add or remove a group from another group using Azure Active Directory
20
-
This article helps you to add and remove a group from another group using Azure Active Directory. When a group is added to another group, it creates a nested group.
20
+
This article helps you to add and remove a group from another group using Azure Active Directory.
21
21
22
22
>[!Note]
23
23
>If you're trying to delete the parent group, see [How to update or delete a group and its members](active-directory-groups-delete-group.md).
24
24
25
25
## Add a group to another group
26
-
You can add an existing Security group to another existing Security group (also known as nested groups), which creates a member group (subgroup) and a parent group. The member group inherits the attributes and properties of the parent group, saving you configuration time.
26
+
You can add an existing Security group to another existing Security group (also known as nested groups), creating a member group (subgroup) and a parent group. The member group inherits the attributes and properties of the parent group, saving you configuration time.
27
27
28
28
>[!Important]
29
-
>We don't currently support:<br>
30
-
>- Adding groups to a group synced with on-premises Active Directory.<br>
31
-
>- Adding Security groups to Microsoft 365 groups.<br>
32
-
>- Adding Microsoft 365 groups to Security groups or other Microsoft 365 groups.<br>
33
-
>- Assigning apps to nested groups.<br>
34
-
>- Applying licenses to nested groups.<br>
35
-
>- Adding distribution groups in nesting scenarios.<br>
36
-
>- Adding security groups as members of mail-enabled security groups.
37
-
29
+
>We don't currently support:<ul><li>Adding groups to a group synced with on-premises Active Directory.</li><li>Adding Security groups to Microsoft 365 groups.</li><li>Adding Microsoft 365 groups to Security groups or other Microsoft 365 groups.</li><li>Assigning apps to nested groups.</li><li>Applying licenses to nested groups.</li><li>Adding distribution groups in nesting scenarios.</li><li>Adding security groups as members of mail-enabled security groups</li><li> Adding groups as members of a role-assignable group.</li></ul>
Copy file name to clipboardExpand all lines: articles/active-directory/governance/create-access-review.md
+11-17Lines changed: 11 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.workload: identity
10
10
ms.tgt_pltfrm: na
11
11
ms.topic: how-to
12
12
ms.subservice: compliance
13
-
ms.date: 06/22/2022
13
+
ms.date: 03/22/2022
14
14
ms.author: ajburnle
15
15
ms.reviewer: mwahl
16
16
ms.collection: M365-identity-device-management
@@ -37,7 +37,7 @@ This article describes how to create one or more access reviews for group member
37
37
38
38
For more information, see [License requirements](access-reviews-overview.md#license-requirements).
39
39
40
-
If you're reviewing access to an application, then before creating the review, see the article on how to [prepare for an access review of users' access to an application](access-reviews-application-preparation.md) to ensure the application is integrated with Azure AD.
40
+
If you are reviewing access to an application, then before creating the review, see the article on how to [prepare for an access review of users' access to an application](access-reviews-application-preparation.md) to ensure the application is integrated with Azure AD.
41
41
42
42
## Create a single-stage access review
43
43
@@ -75,19 +75,13 @@ If you're reviewing access to an application, then before creating the review, s
75
75
> [!NOTE]
76
76
> If you selected **All Microsoft 365 groups with guest users**, your only option is to review **Guest users only**.
77
77
78
+
1. Or if you are conducting group membership review, you can create access reviews for only the inactive users in the group (preview). In the *Users scope* section, check the box next to **Inactive users (on tenant level)**. If you check the box, the scope of the review will focus on inactive users only, those who have not signed in either interactively or non-interactively to the tenant. Then, specify **Days inactive** with a number of days inactive up to 730 days (two years). Users in the group inactive for the specified number of days will be the only users in the review.
78
79
79
-
1. After you select the scope of the review, you can determine how nested group membership is reviewed (Preview). On the **Nested groups** setting, select:
80
-
-**Review all users assignments, including assignment from nested group membership** if you want to include indirect members in your review. Deny decisions won't be applied to indirect users.
81
-
- Or, **Review only direct assignments, including direct users and unexpanded nested groups** if you want to only review direct members and groups. Indirect members and groups won't be included in the review and decisions are applied to direct users and groups only. For more information about access reviews of nested group memberships see [Review access of a nested group (preview)](manage-access-review.md#review-access-of-nested-group-membership-preview).
82
-
1. If you scoped the review to **All users and groups** and chose **Review only direct assignments, including direct users and unexpanded nested groups**, when you select a reviewer, your selection options are limited:
83
-
- If you select **Managers of users** as the reviewer, a fallback reviewer must be selected to review the groups with access to the nested group.
84
-
- If you select **Users review their own access** as the reviewer, the nested groups won't be included in the review. To have the groups reviewed, you must select a different reviewer and not a self-review.
85
-
1. Or if you are conducting group membership review, you can create access reviews for only the inactive users in the group (preview). In the *Users scope* section, check the box next to **Inactive users (on tenant level)**. If you check the box, the scope of the review will focus on inactive users only, those who haven't signed in either interactively or non-interactively to the tenant. Then, specify **Days inactive** with a number of days inactive up to 730 days (two years). Users in the group inactive for the specified number of days will be the only users in the review.
86
80
1. Select **Next: Reviews**.
87
81
88
82
### Next: Reviews
89
83
90
-
1. You can create a single-stage or multi-stage review (preview). For a single stage review, continue here. To create a multi-stage access review (preview), follow the steps in [Create a multi-stage access review (preview)](#create-a-multi-stage-access-review-preview).
84
+
1. You can create a single-stage or multi-stage review (preview). For a single stage review continue here. To create a multi-stage access review (preview), follow the steps in [Create a multi-stage access review (preview)](#create-a-multi-stage-access-review-preview)
91
85
92
86
1. In the **Specify reviewers** section, in the **Select reviewers** box, select either one or more people to make decisions in the access reviews. You can choose from:
93
87
@@ -169,9 +163,9 @@ A multi-stage review allows the administrator to define two or three sets of rev
169
163
> [!WARNING]
170
164
> Data of users included in multi-stage access reviews are a part of the audit record at the start of the review. Administrators may delete the data at any time by deleting the multi-stage access review series. For general information about GDPR and protecting user data, see the [GDPR section of the Microsoft Trust Center](https://www.microsoft.com/trust-center/privacy/gdpr-overview) and the [GDPR section of the Service Trust portal](https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted).
171
165
172
-
1. After you've selected the resource and scope of your review, move on to the **Reviews** tab.
166
+
1. After you have selected the resource and scope of your review, move on to the **Reviews** tab.
173
167
174
-
1.Select the checkbox next to **(Preview) Multi-stage review**.
168
+
1.Click the checkbox next to **(Preview) Multi-stage review**.
175
169
176
170
1. Under **First stage review**, select the reviewers from the dropdown menu next to **Select reviewers**.
177
171
@@ -187,15 +181,15 @@ A multi-stage review allows the administrator to define two or three sets of rev
187
181
188
182
1. Add the duration for the second stage.
189
183
190
-
1. By default, you'll see two stages when you create a multi-stage review. However, you can add up to three stages. If you want to add a third stage, select**+ Add a stage** and complete the required fields.
184
+
1. By default, you will see two stages when you create a multi-stage review. However, you can add up to three stages. If you want to add a third stage, click**+ Add a stage** and complete the required fields.
191
185
192
-
1. You can decide to allow 2nd and 3rd stage reviewers to the see decisions made in the previous stage(s).If you want to allow them to see the decisions made prior, select the box next to **Show previous stage(s) decisions to later stage reviewers** under **Reveal review results**. Leave the box unchecked to disable this setting if you’d like your reviewers to review independently.
186
+
1. You can decide to allow 2nd and 3rd stage reviewers to the see decisions made in the previous stage(s).If you want to allow them to see the decisions made prior, click the box next to **Show previous stage(s) decisions to later stage reviewers** under **Reveal review results**. Leave the box unchecked to disable this setting if you’d like your reviewers to review independently.
193
187
194
188

195
189
196
190
1. The duration of each recurrence will be set to the sum of the duration day(s) you specified in each stage.
197
191
198
-
1. Specify the **Review recurrence**, the **Start date**, and **End date** for the review. The recurrence type must be at least as long as the total duration of the recurrence (for example, the max duration for a weekly review recurrence is seven days).
192
+
1. Specify the **Review recurrence**, the **Start date**, and **End date** for the review. The recurrence type must be at least as long as the total duration of the recurrence (i.e., the max duration for a weekly review recurrence is 7 days).
199
193
200
194
1. To specify which reviewees will continue from stage to stage, select one or multiple of the following options next to **Specify reviewees to go to next stage** :
201
195

@@ -232,7 +226,7 @@ Use the following instructions to create an access review on a team with shared
232
226
233
227
1. Select **+ New access review**.
234
228
235
-
1. Select **Teams + Groups** and then click **Select teams + groups** to set the **Review scope**. B2B direct connect users and teams aren't included in reviews of **All Microsoft 365 groups with guest users**.
229
+
1. Select **Teams + Groups** and then click **Select teams + groups** to set the **Review scope**. B2B direct connect users and teams are not included in reviews of **All Microsoft 365 groups with guest users**.
236
230
237
231
1. Select a Team that has shared channels shared with 1 or more B2B direct connect users or Teams.
238
232
@@ -253,7 +247,7 @@ Use the following instructions to create an access review on a team with shared
253
247
> - If you set **Select reviewers** to **Users review their own access** or **Managers of users**, B2B direct connect users and Teams won't be able to review their own access in your tenant. The owner of the Team under review will get an email that asks the owner to review the B2B direct connect user and Teams.
254
248
> - If you select **Managers of users**, a selected fallback reviewer will review any user without a manager in the home tenant. This includes B2B direct connect users and Teams without a manager.
255
249
256
-
1. Go on to the **Settings** tab and configure extra settings. Then go to the **Review and Create** tab to start your access review. For more detailed information about creating a review and configuration settings, see our [Create a single-stage access review](#create-a-single-stage-access-review).
250
+
1. Go on to the **Settings** tab and configure additional settings. Then go to the **Review and Create** tab to start your access review. For more detailed information about creating a review and configuration settings, see our [Create a single-stage access review](#create-a-single-stage-access-review).
257
251
258
252
## Allow group owners to create and manage access reviews of their groups (preview)
0 commit comments