You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-restrict-your-app-to-a-set-of-users.md
+28-28Lines changed: 28 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.subservice: develop
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 03/27/2023
11
+
ms.date: 03/28/2023
12
12
ms.author: cwerner
13
13
ms.reviewer: jmprieur, kkrishna
14
14
ms.custom: aaddev, engagement-fy23
@@ -22,7 +22,7 @@ Applications registered in an Azure Active Directory (Azure AD) tenant are, by d
22
22
23
23
Similarly, in a [multi-tenant](howto-convert-app-to-be-multi-tenant.md) application, all users in the Azure AD tenant where the application is provisioned can access the application once they successfully authenticate in their respective tenant.
24
24
25
-
Tenant administrators and developers often have requirements where an application must be restricted to a certain set of users or apps(services). There are two ways to restrict an application to a certain set of users, apps or security groups:
25
+
Tenant administrators and developers often have requirements where an application must be restricted to a certain set of users or apps(services). There are two ways to restrict an application to a certain set of users, apps or security groups:
26
26
27
27
- Developers can use popular authorization patterns like [Azure role-based access control (Azure RBAC)](howto-implement-rbac-for-apps.md).
28
28
- Tenant administrators and developers can use built-in feature of Azure AD.
@@ -32,7 +32,7 @@ Tenant administrators and developers often have requirements where an applicatio
32
32
The option to restrict an app to a specific set of users, apps or security groups in a tenant works with the following types of applications:
33
33
34
34
- Applications configured for federated single sign-on with SAML-based authentication.
35
-
- Application proxy applications that use Azure AD pre-authentication.
35
+
- Application proxy applications that use Azure AD preauthentication.
36
36
- Applications built directly on the Azure AD application platform that use OAuth 2.0/OpenID Connect authentication after a user or admin has consented to that application.
37
37
38
38
## Update the app to require user assignment
@@ -54,10 +54,10 @@ When an application requires assignment, user consent for that application isn't
54
54
55
55
Once you've configured your app to enable user assignment, you can go ahead and assign the app to users and groups.
56
56
57
-
1. Under **Manage**, select the **Users and groups** then select **Add user/group**.
57
+
1. Under **Manage**, select the **Users and groups** then select **Add user/group**.
58
58
1. Select the **Users** selector.
59
59
60
-
A list of users and security groups will be shown along with a textbox to search and locate a certain user or group. This screen allows you to select multiple users and groups in one go.
60
+
A list of users and security groups are shown along with a textbox to search and locate a certain user or group. This screen allows you to select multiple users and groups in one go.
61
61
62
62
1. Once you're done selecting the users and groups, select **Select**.
63
63
1. (Optional) If you have defined app roles in your application, you can use the **Select role** option to assign the app role to the selected users and groups.
@@ -70,31 +70,31 @@ Follow the steps in this section to secure app-to-app authentication access for
70
70
71
71
1. Navigate to Service Principal sign-in logs in your tenant to find services authenticating to access resources in your tenant.
72
72
1. Check using app ID if a Service Principal exists for both resource and client apps in your tenant that you wish to manage access.
73
-
```powershell
74
-
Get-MgServicePrincipal `
75
-
-Filter "AppId eq '$appId'"
76
-
```
77
-
1. Create a Service Principal using app ID, if it does not exist:
78
-
```powershell
79
-
New-MgServicePrincipal `
80
-
-AppId $appId
81
-
```
73
+
```powershell
74
+
Get-MgServicePrincipal `
75
+
-Filter "AppId eq '$appId'"
76
+
```
77
+
1. Create a Service Principal using app ID, if it doesn't exist:
78
+
```powershell
79
+
New-MgServicePrincipal `
80
+
-AppId $appId
81
+
```
82
82
1. Explicitly assign client apps to resource apps (this functionality is available only in API and not in the Azure AD Portal):
> If you don't want tokens to be issued for an application or if you want to block an application from being accessed by users or services in your tenant, create a service principal for the application and [disable user sign-in](../manage-apps/disable-user-sign-in-portal.md) for it.
> If you don't want tokens to be issued for an application or if you want to block an application from being accessed by users or services in your tenant, create a service principal for the application and [disable user sign-in](../manage-apps/disable-user-sign-in-portal.md) for it.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/reports-faq.yml
+9-11Lines changed: 9 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ sections:
29
29
- question: |
30
30
How soon should I see activities data after getting a premium license?
31
31
answer: |
32
-
If you already have activities data as a free license, then you can see it immediately. If you don't have any data, then it will take up to three days for the data to show up in the reports.
32
+
If you already have activities data as a free license, then you can see it immediately. If you don't have any data, then it takes up to three days for the data to show up in the reports.
33
33
34
34
- question: |
35
35
Can I see last month's data after getting an Azure AD premium license?
@@ -97,29 +97,29 @@ sections:
97
97
- question: |
98
98
Why do my non-interactive sign-ins appear to have the same time stamp?
99
99
answer: |
100
-
Non-interactive sign-ins can trigger a large volume of events every hour, so they are grouped together in the logs.
100
+
Non-interactive sign-ins can trigger a large volume of events every hour, so they're grouped together in the logs.
101
101
102
-
In many cases, non-interactive sign-ins have all the same characteristics, except for the date and time of the sign-in. If the time aggregate is set to 24 hours, the logs will appear to show the sign-ins at the same time. Each of these grouped rows can be expanded to view the exact time stamp.
102
+
In many cases, non-interactive sign-ins have all the same characteristics, except for the date and time of the sign-in. If the time aggregate is set to 24 hours, the logs appear to show the sign-ins at the same time. Each of these grouped rows can be expanded to view the exact time stamp.
103
103
104
104
- question: |
105
-
I am seeing User IDs in the username field of my sign-ins log. Why is this happening?
105
+
I'm seeing User IDs in the username field of my sign-ins log. Why is this happening?
106
106
answer: |
107
-
With passwordless authentication, User IDs appear as the username. To confirm this scenario, look at the details of the sign-in event in question. The *authenticationDetail* field will say *passwordless*.
107
+
With passwordless authentication, User IDs appear as the username. To confirm this scenario, look at the details of the sign-in event in question. The *authenticationDetail* field says *passwordless*.
108
108
109
109
- question: |
110
110
I see a 90025 error in the sign in logs. Does this mean my user failed to sign in? Has my tenant hit a throttling limit?
111
111
answer: |
112
-
No, in general 90025 errors are resolved by an automatic retry without the user noticing the error. This error can occur when an internal Azure AD subservice hits its retry allowance and does not indicate your tenant is being throttled. These errors are usually resolved by Azure AD internally without any user impact. If the user is unable to sign in due to this error, manually trying again should resolve the issue.
112
+
No, in general 90025 errors are resolved by an automatic retry without the user noticing the error. This error can occur when an internal Azure AD subservice hits its retry allowance and doesn't indicate your tenant is being throttled. These errors are usually resolved by Azure AD internally without any user impact. If the user is unable to sign in due to this error, manually trying again should resolve the issue.
113
113
114
114
- question: |
115
115
In Service Principal sign-in logs, what does it mean if I see “00000000-0000-0000-0000-000000000000” or “” for Service Principal ID or Resource Service Principal ID in my sign-in logs?
116
116
answer: |
117
-
If the Service Principal ID has the value “0000000-0000-0000-0000-000000000000", it means that there is no Service Principal for the client application in that instance of authentication (Azure AD no longer issues access tokens without a client Service Principal except for a small number of Microsoft and 3rd party applications).
117
+
If the Service Principal ID has the value “0000000-0000-0000-0000-000000000000", it means that there's no Service Principal for the client application in that instance of authentication (Azure AD no longer issues access tokens without a client Service Principal except for a few Microsoft and third party applications).
118
118
119
-
If the Resource Service Principal ID has the value “0000000-0000-0000-0000-000000000000", it means that there is no Service Principal for the resource application in that instance of authentication.
119
+
If the Resource Service Principal ID has the value “0000000-0000-0000-0000-000000000000", it means that there's no Service Principal for the resource application in that instance of authentication.
120
120
121
121
> [!NOTE]
122
-
> Authentication without a client Service Principal is a deprecated behavior in Azure AD and is not commonly expected. This behavior is currently allowed only for a limited number of resource apps.
122
+
> Authentication without a client Service Principal is a deprecated behavior in Azure AD and isn't commonly expected. This behavior is currently allowed only for a limited number of resource apps.
123
123
124
124
- question: |
125
125
In Service Principal sign-in logs, how can I query for instances of authentication without a client or resource Service Principal in my tenant? (That is, Service Principal ID or Resource Service Principal ID is “00000000-0000-0000-0000-000000000000” or “”)
@@ -141,8 +141,6 @@ sections:
141
141
- Make sure you select an appropriate time frame in the Date field (last 24 hours, 7 days etc.).
142
142
- Add a filter and select **Service Principal ID** and provide the value ‘00000000-0000-0000-0000-000000000000' to get instances of authentication with no client Service Principal.
143
143
144
-
:::image type="content" source="media/reports-faq/service-principal-sign-ins.png" alt-text="Screenshot of service principal sign-in.":::
145
-
146
144
- question: |
147
145
How can I restrict sign-in (authentication) for various apps that I see in the Service Principal sign-in logs?
0 commit comments