Skip to content

Commit 910cd79

Browse files
authored
Merge pull request #253834 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 0412083 + 7518524 commit 910cd79

File tree

217 files changed

+555
-245
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

217 files changed

+555
-245
lines changed

articles/active-directory/conditional-access/how-to-app-protection-policy-windows.md

Lines changed: 33 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 09/05/2023
9+
ms.date: 10/04/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,13 +17,15 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Require an app protection policy on Windows devices (preview)
1919

20-
App protection policies apply mobile application management (MAM) to specific applications on a device. These policies allow for securing data within an application in support of scenarios like bring your own device (BYOD). In the preview, we support applying policy to the Microsoft Edge browser on Windows 11 devices.
20+
App protection policies apply [mobile application management (MAM)](/mem/intune/apps/app-management#mobile-application-management-mam-basics) to specific applications on a device. These policies allow for securing data within an application in support of scenarios like bring your own device (BYOD). In the preview, we support applying policy to the Microsoft Edge browser on Windows 11 devices.
2121

2222
![Screenshot of a browser requiring the user to sign in to their Microsoft Edge profile to access an application.](./media/how-to-app-protection-policy-windows/browser-sign-in-with-edge-profile.png)
2323

2424
## Prerequisites
2525

26-
Customers interested in the public preview need to opt in using the [MAM for Windows Public Preview Sign Up Form](https://aka.ms/MAMforWindowsPublic).
26+
- [Windows 11 Version 22H2 (OS build 22621)](/windows/release-health/windows11-release-information#windows-11-current-versions) or newer.
27+
- [Configured app protection policy targeting Windows devices](/mem/intune/apps/app-protection-policy-settings-windows).
28+
- Currently unsupported in sovereign clouds.
2729

2830
## User exclusions
2931
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
@@ -34,7 +36,13 @@ The following policy is put in to [Report-only mode](howto-conditional-access-in
3436

3537
### Require app protection policy for Windows devices
3638

37-
The following steps help create a Conditional Access policy requiring an app protection policy when using a Windows device. The app protection policy must also be configured and assigned to your users in Microsoft Intune. For more information about how to create the app protection policy, see the article [Preview: App protection policy settings for Windows](/mem/intune/apps/app-protection-policy-settings-windows). The following policy includes multiple controls allowing devices to either use app protection policies for mobile application management (MAM) or be managed and compliant with mobile device management (MDM) policies.
39+
The following steps help create a Conditional Access policy requiring an app protection policy when using a Windows device. The app protection policy must also be configured and assigned to your users in Microsoft Intune. For more information about how to create the app protection policy, see the article [App protection policy settings for Windows](/mem/intune/apps/app-protection-policy-settings-windows). The following policy includes multiple controls allowing devices to either use app protection policies for mobile application management (MAM) or be managed and compliant with mobile device management (MDM) policies.
40+
41+
> [!TIP]
42+
> App protection policies (MAM) support unmanaged devices:
43+
>
44+
> - If a device is already managed through mobile device management (MDM), then Intune MAM enrollment is blocked, and app protection policy settings aren't applied.
45+
> - If a device becomes managed after MAM enrollment, app protection policy settings are no longer applied.
3846
3947
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
4048
1. Browse to **Protection** > **Conditional Access**.
@@ -44,12 +52,14 @@ The following steps help create a Conditional Access policy requiring an app pro
4452
1. Under **Include**, select **All users**.
4553
1. Under **Exclude**, select **Users and groups** and choose at least your organization's emergency access or break-glass accounts.
4654
1. Under **Target resources** > **Cloud apps** > **Include**, select **Office 365**.
55+
> [!WARNING]
56+
> Selecting **All apps** prevents users from signing in.
4757
1. Under **Conditions**:
48-
1. **Device platforms**, set **Configure** to **Yes**.
58+
1. **Device platforms** set **Configure** to **Yes**.
4959
1. Under **Include**, **Select device platforms**.
5060
1. Choose **Windows** only.
5161
1. Select **Done**.
52-
1. **Client apps**, set **Configure** to **Yes**.
62+
1. **Client apps** set **Configure** to **Yes**.
5363
1. Select **Browser** only.
5464
1. Under **Access controls** > **Grant**, select **Grant access**.
5565
1. Select **Require app protection policy** and **Require device to be marked as compliant**.
@@ -62,6 +72,17 @@ After administrators confirm the settings using [report-only mode](howto-conditi
6272
> [!TIP]
6373
> Organizations should also deploy a policy that [blocks access from unsupported or unknown device platforms](howto-policy-unknown-unsupported-device.md) along with this policy.
6474
75+
In organizations with existing Conditional Access policies that target:
76+
77+
- The **All cloud apps** resource.
78+
- The **Mobile apps and desktop clients** condition.
79+
- Use **Require app protection policy** or a **Block access** grant control.
80+
81+
End users are unable to enroll their Windows device in MAM without the following policy changes.
82+
83+
1. Register the **Microsoft Edge Auth** service principal in your tenant using the command `New-MgServicePrincipal -AppId f2d19332-a09d-48c8-a53b-c49ae5502dfc`.
84+
1. Add an exclusion for **Microsoft Edge Auth** to your existing policy targeting **All cloud apps**.
85+
6586
## Sign in to Windows devices
6687

6788
When users attempt to sign in to a site that is protected by an app protection policy for the first time, they're prompted: To access your service, app or website, you may need to sign in to Microsoft Edge using `[email protected]` or register your device with `organization` if you're already signed in.
@@ -79,7 +100,7 @@ This process opens a window offering to allow Windows to remember your account a
79100
80101
![Screenshot showing the stay signed in to all your apps window. Uncheck the allow my organization to manage my device checkbox.](./media/how-to-app-protection-policy-windows/stay-signed-in-to-all-your-apps.png)
81102

82-
After selecting **OK**, you may see a progress window while policy is applied. After a few moments, you should see a window saying "you're all set", app protection policies are applied.
103+
After selecting **OK**, you may see a progress window while policy is applied. After a few moments, you should see a window saying **You're all set**, app protection policies are applied.
83104

84105
## Troubleshooting
85106

@@ -96,9 +117,13 @@ To resolve these possible scenarios:
96117
- Wait a few minutes and try again in a new tab.
97118
- Contact your administrator to check that Microsoft Intune MAM policies are applying to your account correctly.
98119

120+
#### All apps selected
121+
122+
If your policy for Windows devices targets **All apps** your users aren't able to sign in. Your policy should only target **Office 365**.
123+
99124
### Existing account
100125

101-
If there's a pre-existing, unregistered account, like `[email protected]` in Microsoft Edge, or if a user signs in without registering using the Heads Up Page, then the account isn't properly enrolled in MAM. This configuration blocks the user from being properly enrolled in MAM. This is a known issue.
126+
There's a known issue where there's a pre-existing, unregistered account, like `[email protected]` in Microsoft Edge, or if a user signs in without registering using the Heads Up Page, then the account isn't properly enrolled in MAM. This configuration blocks the user from being properly enrolled in MAM.
102127

103128
## Next steps
104129

articles/active-directory/conditional-access/howto-policy-approved-app-or-app-protection.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,9 @@ Organizations can choose to deploy this policy using the steps outlined below or
6363

6464
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
6565

66+
> [!TIP]
67+
> Organizations should also deploy a policy that [blocks access from unsupported or unknown device platforms](howto-policy-unknown-unsupported-device.md) along with this policy.
68+
6669
### Block Exchange ActiveSync on all devices
6770

6871
This policy will block all Exchange ActiveSync clients using basic authentication from connecting to Exchange Online.

articles/active-directory/develop/tutorial-single-page-app-react-sign-in-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: OwenRichards1
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.author: owenrichards
10-
ms.custom: devx-track-extended-java, devx-track-js
10+
ms.custom: devx-track-js
1111
ms.topic: tutorial
1212
ms.date: 09/26/2023
1313
#Customer intent: As a React developer, I want to know how to use functional components to add sign in and sign out experiences in my React application.

articles/active-directory/hybrid/connect/how-to-connect-syncservice-features.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -27,16 +27,16 @@ The synchronization feature of Microsoft Entra Connect has two components:
2727

2828
This topic explains how the following features of the **Microsoft Entra Connect Sync service** work and how you can configure them using PowerShell.
2929

30-
These settings are configured by the [Azure AD PowerShell module](/previous-versions/azure/jj151815(v=azure.100)). Download and install it separately from Microsoft Entra Connect. The cmdlets documented in this topic were introduced in the [2016 March release (build 9031.1)](https://social.technet.microsoft.com/wiki/contents/articles/28552.microsoft-azure-active-directory-powershell-module-version-release-history.aspx#Version_9031_1). If you do not have the cmdlets documented in this topic or they do not produce the same result, then make sure you run the latest version.
30+
These settings are configured by the [Azure AD PowerShell module](/previous-versions/azure/jj151815(v=azure.100)). Download and install it separately from Microsoft Entra Connect. The cmdlets documented in this topic were introduced in the [2016 March release (build 9031.1)](https://social.technet.microsoft.com/wiki/contents/articles/28552.microsoft-azure-active-directory-powershell-module-version-release-history.aspx#Version_9031_1). If you don't have the cmdlets documented in this topic or they don't produce the same result, then make sure you run the latest version.
3131

3232
To see the configuration in your Microsoft Entra directory, run `Get-MsolDirSyncFeatures`.
3333
![Get-MsolDirSyncFeatures result](./media/how-to-connect-syncservice-features/getmsoldirsyncfeatures.png)
3434

35-
To see the configuration in your Microsoft Entra directory using the Graph Powershell, use the following commands:
35+
To see the configuration in your Microsoft Entra directory using the Graph PowerShell, use the following commands:
3636
```powershell
3737
Connect-MgGraph -Scopes OnPremDirectorySynchronization.Read.All, OnPremDirectorySynchronization.ReadWrite.All
3838
39-
Get-MgDirectoryOnPremisSynchronization | Select-Object -ExpandProperty Features | Format-List
39+
Get-MgDirectoryOnPremiseSynchronization | Select-Object -ExpandProperty Features | Format-List
4040
```
4141

4242
The output looks similar to `Get-MsolDirSyncFeatures`:
@@ -72,20 +72,20 @@ The following settings can be configured by `Set-MsolDirSyncFeature`:
7272
| [EnableSoftMatchOnUpn](#userprincipalname-soft-match) |Allows objects to join on userPrincipalName in addition to primary SMTP address. |
7373
| [SynchronizeUpnForManagedUsers](#synchronize-userprincipalname-updates) |Allows the sync engine to update the userPrincipalName attribute for managed/licensed (non-federated) users. |
7474

75-
After you have enabled a feature, it cannot be disabled again.
75+
After you have enabled a feature, it can't be disabled again.
7676

7777
> [!NOTE]
7878
> From August 24, 2016 the feature *Duplicate attribute resiliency* is enabled by default for new Microsoft Entra directories. This feature will also be rolled out and enabled on directories created before this date. You will receive an email notification when your directory is about to get this feature enabled.
7979
>
8080
>
8181
82-
The following settings are configured by Microsoft Entra Connect and cannot be modified by `Set-MsolDirSyncFeature`:
82+
The following settings are configured by Microsoft Entra Connect and can't be modified by `Set-MsolDirSyncFeature`:
8383

8484
| DirSyncFeature | Comment |
8585
| --- | --- |
8686
| DeviceWriteback |[Microsoft Entra Connect: Enabling device writeback](how-to-connect-device-writeback.md) |
8787
| DirectoryExtensions |[Microsoft Entra Connect Sync: Directory extensions](how-to-connect-sync-feature-directory-extensions.md) |
88-
| [DuplicateProxyAddressResiliency<br/>DuplicateUPNResiliency](#duplicate-attribute-resiliency) |Allows an attribute to be quarantined when it is a duplicate of another object rather than failing the entire object during export. |
88+
| [DuplicateProxyAddressResiliency<br/>DuplicateUPNResiliency](#duplicate-attribute-resiliency) |Allows an attribute to be quarantined when its a duplicate of another object rather than failing the entire object during export. |
8989
| Password Hash Sync |[Implementing password hash synchronization with Microsoft Entra Connect Sync](how-to-connect-password-hash-synchronization.md) |
9090
|Pass-through Authentication|[User sign-in with Microsoft Entra pass-through authentication](how-to-connect-pta.md)|
9191
| UnifiedGroupWriteback |Group writeback|
@@ -99,27 +99,27 @@ Instead of failing to provision objects with duplicate UPNs / proxyAddresses, th
9999

100100
When this feature is enabled, soft-match is enabled for UPN in addition to the [primary SMTP address](https://support.microsoft.com/kb/2641663), which is always enabled. Soft-match is used to match existing cloud users in Microsoft Entra ID with on-premises users.
101101

102-
If you need to match on-premises AD accounts with existing accounts created in the cloud and you are not using Exchange Online, then this feature is useful. In this scenario, you generally don’t have a reason to set the SMTP attribute in the cloud.
102+
If you need to match on-premises AD accounts with existing accounts created in the cloud and you aren't using Exchange Online, then this feature is useful. In this scenario, you generally don’t have a reason to set the SMTP attribute in the cloud.
103103

104104
This feature is on by default for newly created Microsoft Entra directories. You can see if this feature is enabled for you by running:
105105

106106
```powershell
107107
## Using the MSOnline module
108108
Get-MsolDirSyncFeatures -Feature EnableSoftMatchOnUpn
109109
110-
## Using the Graph Powershell module
110+
## Using the Graph PowerShell module
111111
$Config = Get-MgDirectoryOnPremisSynchronization
112112
$Config.Features.SoftMatchOnUpnEnabled
113113
```
114114

115-
If this feature is not enabled for your Microsoft Entra directory, then you can enable it by running:
115+
If this feature isn't enabled for your Microsoft Entra directory, then you can enable it by running:
116116

117117
```powershell
118118
Set-MsolDirSyncFeature -Feature EnableSoftMatchOnUpn -Enable $true
119119
```
120120

121121
## BlockSoftMatch
122-
When this feature is enabled it will block the Soft Match feature. Customers are encouraged to enable this feature and keep it at enabled until Soft Matching is required again for their tenancy. This flag should be enabled again after any soft matching has completed and is no longer needed.
122+
When this feature is enabled, it blocks the Soft Match feature. Customers are encouraged to enable this feature and keep it at enabled until Soft Matching is required again for their tenancy. This flag should be enabled again after any soft matching has completed and is no longer needed.
123123

124124
Example - to block soft matching in your tenant, run this cmdlet:
125125

@@ -132,7 +132,7 @@ PS C:\> Set-MsolDirSyncFeature -Feature BlockSoftMatch -Enable $True
132132
Historically, updates to the UserPrincipalName attribute using the sync service from on-premises has been blocked, unless both of these conditions were true:
133133

134134
* The user is managed (non-federated).
135-
* The user has not been assigned a license.
135+
* The user hasn't been assigned a license.
136136

137137
> [!NOTE]
138138
> From March 2019, synchronizing UPN changes for federated user accounts is allowed.
@@ -146,12 +146,12 @@ This feature is on by default for newly created Microsoft Entra directories. You
146146
## Using the MSOnline module
147147
Get-MsolDirSyncFeatures -Feature SynchronizeUpnForManagedUsers
148148
149-
## Using the Graph Powershell module
149+
## Using the Graph PowerShell module
150150
$config = Get-MgDirectoryOnPremisSynchronization
151151
$config.Features.SynchronizeUpnForManagedUsersEnabled
152152
```
153153

154-
If this feature is not enabled for your Microsoft Entra directory, then you can enable it by running:
154+
If this feature isn't enabled for your Microsoft Entra directory, then you can enable it by running:
155155

156156
```powershell
157157
Set-MsolDirSyncFeature -Feature SynchronizeUpnForManagedUsers -Enable $true

articles/active-directory/saas-apps/hypervault-provisioning-tutorial.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,11 @@ The scenario outlined in this tutorial assumes that you already have the followi
4242
<a name='step-2-configure-hypervault-to-support-provisioning-with-azure-ad'></a>
4343

4444
## Step 2: Configure Hypervault to support provisioning with Microsoft Entra ID
45-
Contact Hypervault support to configure Hypervault to support provisioning with Microsoft Entra ID.
45+
46+
1. Sign in into your Hypervault account as a manager.
47+
1. Navigate to the **Workspace Settings** page.
48+
1. Under the **Connect to Microsoft Azure** section, click **Enable User Provisioning**.
49+
1. Copy the Domain and Token values. You will need these values in step 5.
4650

4751
<a name='step-3-add-hypervault-from-the-azure-ad-application-gallery'></a>
4852

@@ -58,10 +62,9 @@ The Microsoft Entra provisioning service allows you to scope who is provisioned
5862

5963
* If you need more roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
6064

61-
6265
## Step 5: Configure automatic user provisioning to Hypervault
6366

64-
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users in TestApp based on user assignments in Microsoft Entra ID.
67+
This section guides you through the steps to configure the Microsoft Entra provisioning service to create, update, and disable users in Hypervault based on user assignments in Microsoft Entra ID.
6568

6669
<a name='to-configure-automatic-user-provisioning-for-hypervault-in-azure-ad'></a>
6770

@@ -84,7 +87,7 @@ This section guides you through the steps to configure the Microsoft Entra provi
8487

8588
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
8689

87-
1. Under the **Admin Credentials** section, input your Hypervault Tenant URL and Secret Token. Click **Test Connection** to ensure Microsoft Entra ID can connect to Hypervault. If the connection fails, ensure your Hypervault account has Admin permissions and try again.
90+
1. Under the **Admin Credentials** section, input your Hypervault Tenant URL and Secret Token (generated in step 2). Click **Test Connection** to ensure Microsoft Entra ID can connect to Hypervault. If the connection fails, ensure your Hypervault account has Admin permissions and try again.
8891

8992
![Screenshot of Token.](common/provisioning-testconnection-tenanturltoken.png)
9093

articles/active-directory/workload-identities/workload-identities-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ suspicious changes to accounts.
8282
Enables delegation of reviews to the right people, focused on the most
8383
important privileged roles.
8484

85-
- [App health recommendations](/azure/active-directory/reports-monitoring/howto-use-recommendations): Provides you with personalized insights with actionable guidance so you can implement best practices, improve the state of your Microsoft Entra tenant, and optimize the configurations for your scenarios.
85+
- [App health recommendations](/azure/active-directory/reports-monitoring/howto-use-recommendations): Provides recommendations for addressing identity hygiene gaps in your application portfolio so you can improve the security and resilience posture of a tenant.
8686

8787
## What do the numbers in each category on the [Workload identities - Microsoft Entra admin center](https://entra.microsoft.com/#view/Microsoft_Azure_ManagedServiceIdentity/WorkloadIdentitiesBlade) mean?
8888

0 commit comments

Comments
 (0)