You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/stale.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ jobs:
20
20
exempt-pr-labels: keep-open
21
21
operations-per-run: 1200
22
22
ascending: true
23
-
start-date: '2020-07-09'
23
+
start-date: '2021-04-13'
24
24
stale-pr-message: >
25
25
This pull request has been inactive for at least 14 days.
26
26
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-phone.md
+1-10Lines changed: 1 addition & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 07/02/2021
9
+
ms.date: 10/21/2021
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -34,11 +34,6 @@ People who enabled phone sign-in from the Microsoft Authenticator app see a mess
34
34
To use passwordless phone sign-in with the Microsoft Authenticator app, the following prerequisites must be met:
35
35
36
36
- Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
37
-
38
-
Azure Multi-Factor Auth Connector must be enabled to allow users to register for push notifications for phone sign-in.
39
-
40
-

41
-
42
37
- Latest version of Microsoft Authenticator installed on devices running iOS 8.0 or greater, or Android 6.0 or greater.
43
38
- The device on which the Microsoft Authenticator app is installed must be registered within the Azure AD tenant to an individual user.
44
39
@@ -49,10 +44,6 @@ To use passwordless phone sign-in with the Microsoft Authenticator app, the foll
49
44
50
45
To use passwordless authentication in Azure AD, first enable the combined registration experience, then enable users for the passwordless method.
51
46
52
-
### Enable the combined registration experience
53
-
54
-
Registration features for passwordless authentication methods rely on the combined registration feature. To let users complete the combined registration themselves, follow the steps to [enable combined security information registration](howto-registration-mfa-sspr-combined.md).
Azure AD lets you choose which authentication methods can be used during the sign-in process. Users then register for the methods they'd like to use. The **Microsoft Authenticator** authentication method policy manages both the traditional push MFA method, as well as the passwordless authentication method.
Users and contacts | <ul><li>Enumerate list of all users and contacts<li>Read all public properties of users and contacts</li><li>Invite guests<li>Change own password<li>Manage own mobile phone number<li>Manage own photo<li>Invalidate own refresh tokens</li></ul> | <ul><li>Read own properties<li>Read display name, email, sign in name, photo, user principal name, and user type properties of other users and contacts<li>Change own password<li>Search for another user by ObjectId (if allowed)<li>Read manager and direct report information of other users</li></ul> | <ul><li>Read own properties<li>Change own password</li><li>Manage own mobile phone number</li></ul>
32
32
Groups | <ul><li>Create security groups<li>Create Microsoft 365 groups<li>Enumerate list of all groups<li>Read all properties of groups<li>Read non-hidden group memberships<li>Read hidden Microsoft 365 group memberships for joined group<li>Manage properties, ownership, and membership of groups the user owns<li>Add guests to owned groups<li>Manage dynamic membership settings<li>Delete owned groups<li>Restore owned Microsoft 365 groups</li></ul> | <ul><li>Read properties of non-hidden groups, including membership and ownership (even non-joined groups)<li>Read hidden Microsoft 365 group memberships for joined groups<li>Search for groups by Display Name or ObjectId (if allowed)</li></ul> | <ul><li>Read object id for joined groups<li>Read membership and ownership of joined groups in some Microsoft 365 apps (if allowed)</li></ul>
@@ -60,11 +60,11 @@ Ability to read other users | This setting is available in PowerShell only. Sett
60
60
Default permissions for guest users can be restricted in the following ways:
61
61
62
62
>[!NOTE]
63
-
>The guests user access restrictions setting replaced the **Guest users permissions are limited** setting. For guidance on using this feature, see [Restrict guest access permissions (preview) in Azure Active Directory](../enterprise-users/users-restrict-guest-permissions.md).
63
+
>The guests user access restrictions setting replaced the **Guest users permissions are limited** setting. For guidance on using this feature, see [Restrict guest access permissions in Azure Active Directory](../enterprise-users/users-restrict-guest-permissions.md).
64
64
65
65
Permission | Setting explanation
66
66
---------- | ------------
67
-
Guests user access restrictions (Preview) | Setting this option to **Guest users have the same access as members** grants all member user permissions to guest users by default.<p>Setting this option to **Guest user access is restricted to properties and memberships of their own directory objects** restricts guest access to only their own user profile by default. Access to other users are no longer allowed even when searching by User Principal Name, ObjectId or Display Name. Access to groups information including groups memberships is also no longer allowed.<p>**Note**: This setting does not prevent access to joined groups in some Microsoft 365 services like Microsoft Teams. See [Microsoft Teams Guest access](/MicrosoftTeams/guest-access) to learn more.<p>Guest users can still be added to administrator roles regardless of this permission settings.
67
+
Guests user access restrictions | Setting this option to **Guest users have the same access as members** grants all member user permissions to guest users by default.<p>Setting this option to **Guest user access is restricted to properties and memberships of their own directory objects** restricts guest access to only their own user profile by default. Access to other users are no longer allowed even when searching by User Principal Name, ObjectId or Display Name. Access to groups information including groups memberships is also no longer allowed.<p>**Note**: This setting does not prevent access to joined groups in some Microsoft 365 services like Microsoft Teams. See [Microsoft Teams Guest access](/MicrosoftTeams/guest-access) to learn more.<p>Guest users can still be added to administrator roles regardless of this permission settings.
68
68
Guests can invite | Setting this option to Yes allows guests to invite other guests. See [Delegate invitations for B2B collaboration](../external-identities/delegate-invitations.md#configure-b2b-external-collaboration-settings) to learn more.
69
69
Members can invite | Setting this option to Yes allows non-admin members of your directory to invite guests. See [Delegate invitations for B2B collaboration](../external-identities/delegate-invitations.md#configure-b2b-external-collaboration-settings) to learn more.
70
70
Admins and users in the guest inviter role can invite | Setting this option to Yes allows admins and users in the "Guest Inviter" role to invite guests. When set to Yes, users in the Guest inviter role will still be able to invite guests, regardless of the Members can invite setting. See [Delegate invitations for B2B collaboration](../external-identities/delegate-invitations.md#assign-the-guest-inviter-role-to-a-user) to learn more.
@@ -145,7 +145,7 @@ Users can perform the following actions on owned groups.
145
145
146
146
## Next steps
147
147
148
-
* To learn more about the guests user access restrictions setting, see [Restrict guest access permissions (preview) in Azure Active Directory](../enterprise-users/users-restrict-guest-permissions.md).
148
+
* To learn more about the guests user access restrictions setting, see [Restrict guest access permissions in Azure Active Directory](../enterprise-users/users-restrict-guest-permissions.md).
149
149
* To learn more about how to assign Azure AD administrator roles, see [Assign a user to administrator roles in Azure Active Directory](active-directory-users-assign-role-azure-portal.md)
150
150
* To learn more about how resource access is controlled in Microsoft Azure, see [Understanding resource access in Azure](../../role-based-access-control/rbac-and-directory-admin-roles.md)
151
151
* For more information on how Azure Active Directory relates to your Azure subscription, see [How Azure subscriptions are associated with Azure Active Directory](active-directory-how-subscriptions-associated-directory.md)
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-emergency-ad-fs-certificate-rotation.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ In the event that you need to rotate the AD FS certificates immediately, you can
22
22
> For more information, see [Hardware Security Module](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#hardware-security-module-hsm) under best practices for securing AD FS.
23
23
24
24
## Determine your Token Signing Certificate thumbprint
25
-
In order to revoke the old Token Signing Certificate which AD FS is currently using, you need to determine the thumbprint of the token-sigining certificate. To do this, use the following steps below:
25
+
In order to revoke the old Token Signing Certificate which AD FS is currently using, you need to determine the thumbprint of the token-signing certificate. To do this, use the following steps below:
26
26
27
27
1. Connect to the Microsoft Online Service
28
28
`PS C:\>Connect-MsolService`
@@ -37,7 +37,7 @@ By default, AD FS is configured to generate token signing and token decryption c
37
37
38
38
You can run the following Windows PowerShell command: `PS C:\>Get-AdfsProperties | FL AutoCert*, Certificate*`.
39
39
40
-
The AutoCertificateRollover property describes whether AD FS is configured to renew token signing and token decrypting certificates automatically. If AutoCertificateRollover is set to TRUE, follow the instructions outlined below in [Generating new self-signed certificate if AutoCertificateRollover is set to TRUE]. If AutoCertificateRollover is set to FALSE, follow the instructions outlined below in [Generating new certificates manually if AutoCertificateRollover is set to FALSE]
40
+
The AutoCertificateRollover property describes whether AD FS is configured to renew token signing and token decrypting certificates automatically. If AutoCertificateRollover is set to TRUE, follow the instructions outlined below in [Generating new self-signed certificate if AutoCertificateRollover is set to TRUE](#generating-new-self-signed-certificate-if-autocertificaterollover-is-set-to-true). If AutoCertificateRollover is set to FALSE, follow the instructions outlined below in [Generating new certificates manually if AutoCertificateRollover is set to FALSE](#generating-new-certificates-manually-if-autocertificaterollover-is-set-to-false).
41
41
42
42
43
43
## Generating new self-signed certificate if AutoCertificateRollover is set to TRUE
@@ -138,4 +138,4 @@ Now we want to revoke refresh tokens for users who may have them and force them
138
138
139
139
-[Managing SSL Certificates in AD FS and WAP in Windows Server 2016](/windows-server/identity/ad-fs/operations/manage-ssl-certificates-ad-fs-wap#replacing-the-ssl-certificate-for-ad-fs)
140
140
-[Obtain and Configure Token Signing and Token Decryption Certificates for AD FS](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn781426(v=ws.11)#updating-federation-partners)
141
-
-[Renew federation certificates for Microsoft 365 and Azure Active Directory](how-to-connect-fed-o365-certs.md)
141
+
-[Renew federation certificates for Microsoft 365 and Azure Active Directory](how-to-connect-fed-o365-certs.md)
Copy file name to clipboardExpand all lines: articles/active-directory/roles/permissions-reference.md
+46-1Lines changed: 46 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: roles
11
11
ms.topic: reference
12
-
ms.date: 10/07/2021
12
+
ms.date: 10/15/2021
13
13
ms.author: rolyon
14
14
ms.reviewer: abhijeetsinha
15
15
ms.custom: generated, it-pro, fasttrack-edit
@@ -102,6 +102,7 @@ This article lists the Azure AD built-in roles you can assign to allow managemen
102
102
> |[Teams Devices Administrator](#teams-devices-administrator)| Can perform management related tasks on Teams certified devices. | 3d762c5a-1b6c-493f-843e-55a3b42923d4 |
103
103
> |[Usage Summary Reports Reader](#usage-summary-reports-reader)| Can see only tenant level aggregates in Microsoft 365 Usage Analytics and Productivity Score. | 75934031-6c7e-415a-99d7-48dbd49e875e |
104
104
> |[User Administrator](#user-administrator)| Can manage all aspects of users and groups, including resetting passwords for limited admins. | fe930be7-5e62-47db-91af-98c3a49a38b1 |
105
+
> |[Windows 365 Administrator](#windows-365-administrator)| Can provision and manage all aspects of Cloud PCs. | 11451d60-acb2-45eb-a7d6-43d0f0125c13 |
105
106
> |[Windows Update Deployment Administrator](#windows-update-deployment-administrator)| Create and manage all aspects of Windows Update deployments through the Windows Update for Business deployment service. | 32696413-001a-46ae-978c-ce0f6b3620d2 |
106
107
107
108
## Application Administrator
@@ -2025,6 +2026,50 @@ Users with this role can create users, and manage all aspects of users with some
2025
2026
> | microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Microsoft 365 service requests |
2026
2027
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
2027
2028
2029
+
## Windows 365 Administrator
2030
+
2031
+
Users with this role have global permissions on Windows 365 resources, when the service is present. Additionally, this role contains the ability to manage users and devices in order to associate policy, as well as create and manage groups.
2032
+
2033
+
This role can create and manage security groups, but does not have administrator rights over Microsoft 365 groups. That means administrators cannot update owners or memberships of Microsoft 365 groups in the organization. However, they can manage the Microsoft 365 group they create, which is a part of their end-user privileges. So, any Microsoft 365 group (not security group) they create is counted against their quota of 250.
2034
+
2035
+
Assign the Windows 365 Administrator role to users who need to do the following tasks:
2036
+
2037
+
- Manage Windows 365 Cloud PCs in Microsoft Endpoint Manager
2038
+
- Enroll and manage devices in Azure AD, including assigning users and policies
2039
+
- Create and manage security groups, but not role-assignable groups
2040
+
- View basic properties in the Microsoft 365 admin center
2041
+
- Read usage reports in the Microsoft 365 admin center
2042
+
- Create and manage support tickets in Azure AD and the Microsoft 365 admin center
> | microsoft.directory/groups.security/basic/update | Update basic properties on Security groups, excluding role-assignable groups |
2060
+
> | microsoft.directory/groups.security/classification/update | Update the classification property on Security groups, excluding role-assignable groups |
2061
+
> | microsoft.directory/groups.security/dynamicMembershipRule/update | Update dynamic membership rule of Security groups, excluding role-assignable groups |
2062
+
> | microsoft.directory/groups.security/members/update | Update members of Security groups, excluding role-assignable groups |
2063
+
> | microsoft.directory/groups.security/owners/update | Update owners of Security groups, excluding role-assignable groups |
2064
+
> | microsoft.directory/groups.security/visibility/update | Update the visibility property on Security groups, excluding role-assignable groups |
2065
+
> | microsoft.directory/deviceManagementPolicies/standard/read | Read standard properties on device management application policies |
2066
+
> | microsoft.directory/deviceRegistrationPolicy/standard/read | Read standard properties on device registration policies |
2067
+
> | microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets |
2068
+
> | microsoft.cloudPC/allEntities/allProperties/allTasks | Manage all aspects of Windows 365 |
2069
+
> | microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Microsoft 365 service requests |
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
2072
+
2028
2073
## Windows Update Deployment Administrator
2029
2074
2030
2075
Users in this role can create and manage all aspects of Windows Update deployments through the Windows Update for Business deployment service. The deployment service enables users to define settings for when and how updates are deployed, and specify which updates are offered to groups of devices in their tenant. It also allows users to monitor the update progress.
Copy file name to clipboardExpand all lines: articles/aks/use-wasi-node-pools.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,12 +59,12 @@ az extension update --name aks-preview
59
59
60
60
### Limitations
61
61
62
-
* You can't run WebAssebmlies and containers in the same node pool.
62
+
* You can't run WebAssemblies and containers in the same node pool.
63
63
* Only the WebAssembly(WASI) runtime is available, using the Wasmtime provider.
64
64
* The WASM/WASI node pools can't be used for system node pool.
65
65
* The *os-type* for WASM/WASI node pools must be Linux.
66
66
* Krustlet doesn't work with Azure CNI at this time. For more information, see the [CNI Support for Kruslet GitHub issue][krustlet-cni-support].
67
-
* Krustlet doesn't provide networking configuration for WebAssemblies. The WebAssebmly manifest must provide the networking configuration, such as IP address.
67
+
* Krustlet doesn't provide networking configuration for WebAssemblies. The WebAssembly manifest must provide the networking configuration, such as IP address.
68
68
69
69
## Add a WASM/WASI node pool to an existing AKS Cluster
0 commit comments