Skip to content

Commit 9772c35

Browse files
authored
Merge pull request #235428 from MicrosoftDocs/main
4/21 PM Publish
2 parents 9b209ed + 67ec47b commit 9772c35

File tree

141 files changed

+1602
-831
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

141 files changed

+1602
-831
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4256,6 +4256,11 @@
42564256
"redirect_url": "/azure/active-directory/external-identities/user-token",
42574257
"redirect_document_id": true
42584258
},
4259+
{
4260+
"source_path_from_root": "/articles/active-directory/fundamentals/certificate-authorities.md",
4261+
"redirect_url": "/azure/security/fundamentals/azure-CA-details",
4262+
"redirect_document_id": true
4263+
},
42594264
{
42604265
"source_path_from_root": "/articles/active-directory/b2b/what-is-b2b.md",
42614266
"redirect_url": "/azure/active-directory/external-identities/what-is-b2b",

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ If enabled for Authenticator Lite, users are prompted to register their account
138138
GET auditLogs/signIns
139139
```
140140

141-
If the sign-in was done by phone app notification, under **authenticationAppDeivceDetails** the **clientApp** field returns **microsoftAuthenticator** or **Outlook**.
141+
If the sign-in was done by phone app notification, under **authenticationAppDeviceDetails** the **clientApp** field returns **microsoftAuthenticator** or **Outlook**.
142142

143143
If a user has registered Authenticator Lite, the user’s registered authentication methods include **Microsoft Authenticator (in Outlook)**.
144144

articles/active-directory/devices/concept-primary-refresh-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ A PRT is invalidated in the following scenarios:
142142

143143
* **Invalid user**: If a user is deleted or disabled in Azure AD, their PRT is invalidated and can't be used to obtain tokens for applications. If a deleted or disabled user already signed in to a device before, cached sign-in would log them in, until CloudAP is aware of their invalid state. Once CloudAP determines that the user is invalid, it blocks subsequent logons. An invalid user is automatically blocked from sign in to new devices that don’t have their credentials cached.
144144
* **Invalid device**: If a device is deleted or disabled in Azure AD, the PRT obtained on that device is invalidated and can't be used to obtain tokens for other applications. If a user is already signed in to an invalid device, they can continue to do so. But all tokens on the device are invalidated and the user doesn't have SSO to any resources from that device.
145-
* **Password change**: After a user changes their password, the PRT obtained with the previous password is invalidated by Azure AD. Password change results in the user getting a new PRT. This invalidation can happen in two different ways:
145+
* **Password change**: If a user obtained the PRT with their password, the PRT is invalidated by Azure AD when the user changes their password. Password change results in the user getting a new PRT. This invalidation can happen in two different ways:
146146
* If user signs in to Windows with their new password, CloudAP discards the old PRT and requests Azure AD to issue a new PRT with their new password. If user doesn't have an internet connection, the new password can't be validated, Windows may require the user to enter their old password.
147147
* If a user has logged in with their old password or changed their password after signing into Windows, the old PRT is used for any WAM-based token requests. In this scenario, the user is prompted to reauthenticate during the WAM token request and a new PRT is issued.
148148
* **TPM issues**: Sometimes, a device’s TPM can falter or fail, leading to inaccessibility of keys secured by the TPM. In this case, the device is incapable of getting a PRT or requesting tokens using an existing PRT as it can't prove possession of the cryptographic keys. As a result, any existing PRT is invalidated by Azure AD. When Windows 10 detects a failure, it initiates a recovery flow to re-register the device with new cryptographic keys. With Hybrid Azure Ad join, just like the initial registration, the recovery happens silently without user input. For Azure AD joined or Azure AD registered devices, the recovery needs to be performed by a user who has administrator privileges on the device. In this scenario, the recovery flow is initiated by a Windows prompt that guides the user to successfully recover the device.

articles/active-directory/devices/howto-manage-local-admin-passwords.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 04/20/2023
9+
ms.date: 04/21/2023
1010

1111
ms.author: sandeo
1212
author: sandeo-MSFT
1313
ms.reviewer: joflore
14+
ms.custom: references_regions
1415

1516
ms.collection: M365-identity-device-management
1617
---
@@ -72,7 +73,7 @@ LAPS is supported on Azure AD joined or hybrid Azure AD joined devices only. Azu
7273

7374
LAPS is available to all customers with Azure AD Free or higher licenses. Other related features like administrative units, custom roles, Conditional Access, and Intune have other licensing requirements.
7475

75-
## Required roles or permission
76+
### Required roles or permission
7677

7778
Other than the built-in Azure AD roles of Cloud Device Administrator, Intune Administrator, and Global Administrator that are granted *device.LocalCredentials.Read.All*, you can use [Azure AD custom roles](/azure/active-directory/roles/custom-create) or administrative units to authorize local administrator password recovery. For example,
7879

@@ -117,7 +118,7 @@ Conditional Access policies can be scoped to the built-in roles like Cloud Devic
117118
> [!NOTE]
118119
> Other role types including administrative unit-scoped roles and custom roles aren't supported
119120
120-
## Frequently Asked Questions
121+
## Frequently asked questions
121122

122123
### Is Windows LAPS with Azure AD management configuration supported using Group Policy Objects (GPO)?
123124

articles/active-directory/fundamentals/certificate-authorities.md

Lines changed: 0 additions & 97 deletions
This file was deleted.

articles/active-directory/fundamentals/how-to-create-delete-users.md

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,39 @@ When you invite an external guest user by sending an email invitation, you can c
159159

160160
![Screenshot of the user details with the invitation status options highlighted.](media/how-to-create-delete-users/external-user-invitation-state.png)
161161

162+
## Add other users
163+
164+
There might be scenarios in which you want to manually create consumer accounts in your Azure Active Directory B2C (Azure AD B2C) directory. For more information about creating consumer accounts, see [Create and delete consumer users in Azure AD B2C](../../active-directory-b2c/manage-users-portal.md).
165+
166+
If you have an environment with both Azure Active Directory (cloud) and Windows Server Active Directory (on-premises), you can add new users by syncing the existing user account data. For more information about hybrid environments and users, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).
167+
168+
## Delete a user
169+
170+
You can delete an existing user using Azure portal.
171+
172+
- You must have a Global Administrator, Privileged Authentication Administrator, or User Administrator role assignment to delete users in your organization.
173+
- Global Administrators and Privileged Authentication Administrators can delete any users including other administrators.
174+
- User Administrators can delete any non-admin users, Helpdesk Administrators, and other User Administrators.
175+
- For more information, see [Administrator role permissions in Azure AD](../roles/permissions-reference.md).
176+
177+
To delete a user, follow these steps:
178+
179+
1. Sign in to the [Azure portal](https://portal.azure.com/) using one of the appropriate roles.
180+
181+
1. Go to **Azure Active Directory** > **Users**.
182+
183+
1. Search for and select the user you want to delete from your Azure AD tenant.
184+
185+
1. Select **Delete user**.
186+
187+
![Screenshot of the All users page with a user selected and the Delete button highlighted.](media/how-to-create-delete-users/delete-existing-user.png)
188+
189+
The user is deleted and no longer appears on the **Users - All users** page. The user can be seen on the **Deleted users** page for the next 30 days and can be restored during that time. For more information about restoring a user, see [Restore or remove a recently deleted user using Azure Active Directory](active-directory-users-restore.md).
190+
191+
When a user is deleted, any licenses consumed by the user are made available for other users.
192+
193+
>[!Note]
194+
>To update the identity, contact information, or job information for users whose source of authority is Windows Server Active Directory, you must use Windows Server Active Directory. After you complete the update, you must wait for the next synchronization cycle to complete before you'll see the changes.
162195
## Next steps
163196

164197
* [Learn about B2B collaboration users](../external-identities/add-users-administrator.md)

articles/active-directory/fundamentals/how-to-customize-branding.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,8 @@ The branding elements are called out in the following example. Text descriptions
5555

5656
1. **Favicon**: Small icon that appears on the left side of the browser tab.
5757
1. **Header logo**: Space across the top of the web page, below the web browser navigation area.
58-
1. **Background image** and **page background color**: The entire space behind the sign-in box.
58+
1. **Background image**: The entire space behind the sign-in box.
59+
1. **Page background color**: The entire space behind the sign-in box.
5960
1. **Banner logo**: The logo that appears in the upper-left corner of the sign-in box.
6061
1. **Username hint and text**: The text that appears before a user enters their information.
6162
1. **Sign-in page text**: Additional text you can add below the username field.
60.4 KB
Loading

articles/active-directory/fundamentals/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -277,8 +277,6 @@ items:
277277
href: ../develop/howto-build-services-resilient-to-metadata-refresh.md?toc=/azure/active-directory/fundamentals/toc.json
278278
- name: Monitor application health for resilience
279279
href: monitor-sign-in-health-for-resilience.md
280-
- name: Certificate authorities used in Azure
281-
href: certificate-authorities.md
282280
- name: Secure with Azure Active Directory
283281
items:
284282
- name: Introduction

articles/active-directory/roles/protected-actions-add.md

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: roles
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/10/2022
12+
ms.date: 04/21/2023
1313
---
1414

1515
# Add, test, or remove protected actions in Azure AD (preview)
@@ -45,14 +45,18 @@ Protected actions use a Conditional Access authentication context, so you must c
4545

4646
1. Create a new policy and select your authentication context.
4747

48-
For more information, see [Conditional Access: Cloud apps, actions, and authentication context](../conditional-access/concept-conditional-access-cloud-apps.md).
48+
For more information, see [Conditional Access: Cloud apps, actions, and authentication context](../conditional-access/concept-conditional-access-cloud-apps.md#authentication-context).
4949

5050
:::image type="content" source="media/protected-actions-add/policy-authentication-context.png" alt-text="Screenshot of New policy page to create a new policy with an authentication context." lightbox="media/protected-actions-add/policy-authentication-context.png":::
5151

5252
## Add protected actions
5353

5454
To add protection actions, assign a Conditional Access policy to one or more permissions using a Conditional Access authentication context.
5555

56+
1. Select **Azure Active Directory** > **Protect & secure** > **Conditional Access** > **Policies**.
57+
58+
1. Make sure the state of the Conditional Access policy that you plan to use with your protected action is set to **On** and not **Off** or **Report-only**.
59+
5660
1. Select **Azure Active Directory** > **Roles & admins** > **Protected actions (Preview)**.
5761

5862
:::image type="content" source="media/protected-actions-add/protected-actions-start.png" alt-text="Screenshot of Add protected actions page in Roles and administrators." lightbox="media/protected-actions-add/protected-actions-start.png":::
@@ -173,6 +177,22 @@ The user has previously satisfied policy. For example, the completed multifactor
173177

174178
Check the [Azure AD sign-in events](../conditional-access/troubleshoot-conditional-access.md) to troubleshoot. The sign-in events will include details about the session, including if the user has already completed multifactor authentication. When troubleshooting with the sign-in logs, it's also helpful to check the policy details page, to confirm an authentication context was requested.
175179

180+
### Symptom - Policy is never satisfied
181+
182+
When you attempt to perform the requirements for the Conditional Access policy, the policy is never satisfied and you keep getting requested to reauthenticate.
183+
184+
**Cause**
185+
186+
The Conditional Access policy wasn't created or the policy state is **Off** or **Report-only**.
187+
188+
**Solution**
189+
190+
Create the Conditional Access policy if it doesn't exist or and set the state to **On**.
191+
192+
If you aren't able to access the Conditional Access page because of the protected action and repeated requests to reauthenticate, use the following link to open the Conditional Access page.
193+
194+
- [https://aka.ms/MSALProtectedActions](https://aka.ms/MSALProtectedActions)
195+
176196
### Symptom - No access to add protected actions
177197

178198
When signed in you don't have permissions to add or remove protected actions.

0 commit comments

Comments
 (0)