You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Yes, a customer can detect, mitigate, and monitor the risk of 'backdoor' account
31
31
32
32
## Where can customers access Permissions Management?
33
33
34
-
Customers can access the Permissions Management interface with a link from the Azure AD extension in the Azure portal.
34
+
Customers can access the Permissions Management interface from the [Microsoft Entra admin center](https://entra.microsoft.com/).
35
35
36
36
## Can non-cloud customers use Permissions Management on-premises?
37
37
@@ -128,7 +128,7 @@ No, Permissions Management doesn't have access to sensitive personal data.
128
128
129
129
## Where can I find more information about Permissions Management?
130
130
131
-
You can read our blog and visit our web page. You can also get in touch with your Microsoft point of contact to schedule a demo.
131
+
You can read our [blog](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/bg-p/Identity) and visit our [web page](https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-permissions-management). You can also get in touch with your Microsoft point of contact to schedule a demo.
132
132
133
133
## What is the data destruction/decommission process?
134
134
@@ -152,7 +152,7 @@ Although Permissions Management supports all resources, Microsoft only requires
152
152
153
153
## How do I figure out how many resources I have?
154
154
155
-
To find out how many resources you have across your multicloud infrastructure, view the Billable Resources tab in Permissions Management.
155
+
To find out how many resources you have across your multicloud infrastructure, select Settings (gear icon) and view the Billable Resources tab in Permissions Management.
156
156
157
157
## What do I do if I’m using Public Preview version of Entra Permissions Management?
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,6 @@ Administrators can assign a Conditional Access policy to the following cloud app
42
42
- Microsoft Application Insights Analytics
43
43
-[Microsoft Azure Information Protection](/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-users-groups.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,6 +55,9 @@ The following options are available to include when creating a Conditional Acces
55
55
> [!WARNING]
56
56
> Conditional Access policies do not support users assigned a directory role [scoped to an administrative unit](../roles/admin-units-assign-roles.md) or directory roles scoped directly to an object, like through [custom roles](../roles/custom-create.md).
57
57
58
+
> [!NOTE]
59
+
> When targeting policies to B2B direct connect external users, these policies will also be applied to B2B collaboration users accessing Teams or SharePoint Online who are also eligible for B2B direct connect. The same applies for policies targeted to B2B collaboration external users, meaning users accessing Teams shared channels will have B2B collaboration policies apply if they also have a guest user presence in the tenant.
60
+
58
61
## Exclude users
59
62
60
63
When organizations both include and exclude a user or group the user or group is excluded from the policy, as an exclude action overrides an include in policy. Exclusions are commonly used for emergency access or break-glass accounts. More information about emergency access accounts and why they're important can be found in the following articles:
Copy file name to clipboardExpand all lines: articles/active-directory/develop/app-objects-and-service-principals.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ To access resources that are secured by an Azure AD tenant, the entity that requ
49
49
50
50
There are three types of service principal:
51
51
52
-
-**Application** - The type of service principal is the local representation, or application instance, of a global application object in a single tenant or directory. In this case, a service principal is a concrete instance created from the application object and inherits certain properties from that application object. A service principal is created in each tenant where the application is used and references the globally unique app object. The service principal object defines what the app can actually do in the specific tenant, who can access the app, and what resources the app can access.
52
+
-**Application** - This type of service principal is the local representation, or application instance, of a global application object in a single tenant or directory. In this case, a service principal is a concrete instance created from the application object and inherits certain properties from that application object. A service principal is created in each tenant where the application is used and references the globally unique app object. The service principal object defines what the app can actually do in the specific tenant, who can access the app, and what resources the app can access.
53
53
54
54
When an application is given permission to access resources in a tenant (upon registration or consent), a service principal object is created. When you register an application using the Azure portal, a service principal is created automatically. You can also create service principal objects in a tenant using Azure PowerShell, Azure CLI, Microsoft Graph, and other tools.
0 commit comments