Skip to content

Commit a81947d

Browse files
committed
revised per PM comments
1 parent 156e45a commit a81947d

File tree

1 file changed

+14
-11
lines changed

1 file changed

+14
-11
lines changed

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -66,18 +66,15 @@ Users in this role can create application registrations when the "Users can regi
6666

6767
### [Authentication Administrator](#authentication-administrator-permissions)
6868

69-
The Authentication administrator role is currently in public preview. Users with this role can set or reset non-password credentials for some users and can update passwords for all users. Authentication administrators can:
69+
Users with this role can set or reset non-password credentials for some users and can update passwords for all users. Authentication administrators can require users who are non-administrators or assigned to some roles to re-register against existing non-password credentials (for example, MFA or FIDO), and can also revoke **remember MFA on the device**, which prompts for MFA on the next sign-in. THese actions apply only to users who are non-administrators or who are assigned one or more of the following roles:
7070

71-
* Require users to re-register against existing non-password credentials (for example, MFA or FIDO)
72-
* Revoke **remember MFA on the device**, which prompts for MFA on the next sign-in of users who are non-administrators or assigned the following roles only:
73-
74-
* Authentication Administrator
75-
* Directory Readers
76-
* Guest Inviter
77-
* Message Center Reader
78-
* Reports Reader
71+
* Authentication Administrator
72+
* Directory Readers
73+
* Guest Inviter
74+
* Message Center Reader
75+
* Reports Reader
7976

80-
The [Privileged authentication administrator](#privileged-authentication-administrator) role has permission can force re-registration and MFA for all users.
77+
The [Privileged authentication administrator](#privileged-authentication-administrator) role has permission can force re-registration and multi-factor authentication for all users.
8178

8279
> [!IMPORTANT]
8380
> Users with this role can change credentials for people who may have access to sensitive or private information or critical configuration inside and outside of Azure Active Directory. Changing the credentials of a user may mean the ability to assume that user's identity and permissions. For example:
@@ -352,7 +349,13 @@ Users with this role can register printers and manage printer status in the Micr
352349

353350
### [Privileged Authentication Administrator](#privileged-authentication-administrator-permissions)
354351

355-
Users with this role can set or reset non-password credentials for all users, including global administrators, and can update passwords for all users. Privileged Authentication Administrators can force users to re-register against existing non-password credential (such as MFA or FIDO) and revoke 'remember MFA on the device', prompting for MFA on the next sign-in of all users. The [Authentication administrator](#authentication-administrator) role can force re-registration and MFA for users and readers.
352+
Users with this role can set or reset non-password credentials for all users, including global administrators, and can update passwords for all users. Privileged Authentication Administrators can force users to re-register against existing non-password credential (such as MFA or FIDO) and revoke 'remember MFA on the device', prompting for MFA on the next sign-in of all users. The [Authentication administrator](#authentication-administrator) role can force re-registration and MFA for non-admins and users assigned to the following Azure AD roles:
353+
354+
* Authentication Administrator
355+
* Directory Readers
356+
* Guest Inviter
357+
* Message Center Reader
358+
* Reports Reader
356359

357360
### [Privileged Role Administrator](#privileged-role-administrator-permissions)
358361

0 commit comments

Comments
 (0)