Skip to content

Commit ac63766

Browse files
authored
Merge pull request #220284 from MicrosoftDocs/main
12/02 PM Publish
2 parents 01eea9e + 818357e commit ac63766

File tree

196 files changed

+2664
-1328
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

196 files changed

+2664
-1328
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10921,6 +10921,11 @@
1092110921
"redirect_url": "/azure/azure-percept/index",
1092210922
"redirect_document_id": false
1092310923
},
10924+
{
10925+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-install-use-log-analytics-views.md",
10926+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
10927+
"redirect_document_id": false
10928+
},
1092410929
{
1092510930
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-groups-create-azure-portal.md",
1092610931
"redirect_url": "/azure/active-directory/fundamentals/how-to-manage-groups",

articles/active-directory/conditional-access/troubleshoot-policy-changes-audit-log.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: troubleshooting
9-
ms.date: 08/22/2022
9+
ms.date: 12/02/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -32,11 +32,12 @@ Find these options in the **Azure portal** > **Azure Active Directory**, **Diagn
3232

3333
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
3434
1. Browse to **Azure Active Directory** > **Audit logs**.
35-
1. Select the **Date** range you want to query in.
36-
1. Select **Activity** and choose one of the following
37-
1. **Add conditional access policy** - This activity lists newly created policies
38-
1. **Update conditional access policy** - This activity lists changed policies
39-
1. **Delete conditional access policy** - This activity lists deleted policies
35+
1. Select the **Date** range you want to query.
36+
1. From the **Service** filter, select **Conditional Access** and select the **Apply** button.
37+
38+
The audit logs display all activities, by default. Open the **Activity** filter to narrow down the activities. For a full list of the audit log activities for Conditional Access, see the [Audit log activities](../reports-monitoring/reference-audit-activities.md#conditional-access).
39+
40+
1. Select a row to view the details. The **Modified Properties** tab lists the modified JSON values for the selected audit activity.
4041

4142
:::image type="content" source="media/troubleshoot-policy-changes-audit-log/old-and-new-policy-properties.png" alt-text="Audit log entry showing old and new JSON values for Conditional Access policy" lightbox="media/troubleshoot-policy-changes-audit-log/old-and-new-policy-properties.png":::
4243

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,110 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
2222
This page is updated monthly, so revisit it regularly.
2323

2424

25+
## November 2022
26+
27+
### General availability - Windows Hello for Business, cloud Kerberos trust deployment
28+
29+
30+
31+
**Type:** New feature
32+
**Service category:** Authentications (Logins)
33+
**Product capability:** User Authentication
34+
35+
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business much easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Hybrid Cloud Kerberos Trust Deployment](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust).
36+
37+
---
38+
39+
### General availability - Expression builder with Application Provisioning
40+
41+
**Type:** Changed feature
42+
**Service category:** Provisioning
43+
**Product capability:** Outbound to SaaS Applications
44+
45+
46+
Accidental deletion of users in your apps or in your on-premises directory could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability. When a provisioning job would cause a spike in deletions, it will first pause and provide you visibility into the potential deletions. You can then accept or reject the deletions and have time to update the job’s scope if necessary. For more information, see [Understand how expression builder in Application Provisioning works](../app-provisioning/expression-builder.md).
47+
48+
49+
---
50+
51+
### General availability - SSPR writeback is now available for disconnected forests using Azure AD Connect Cloud sync
52+
53+
54+
55+
**Type:** New feature
56+
**Service category:** Azure AD Connect Cloud Sync
57+
**Product capability:** Identity Lifecycle Management
58+
59+
Azure AD Connect Cloud Sync Password writeback now provides customers the ability to synchronize Azure AD password changes made in the cloud to an on-premises directory in real time. This can be accomplished using the lightweight Azure AD cloud provisioning agent. For more information, see: [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment](../authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
60+
61+
---
62+
63+
### General availability - Prevent accidental deletions
64+
65+
66+
67+
**Type:** New feature
68+
**Service category:** Provisioning
69+
**Product capability:** Outbound to SaaS Applications
70+
71+
72+
73+
Accidental deletion of users in any system could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability as part of the Azure AD provisioning service. When the number of deletions to be processed in a single provisioning cycle spikes above a customer defined threshold, the Azure AD provisioning service will pause, provide you visibility into the potential deletions, and allow you to accept or reject the deletions. This functionality has historically been available for Azure AD Connect, and Azure AD Connect Cloud Sync. It's now available across the various provisioning flows, including both HR-driven provisioning and application provisioning.
74+
75+
For more information, see: [Enable accidental deletions prevention in the Azure AD provisioning service](../app-provisioning/accidental-deletions.md)
76+
77+
---
78+
79+
### General availability - Create group in administrative unit
80+
81+
**Type:** New feature
82+
**Service category:** RBAC
83+
**Product capability:** AuthZ/Access Delegation
84+
85+
86+
Groups Administrators and other roles scoped to an administrative unit can now create groups within the administrative unit. Previously, creating a new group in administrative unit required a two-step process to first create the group, then add the group to the administrative unit. The second step required a Privileged Role Administrator or Global Administrator. Now, groups can be directly created in an administrative unit by anyone with appropriate roles scoped to the administrative unit, and this no longer requires a higher privilege admin role. For more information, see: [Add users, groups, or devices to an administrative unit](../roles/admin-units-members-add.md).
87+
88+
---
89+
90+
### General availability - Number matching for Microsoft Authenticator notifications
91+
92+
93+
94+
**Type:** New feature
95+
**Service category:** Microsoft Authenticator App
96+
**Product capability:** User Authentication
97+
98+
To prevent accidental notification approvals, admins can now require users to enter the number displayed on the sign-in screen when approving an MFA notification in the Microsoft Authenticator app. We've also refreshed the Azure portal admin UX and Microsoft Graph APIs to make it easier for customers to manage Authenticator app feature roll-outs. As part of this update we have also added the highly requested ability for admins to exclude user groups from each feature.
99+
100+
The number matching feature greatly up-levels the security posture of the Microsoft Authenticator app and protects organizations from MFA fatigue attacks. We highly encourage our customers to adopt this feature applying the rollout controls we have built. Number Matching will begin to be enabled for all users of the Microsoft Authenticator app starting 27th of February 2023.
101+
102+
103+
For more information, see: [How to use number matching in multifactor authentication (MFA) notifications - Authentication methods policy](../authentication/how-to-mfa-number-match.md).
104+
105+
---
106+
107+
### General availability - Additional context in Microsoft Authenticator notifications
108+
109+
110+
111+
**Type:** New feature
112+
**Service category:** Microsoft Authenticator App
113+
**Product capability:** User Authentication
114+
115+
Reduce accidental approvals by showing users additional context in Microsoft Authenticator app notifications. Customers can enhance notifications with the following:
116+
117+
- Application Context: This feature will show users which application they're signing into.
118+
- Geographic Location Context: This feature will show users their sign-in location based on the IP address of the device they're signing into.
119+
120+
The feature is available for both MFA and Password-less Phone Sign-in notifications and greatly increases the security posture of the Microsoft Authenticator app. We've also refreshed the Azure portal Admin UX and Microsoft Graph APIs to make it easier for customers to manage Authenticator app feature roll-outs. As part of this update, we've also added the highly requested ability for admins to exclude user groups from certain features.
121+
122+
We highly encourage our customers to adopt these critical security features to reduce accidental approvals of Authenticator notifications by end users.
123+
124+
125+
For more information, see: [How to use additional context in Microsoft Authenticator notifications - Authentication methods policy](../authentication/how-to-mfa-additional-context.md).
126+
127+
---
128+
25129

26130
## October 2022
27131

articles/active-directory/governance/entitlement-management-access-package-create.md

Lines changed: 85 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,13 +134,96 @@ On the **Review + create** tab, you can review your settings and check for any v
134134

135135
## Creating an access package programmatically
136136

137-
You can also create an access package using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.ReadWrite.All` permission can call the API to
137+
There are two ways to create an access package programmatically, through Microsoft Graph and through the PowerShell cmdlets for Microsoft Graph.
138+
139+
### Creating an access package with Microsoft Graph
140+
141+
You can create an access package using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.ReadWrite.All` permission can call the API to
138142

139143
1. [List the accessPackageResources in the catalog](/graph/api/entitlementmanagement-list-accesspackagecatalogs?tabs=http&view=graph-rest-beta&preserve-view=true) and [create an accessPackageResourceRequest](/graph/api/entitlementmanagement-post-accesspackageresourcerequests?tabs=http&view=graph-rest-beta&preserve-view=true) for any resources that aren't yet in the catalog.
140144
1. [List the accessPackageResourceRoles](/graph/api/accesspackage-list-accesspackageresourcerolescopes?tabs=http&view=graph-rest-beta&preserve-view=true) of each accessPackageResource in an accessPackageCatalog. This list of roles will then be used to select a role, when later creating an accessPackageResourceRoleScope.
141145
1. [Create an accessPackage](/graph/tutorial-access-package-api).
142-
1. [Create an accessPackageAssignmentPolicy](/graph/api/entitlementmanagement-post-accesspackageassignmentpolicies?tabs=http&view=graph-rest-beta&preserve-view=true) for each policy needed in the access package.
143146
1. [Create an accessPackageResourceRoleScope](/graph/api/accesspackage-post-accesspackageresourcerolescopes?tabs=http&view=graph-rest-beta&preserve-view=true) for each resource role needed in the access package.
147+
1. [Create an accessPackageAssignmentPolicy](/graph/api/entitlementmanagement-post-accesspackageassignmentpolicies?tabs=http&view=graph-rest-beta&preserve-view=true) for each policy needed in the access package.
148+
149+
150+
### Creating an access package with Microsoft PowerShell
151+
152+
You can also create an access package in PowerShell with the cmdlets from the [Microsoft Graph PowerShell cmdlets for Identity Governance](https://www.powershellgallery.com/packages/Microsoft.Graph.Identity.Governance/) module version 1.16.0 or later. This script illustrates using the Graph `beta` profile.
153+
154+
First, you would retrieve the ID of the catalog, and of the resources and their roles in that catalog that you wish to include in the access package, using a script similar to the following.
155+
156+
```powershell
157+
Connect-MgGraph -Scopes "EntitlementManagement.ReadWrite.All"
158+
Select-MgProfile -Name "beta"
159+
$catalog = Get-MgEntitlementManagementAccessPackageCatalog -Filter "displayName eq 'Marketing'"
160+
161+
$rsc = Get-MgEntitlementManagementAccessPackageCatalogAccessPackageResource -AccessPackageCatalogId $catalog.Id -Filter "resourceType eq 'Application'" -ExpandProperty "accessPackageResourceScopes"
162+
$filt = "(originSystem eq 'AadApplication' and accessPackageResource/id eq '" + $rsc[0].Id + "')"
163+
$rr = Get-MgEntitlementManagementAccessPackageCatalogAccessPackageResourceRole -AccessPackageCatalogId $catalog.Id -Filter $filt -ExpandProperty "accessPackageResource"
164+
```
165+
166+
Then, create the access package.
167+
168+
```powershell
169+
$params = @{
170+
CatalogId = $catalog.id
171+
DisplayName = "sales reps"
172+
Description = "outside sales representatives"
173+
}
174+
175+
$ap = New-MgEntitlementManagementAccessPackage -BodyParameter $params
176+
```
177+
Once the access package has been created, assign the resource roles to the access package. For example, if you wished to include the second resource role of the first resource returned earlier as a resource role of the new access package, you would use a script similar to the following.
178+
179+
```powershell
180+
$rparams = @{
181+
AccessPackageResourceRole = @{
182+
OriginId = $rr[2].OriginId
183+
DisplayName = $rr[2].DisplayName
184+
OriginSystem = $rr[2].OriginSystem
185+
AccessPackageResource = @{
186+
Id = $rsc[0].Id
187+
ResourceType = $rsc[0].ResourceType
188+
OriginId = $rsc[0].OriginId
189+
OriginSystem = $rsc[0].OriginSystem
190+
}
191+
}
192+
AccessPackageResourceScope = @{
193+
OriginId = $rsc[0].OriginId
194+
OriginSystem = $rsc[0].OriginSystem
195+
}
196+
}
197+
New-MgEntitlementManagementAccessPackageResourceRoleScope -AccessPackageId $ap.Id -BodyParameter $rparams
198+
```
199+
200+
Finally, create the policies. In this policy, only the administrator can assign access, and there are no access reviews. See [create an accessPackageAssignmentPolicy](/graph/api/entitlementmanagement-post-assignmentpolicies?tabs=http&view=graph-rest-beta&preserve-view=true) for more examples.
201+
202+
```powershell
203+
204+
$pparams = @{
205+
AccessPackageId = $ap.Id
206+
DisplayName = "direct"
207+
Description = "direct assignments by administrator"
208+
AccessReviewSettings = $null
209+
RequestorSettings = @{
210+
ScopeType = "NoSubjects"
211+
AcceptRequests = $true
212+
AllowedRequestors = @(
213+
)
214+
}
215+
RequestApprovalSettings = @{
216+
IsApprovalRequired = $false
217+
IsApprovalRequiredForExtension = $false
218+
IsRequestorJustificationRequired = $false
219+
ApprovalMode = "NoApproval"
220+
ApprovalStages = @(
221+
)
222+
}
223+
}
224+
New-MgEntitlementManagementAccessPackageAssignmentPolicy -BodyParameter $pparams
225+
226+
```
144227

145228
## Next steps
146229

articles/active-directory/governance/entitlement-management-access-package-request-policy.md

Lines changed: 40 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,46 @@ To change the request and approval settings for an access package, you need to o
211211

212212
## Creating an access package assignment policy programmatically
213213

214-
You can also create a policy using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.ReadWrite.All` permission, or an application in a catalog role or with the `EntitlementManagement.ReadWrite.All` permission, can call the [create an accessPackageAssignmentPolicy](/graph/api/entitlementmanagement-post-assignmentpolicies?tabs=http&view=graph-rest-1.0&preserve-view=true) API.
214+
There are two ways to create an access package assignment policy programmatically, through Microsoft Graph and through the PowerShell cmdlets for Microsoft Graph.
215+
216+
### Creating an access package assignment policy through Graph
217+
218+
You can create a policy using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.ReadWrite.All` permission, or an application in a catalog role or with the `EntitlementManagement.ReadWrite.All` permission, can call the [create an accessPackageAssignmentPolicy](/graph/api/entitlementmanagement-post-assignmentpolicies?tabs=http&view=graph-rest-1.0&preserve-view=true) API.
219+
220+
### Creating an access package assignment policy through PowerShell
221+
222+
You can also create an access package in PowerShell with the cmdlets from the [Microsoft Graph PowerShell cmdlets for Identity Governance](https://www.powershellgallery.com/packages/Microsoft.Graph.Identity.Governance/) module version 1.16.0 or later.
223+
224+
This script below illustrates using the `beta` profile, to create a policy for direct assignment to an access package. In this policy, only the administrator can assign access, and there are no access reviews. See [create an accessPackageAssignmentPolicy](/graph/api/entitlementmanagement-post-assignmentpolicies?tabs=http&view=graph-rest-beta&preserve-view=true) for more examples.
225+
226+
```powershell
227+
Connect-MgGraph -Scopes "EntitlementManagement.ReadWrite.All"
228+
Select-MgProfile -Name "beta"
229+
230+
$apid = "cdd5f06b-752a-4c9f-97a6-82f4eda6c76d"
231+
232+
$pparams = @{
233+
AccessPackageId = $apid
234+
DisplayName = "direct"
235+
Description = "direct assignments by administrator"
236+
AccessReviewSettings = $null
237+
RequestorSettings = @{
238+
ScopeType = "NoSubjects"
239+
AcceptRequests = $true
240+
AllowedRequestors = @(
241+
)
242+
}
243+
RequestApprovalSettings = @{
244+
IsApprovalRequired = $false
245+
IsApprovalRequiredForExtension = $false
246+
IsRequestorJustificationRequired = $false
247+
ApprovalMode = "NoApproval"
248+
ApprovalStages = @(
249+
)
250+
}
251+
}
252+
New-MgEntitlementManagementAccessPackageAssignmentPolicy -BodyParameter $pparams
253+
```
215254

216255
## Prevent requests from users with incompatible access
217256

0 commit comments

Comments
 (0)