Skip to content

Commit bcae01c

Browse files
committed
resolve merge conflict
2 parents 7c86a60 + 82fd5d9 commit bcae01c

File tree

91 files changed

+1419
-531
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+1419
-531
lines changed

articles/active-directory/develop/v2-app-types.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ You can ensure the user's identity by validating the ID token with a public sign
7777

7878
To see this scenario in action, try the code samples in [Sign in users from a Web app](scenario-web-app-sign-user-overview.md).
7979

80-
In addition to simple sign-in, a web server app might need to access another web service, such as a Representational State Transfer ([REST](https://docs.microsoft.com/rest/api/azure/)) API. In this case, the web server app engages in a combined OpenID Connect and OAuth 2.0 flow, by using the [OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md). For more information about this scenario, refer to our code [sample](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-1-Call-MSGraph/README.md).
80+
In addition to simple sign-in, a web server app might need to access another web service, such as a [Representational State Transfer (REST) API](/rest/api/azure/). In this case, the web server app engages in a combined OpenID Connect and OAuth 2.0 flow, by using the [OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md). For more information about this scenario, refer to our code [sample](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-1-Call-MSGraph/README.md).
8181

8282
## Web APIs
8383

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.service: active-directory
1313
ms.subservice: enterprise-users
1414
ms.topic: reference
1515
ms.workload: identity
16-
ms.date: 09/19/2022
16+
ms.date: 09/21/2022
1717
ms.author: nicholak
1818
ms.reviewer: Nicholak-MS
1919
ms.custom: "it-pro;seo-update-azuread-jan"
@@ -32,7 +32,7 @@ When managing licenses in [the Azure portal](https://portal.azure.com/#blade/Mic
3232
- **Service plans included (friendly names)**: A list of service plans (friendly names) in the product that correspond to the string ID and GUID
3333

3434
>[!NOTE]
35-
>This information last updated on September 19th, 2022.<br/>You can also download a CSV version of this table [here](https://download.microsoft.com/download/e/3/e/e3e9faf2-f28b-490a-9ada-c6089a1fc5b0/Product%20names%20and%20service%20plan%20identifiers%20for%20licensing.csv).
35+
>This information last updated on September 21st, 2022.<br/>You can also download a CSV version of this table [here](https://download.microsoft.com/download/e/3/e/e3e9faf2-f28b-490a-9ada-c6089a1fc5b0/Product%20names%20and%20service%20plan%20identifiers%20for%20licensing.csv).
3636
><br/>
3737
3838
| Product name | String ID | GUID | Service plans included | Service plans included (friendly names) |

articles/active-directory/fundamentals/secure-with-azure-ad-multiple-tenants.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
# Resource isolation with multiple tenants
1919

20-
There are specific scenarios when delegating administration within a single tenant boundary won't meet your needs. In this section, we'll discuss requirements that may drive you to create a multi-tenant architecture. Multi-tenant organizations might span two or more Azure AD tenants. This can result in unique cross-tenant collaboration and management requirements. Multi-tenant architectures increase management overhead and complexity and should be used with caution. We recommend using a single tenant if your needs can be met with that architecture. For more detailed information, see [Multi-tenant user management]../fundamentals/multi-tenant-user-management-introduction.md).
20+
There are specific scenarios when delegating administration within a single tenant boundary won't meet your needs. In this section, we'll discuss requirements that may drive you to create a multi-tenant architecture. Multi-tenant organizations might span two or more Azure AD tenants. This can result in unique cross-tenant collaboration and management requirements. Multi-tenant architectures increase management overhead and complexity and should be used with caution. We recommend using a single tenant if your needs can be met with that architecture. For more detailed information, see [Multi-tenant user management](multi-tenant-user-management-introduction.md).
2121

2222
A separate tenant creates a new boundary, and therefore decoupled management of Azure AD directory roles, directory objects, conditional access policies, Azure resource groups, Azure management groups, and other controls as described in previous sections.
2323

@@ -183,4 +183,4 @@ Devices: This tenant contains a reduced number of devices; only those that are n
183183

184184
* [Resource isolation in a single tenant](secure-with-azure-ad-single-tenant.md)
185185

186-
* [Best practices](secure-with-azure-ad-best-practices.md)
186+
* [Best practices](secure-with-azure-ad-best-practices.md)

articles/active-directory/governance/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -245,6 +245,8 @@
245245
href: workflows-faqs.md
246246
- name: Developer API reference Lifecycle Workflows- Azure Active Directory
247247
href: lifecycle-workflows-developer-reference.md
248+
- name: Set employeeLeaveDateTime for leaver workflows
249+
href: set-employee-leave-date-time.md
248250
- name: Preparing user accounts for Lifecycle workflows tutorials (Preview)
249251
href: tutorial-prepare-azure-ad-user-accounts.md
250252
- name: Configure a Logic App for Lifecycle Workflow use (Preview)

articles/active-directory/governance/how-to-lifecycle-workflow-sync-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ The following table shows the scheduling (trigger) relevant attributes and the m
2323
|Attribute|Type|Supported in HR Inbound Provisioning|Support in Azure AD Connect Cloud Sync|Support in Azure AD Connect Sync|
2424
|-----|-----|-----|-----|-----|
2525
|employeeHireDate|DateTimeOffset|Yes|Yes|Yes|
26-
|employeeLeaveDateTime|DateTimeOffset|Not currently(manually setting supported)|Not currently(manually setting supported)|Not currently(manually setting supported)|
26+
|employeeLeaveDateTime|DateTimeOffset|Yes|Not currently|Not currently|
2727

2828
> [!NOTE]
29-
> Currently, automatic synchronization of the employeeLeaveDateTime attribute for HR Inbound scenarios is not available. To take advantaged of leaver scenarios, you can set the employeeLeaveDateTime manually. Manually setting the attribute can be done in the portal or with Graph. For more information see [User profile in Azure](../fundamentals/active-directory-users-profile-azure-portal.md) and [Update user](/graph/api/user-update?view=graph-rest-beta&tabs=http).
29+
> To take advantaged of leaver scenarios, you can set the employeeLeaveDateTime manually for cloud-only users. For more information, see: [Set employeeLeaveDateTime](set-employee-leave-date-time.md)
3030
3131
This document explains how to set up synchronization from on-premises Azure AD Connect cloud sync and Azure AD Connect for the required attributes.
3232

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
title: Set employeeLeaveDateTime
3+
description: Explains how to manually set employeeLeaveDateTime.
4+
author: owinfreyATL
5+
ms.author: owinfrey
6+
ms.service: active-directory
7+
ms.topic: how-to
8+
ms.date: 09/07/2022
9+
ms.custom: template-how-to
10+
---
11+
12+
# Set employeeLeaveDateTime
13+
14+
This article describes how to manually set the employeeLeaveDateTime attribute for a user. This attribute can be set as a trigger for leaver workflows created using Lifecycle Workflows.
15+
16+
## Required permission and roles
17+
18+
To set the employeeLeaveDateTime attribute, you must make sure the correct delegated roles and application permissions are set. They are as follows:
19+
20+
### Delegated
21+
22+
In delegated scenarios, the signed-in user needs the Global Administrator role to update the employeeLeaveDateTime attribute. One of the following delegated permissions is also required:
23+
- User-LifeCycleInfo.ReadWrite.All
24+
- Directory.AccessAsUser.All
25+
26+
### Application
27+
28+
Updating the employeeLeaveDateTime requires the User-LifeCycleInfo.ReadWrite.All application permission.
29+
30+
>[!NOTE]
31+
> The User-LifeCycleInfo.ReadWrite.All permissions is currently hidden and cannot be configured in Graph Explorer or the API permission blade of app registrations.
32+
33+
## Set employeeLeaveDateTime via PowerShell
34+
To set the employeeLeaveDateTime for a user using PowerShell enter the following information:
35+
36+
```powershell
37+
Connect-MgGraph -Scopes "User-LifeCycleInfo.ReadWrite.All"
38+
Select-MgProfile -Name "beta"
39+
40+
$UserId = "<Object ID of the user>"
41+
$employeeLeaveDateTime = "<Leave date>"
42+
43+
$Body = '{"employeeLeaveDateTime": "' + $employeeLeaveDateTime + '"}'
44+
Update-MgUser -UserId $UserId -BodyParameter $Body
45+
46+
$User = Get-MgUser -UserId $UserId -Property employeeLeaveDateTime
47+
$User.AdditionalProperties
48+
```
49+
50+
This script is an example of a user who will leave on September 30, 2022 at 23:59.
51+
52+
```powershell
53+
Connect-MgGraph -Scopes "User-LifeCycleInfo.ReadWrite.All"
54+
Select-MgProfile -Name "beta"
55+
56+
$UserId = "528492ea-779a-4b59-b9a3-b3773ef6da6d"
57+
$employeeLeaveDateTime = "2022-09-30T23:59:59Z"
58+
59+
$Body = '{"employeeLeaveDateTime": "' + $employeeLeaveDateTime + '"}'
60+
Update-MgUser -UserId $UserId -BodyParameter $Body
61+
62+
$User = Get-MgUser -UserId $UserId -Property employeeLeaveDateTime
63+
$User.AdditionalProperties
64+
```
65+
66+
67+
## Next steps
68+
69+
- [How to synchronize attributes for Lifecycle workflows](how-to-lifecycle-workflow-sync-attributes.md)
70+
- [Lifecycle Workflows templates](lifecycle-workflow-templates.md)

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,9 @@ Caveat: If there are synchronized accounts that need to have non-expiring passwo
124124
> [!NOTE]
125125
> The Set-MsolPasswordPolicy PowerShell command will not work on federated domains.
126126
127+
> [!NOTE]
128+
> The Set-AzureADUser PowerShell command will not work on federated domains.
129+
127130
#### Synchronizing temporary passwords and "Force Password Change on Next Logon"
128131

129132
It is typical to force a user to change their password during their first logon, especially after an admin password reset occurs. It is commonly known as setting a "temporary" password and is completed by checking the "User must change password at next logon" flag on a user object in Active Directory (AD).

articles/active-directory/hybrid/how-to-connect-sync-whatis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The sync service consists of two components, the on-premises **Azure AD Connect
2929
>
3030
>To find out if you are already eligible for Cloud Sync, please verify your requirements in [this wizard](https://admin.microsoft.com/adminportal/home?Q=setupguidance#/modernonboarding/identitywizard).
3131
>
32-
>To learn more about Cloud Sync please read [this article](https://docs.microsoft.com/azure/active-directory/cloud-sync/what-is-cloud-sync), or watch this [short video](https://www.microsoft.com/en-us/videoplayer/embed/RWJ8l5).
32+
>To learn more about Cloud Sync please read [this article](/azure/active-directory/cloud-sync/what-is-cloud-sync), or watch this [short video](https://www.microsoft.com/videoplayer/embed/RWJ8l5).
3333
>
3434
3535

Lines changed: 36 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22

3-
title: How to view applied conditional access policies in the Azure AD sign-in logs | Microsoft Docs
4-
description: Learn how to view applied conditional access policies in the Azure AD sign-in logs
3+
title: View applied Conditional Access policies in Azure AD sign-in logs
4+
description: Learn how to view Conditional Access policies in Azure AD sign-in logs so that you can assess the impact of those policies.
55
services: active-directory
66
documentationcenter: ''
77
author: MarkusVi
@@ -19,45 +19,35 @@ ms.reviewer: besiler
1919
ms.collection: M365-identity-device-management
2020
---
2121

22-
# How to: View applied conditional access policies in the Azure AD sign-in logs
22+
# View applied Conditional Access policies in Azure AD sign-in logs
2323

24-
With conditional access policies, you can control, how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your conditional access policies have on sign-ins to your tenant, so that you can take action if necessary. The sign-in logs in Azure AD provide you with the information you need to assess the impact of your policies.
25-
26-
27-
This article explains how you can get access to the information about applied conditional access policies.
24+
With Conditional Access policies, you can control how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your Conditional Access policies have on sign-ins to your tenant, so that you can take action if necessary.
2825

26+
The sign-in logs in Azure Active Directory (Azure AD) give you the information that you need to assess the impact of your policies. This article explains how to view applied Conditional Access policies in those logs.
2927

3028
## What you should know
3129

3230
As an Azure AD administrator, you can use the sign-in logs to:
3331

34-
- Troubleshoot sign in problems
35-
- Check on feature performance
36-
- Evaluate security of a tenant
37-
38-
Some scenarios require you to get an understanding for how your conditional access policies were applied to a sign-in event. Common examples include:
39-
40-
- **Helpdesk administrators** who need to look at applied conditional access policies to understand if a policy is the root cause of a ticket opened by a user.
41-
42-
- **Tenant administrators** who need to verify that conditional access policies have the intended impact on the users of a tenant.
32+
- Troubleshoot sign-in problems.
33+
- Check on feature performance.
34+
- Evaluate the security of a tenant.
4335

36+
Some scenarios require you to get an understanding of how your Conditional Access policies were applied to a sign-in event. Common examples include:
4437

45-
You can access the sign-in logs using the Azure portal, MS Graph, and PowerShell.
38+
- *Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
4639

40+
- *Tenant administrators* who need to verify that Conditional Access policies have the intended impact on the users of a tenant.
4741

42+
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
4843

4944
## Required administrator roles
5045

46+
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view both the logs and the policies.
5147

52-
To see applied conditional access policies in the sign-in logs, administrators must have permissions to:
53-
54-
- View sign-in logs
55-
- View conditional access policies
56-
57-
The least privileged built-in role that grants both permissions is the **Security Reader**. As a best practice, your global administrator should add the **Security Reader** role to the related administrator accounts.
58-
48+
The least privileged built-in role that grants both permissions is *Security Reader*. As a best practice, your global administrator should add the Security Reader role to the related administrator accounts.
5949

60-
The following built in roles grant permissions to read conditional access policies:
50+
The following built-in roles grant permissions to read Conditional Access policies:
6151

6252
- Global Administrator
6353

@@ -70,7 +60,7 @@ The following built in roles grant permissions to read conditional access polici
7060
- Conditional Access Administrator
7161

7262

73-
The following built in roles grant permission to view sign-in logs:
63+
The following built-in roles grant permission to view sign-in logs:
7464

7565
- Global Administrator
7666

@@ -82,64 +72,57 @@ The following built in roles grant permission to view sign-in logs:
8272

8373
- Reports Reader
8474

85-
8675
## Permissions for client apps
8776

88-
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy** resource from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it's the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
77+
If you use a client app to pull sign-in logs from Microsoft Graph, your app needs permissions to receive the `appliedConditionalAccessPolicy` resource from Microsoft Graph. As a best practice, assign `Policy.Read.ConditionalAccess` because it's the least privileged permission.
8978

90-
- Policy.Read.ConditionalAccess
79+
Any of the following permissions is sufficient for a client app to access applied certificate authority (CA) policies in sign-in logs through Microsoft Graph:
9180

92-
- Policy.ReadWrite.ConditionalAccess
81+
- `Policy.Read.ConditionalAccess`
9382

94-
- Policy.Read.All
83+
- `Policy.ReadWrite.ConditionalAccess`
9584

96-
85+
- `Policy.Read.All`
9786

9887
## Permissions for PowerShell
9988

100-
Like any other client app, the Microsoft Graph PowerShell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph PowerShell. As a best practice, consent to:
89+
Like any other client app, the Microsoft Graph PowerShell module needs client permissions to access applied Conditional Access policies in the sign-in logs. To successfully pull applied Conditional Access policies in the sign-in logs, you must consent to the necessary permissions with your administrator account for Microsoft Graph PowerShell. As a best practice, consent to:
10190

102-
- Policy.Read.ConditionalAccess
103-
- AuditLog.Read.All
104-
- Directory.Read.All
91+
- `Policy.Read.ConditionalAccess`
92+
- `AuditLog.Read.All`
93+
- `Directory.Read.All`
10594

10695
These permissions are the least privileged permissions with the necessary access.
10796

10897
To consent to the necessary permissions, use:
10998

110-
` Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All `
99+
`Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
111100

112101
To view the sign-in logs, use:
113102

114-
`Get-MgAuditLogSignIn `
115-
116-
The output of this cmdlet contains a **AppliedConditionalAccessPolicies** property that shows all the conditional access policies applied to the sign-in.
103+
`Get-MgAuditLogSignIn`
117104

118105
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://learn.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
119106

120-
The AzureAD Graph PowerShell module doesn't support viewing applied conditional access policies; only the Microsoft Graph PowerShell module returns applied conditional access policies.
107+
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
121108

122109
## Confirming access
123110

124-
In the **Conditional Access** tab, you see a list of conditional access policies applied to that sign-in event.
125-
111+
On the **Conditional Access** tab, you see a list of Conditional Access policies applied to that sign-in event.
126112

127-
To confirm that you have admin access to view applied conditional access policies in the sign-ins logs, do:
113+
To confirm that you have admin access to view applied Conditional Access policies in the sign-in logs:
128114

129-
1. Navigate to the Azure portal.
115+
1. Go to the Azure portal.
130116

131-
2. In the top-right corner, select your directory, and then select **Azure Active Directory**in the left navigation pane.
117+
2. In the upper-right corner, select your directory, and then select **Azure Active Directory**on the left pane.
132118

133119
3. In the **Monitoring** section, select **Sign-in logs**.
134120

135-
4. Click an item in the sign-in row table to bring up the Activity Details: Sign-ins context pane.
136-
137-
5. Click on the Conditional Access tab in the context pane. If your screen is small, you may need to click the ellipsis [] to see all context pane tabs.
138-
139-
121+
4. Select an item in the sign-in table to open the **Activity Details: Sign-ins context** pane.
140122

123+
5. Select the **Conditional Access** tab on the context pane. If your screen is small, you might need to select the ellipsis (**...**) to see all tabs on the context pane.
141124

142125
## Next steps
143126

144-
* [Sign-ins error codes reference](./concept-sign-ins.md)
145-
* [Sign-ins report overview](concept-sign-ins.md)
127+
* [Sign-in error code reference](./concept-sign-ins.md)
128+
* [Sign-in report overview](concept-sign-ins.md)

0 commit comments

Comments
 (0)