Skip to content

Commit bfdee90

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents cf50a28 + b699fa1 commit bfdee90

File tree

191 files changed

+1582
-4948
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

191 files changed

+1582
-4948
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4361,6 +4361,11 @@
43614361
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started",
43624362
"redirect_document_id": true
43634363
},
4364+
{
4365+
"source_path_from_root": "/articles/active-directory/conditional-access/faqs.md",
4366+
"redirect_url": "/azure/active-directory/conditional-access/overview",
4367+
"redirect_document_id": false
4368+
},
43644369
{
43654370
"source_path_from_root": "/articles/active-directory/conditional-access/concept-baseline-protection.md",
43664371
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",

articles/active-directory/app-provisioning/export-import-provisioning-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ You can use the Microsoft Graph API and the Microsoft Graph Explorer to export y
5252
### Step 2: Sign into Microsoft Graph Explorer
5353

5454
1. Launch [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)
55-
1. Click on the "Sign-In with Microsoft" button and sign-in using Azure AD Global Admin or App Admin credentials.
55+
1. Click on the "Sign-In with Microsoft" button and sign-in using Azure AD Global Administrator or App Admin credentials.
5656

5757
![Microsoft Graph Sign-in](./media/export-import-provisioning-configuration/wd_export_02.png)
5858

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Because this configuration is widely used with the *Workday to Active Directory
3232
## Step 2: Sign into Microsoft Graph Explorer
3333

3434
1. Launch [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)
35-
1. Click on the "Sign-In with Microsoft" button and sign-in using Azure AD Global Admin or App Admin credentials.
35+
1. Click on the "Sign-In with Microsoft" button and sign-in using Azure AD Global Administrator or App Admin credentials.
3636

3737
![Screenshot of Microsoft Graph Explorer Sign-in.](./media/skip-out-of-scope-deletions/wd_export_02.png)
3838

articles/active-directory/app-proxy/application-proxy-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ sections:
102102
- question: |
103103
Should I create a dedicated account to register the connector with Azure AD Application Proxy?
104104
answer: |
105-
There's no reason to. Any global admin or application administrator account will work. The credentials entered during installation aren't used after the registration process. Instead, a certificate is issued to the connector, which is used for authentication from that point on.
105+
There's no reason to. Any Global Administrator or application administrator account will work. The credentials entered during installation aren't used after the registration process. Instead, a certificate is issued to the connector, which is used for authentication from that point on.
106106
107107
- question: |
108108
How can I monitor the performance of the Azure AD Application Proxy connector?

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 01/29/2023
8+
ms.date: 01/30/2023
99

1010
ms.author: justinha
11-
author: vimrang
11+
author: justinha
1212
manager: amycolannino
1313
ms.reviewer: vimrang
1414

@@ -134,7 +134,7 @@ To enable the certificate-based authentication in the Azure portal, complete the
134134
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Authentication Policy Administrator.
135135
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
136136
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
137-
1. Under **Basics**, select **Yes** to enable CBA.
137+
1. Under **Enable and Target**, click **Enable**.
138138
1. Click **All users**, or click **Add groups** to select specific groups.
139139

140140
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::

articles/active-directory/authentication/howto-authentication-passwordless-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ To view the Azure AD Kerberos Server Objects and verify they are in good order,
122122
# Specify the on-premises AD DS domain.
123123
$domain = "corp.contoso.com"
124124
125-
# Enter an Azure Active Directory Global Admin username and password.
125+
# Enter an Azure Active Directory Global Administrator username and password.
126126
$cloudCred = Get-Credential
127127
128128
# Enter a Domain Admin username and password.

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/03/2023
9+
ms.date: 01/30/2023
1010

1111
ms.author: justinha
1212
author: calui
@@ -43,8 +43,8 @@ Here's what you need to know about email as an alternate login ID:
4343
* If the non-UPN email in use becomes stale (no longer belongs to the user), these claims will return the UPN instead.
4444
* The feature supports managed authentication with Password Hash Sync (PHS) or Pass-Through Authentication (PTA).
4545
* There are two options for configuring the feature:
46-
* [Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global administrator privileges required.
47-
* [Staged rollout policy](#enable-staged-rollout-to-test-user-sign-in-with-an-email-address) - Use this option to test the feature with specific Azure AD groups. Global administrator privileges required. When you first add a security group for staged rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
46+
* [Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global Administrator, Application Administrator, or Cloud Application Administrator role is required.
47+
* [Staged rollout policy](#enable-staged-rollout-to-test-user-sign-in-with-an-email-address) - Use this option to test the feature with specific Azure AD groups. Global Administrator privileges required. When you first add a security group for staged rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
4848

4949
## Preview limitations
5050

@@ -132,11 +132,11 @@ Email as an alternate login ID applies to [Azure AD B2B collaboration](../extern
132132
133133
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
134134

135-
During preview, you currently need *global administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
135+
During preview, you currently need *Global Administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
136136

137137
### Azure portal
138138

139-
1. Sign in to the [Azure portal][azure-portal] as a *global administrator*.
139+
1. Sign in to the [Azure portal][azure-portal] as a *Global Administrator*.
140140
1. Search for and select **Azure Active Directory**.
141141
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Azure AD Connect > Email as alternate login ID**.
142142

@@ -156,7 +156,7 @@ With the policy applied, it can take up to 1 hour to propagate and for users to
156156
157157
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign-in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
158158

159-
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *global administrator* privileges to complete the following steps:
159+
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *Global Administrator* privileges to complete the following steps:
160160

161161
1. Open a PowerShell session as an administrator, then install the *Microsoft.Graph* module using the `Install-Module` cmdlet:
162162

@@ -274,7 +274,7 @@ Remove-MgPolicyHomeRealmDiscoveryPolicy -HomeRealmDiscoveryPolicyId "HRD_POLICY_
274274
Staged rollout policy allows tenant administrators to enable features for specific Azure AD groups. It is recommended that tenant administrators use staged rollout to test user sign-in with an email address. When administrators are ready to deploy this feature to their entire tenant, they should use [HRD policy](#enable-user-sign-in-with-an-email-address).
275275

276276

277-
You need *global administrator* permissions to complete the following steps:
277+
You need *Global Administrator* permissions to complete the following steps:
278278

279279
1. Open a PowerShell session as an administrator, then install the *AzureADPreview* module using the [Install-Module][Install-Module] cmdlet:
280280

@@ -284,7 +284,7 @@ You need *global administrator* permissions to complete the following steps:
284284
285285
If prompted, select **Y** to install NuGet or to install from an untrusted repository.
286286
287-
1. Sign in to your Azure AD tenant as a *global administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
287+
1. Sign in to your Azure AD tenant as a *Global Administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
288288
289289
```powershell
290290
Connect-AzureAD
@@ -379,7 +379,7 @@ Within a tenant, a cloud-only user's UPN may take on the same value as another u
379379
380380
If prompted, select **Y** to install NuGet or to install from an untrusted repository.
381381
382-
1. Sign in to your Azure AD tenant as a *global administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
382+
1. Sign in to your Azure AD tenant as a *Global Administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
383383
384384
```powershell
385385
Connect-AzureAD

articles/active-directory/authentication/troubleshoot-sspr-writeback.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ If restarting the Azure AD Connect Sync service doesn't resolve your problem, tr
8181
To continue to troubleshoot issues, complete the following steps to disable and then re-enable the password writeback feature:
8282

8383
1. As an administrator on the server that runs Azure AD Connect, open the **Azure AD Connect Configuration wizard**.
84-
1. In **Connect to Azure AD**, enter your Azure AD global admin credentials.
84+
1. In **Connect to Azure AD**, enter your Azure AD Global Administrator credentials.
8585
1. In **Connect to AD DS**, enter your on-premises Active Directory Domain Services admin credentials.
8686
1. In **Uniquely identifying your users**, select the **Next** button.
8787
1. In **Optional features**, clear the **Password writeback** check box.
@@ -191,7 +191,7 @@ A best practice when you troubleshoot problems with password writeback is to ins
191191
| 31014| OffboardingEventFail| This event indicates that the offboarding process wasn't successful. This might be due to a permissions error on the cloud or on-premises administrator account specified during configuration. The error can also occur if you're attempting to use a federated cloud global administrator when disabling password writeback. To fix this problem, check your administrative permissions and ensure that you're not using a federated account while configuring the password writeback capability.|
192192
| 31015| WriteBackServiceStarted| This event indicates that the password writeback service has started successfully. It is ready to accept password management requests from the cloud.|
193193
| 31016| WriteBackServiceStopped| This event indicates that the password writeback service has stopped. Any password management requests from the cloud won't be successful.|
194-
| 31017| AuthTokenSuccess| This event indicates that we successfully retrieved an authorization token for the global admin specified during Azure AD Connect setup to start the offboarding or onboarding process.|
194+
| 31017| AuthTokenSuccess| This event indicates that we successfully retrieved an authorization token for the Global Administrator specified during Azure AD Connect setup to start the offboarding or onboarding process.|
195195
| 31018| KeyPairCreationSuccess| This event indicates that we successfully created the password encryption key. This key is used to encrypt passwords from the cloud to be sent to your on-premises environment.|
196196
| 31034| ServiceBusListenerError| This event indicates that there was an error connecting to your tenant's Service Bus listener. If the error message includes "The remote certificate is invalid", check to make sure that your Azure AD Connect server has all the required Root CAs as described in [Azure TLS certificate changes](../../security/fundamentals/tls-certificate-changes.md). |
197197
| 31044| PasswordResetService| This event indicates that password writeback is not working. The Service Bus listens for requests on two separate relays for redundancy. Each relay connection is managed by a unique Service Host. The writeback client returns an error if either Service Host is not running.|
@@ -203,7 +203,7 @@ A best practice when you troubleshoot problems with password writeback is to ins
203203
| 32005| ConfigurationError| During onboarding, we save tenant-specific information in a configuration file in your on-premises environment. This event indicates that there was an error saving this file or that when the service was started, there was an error reading the file. To fix this problem, try disabling and then re-enabling password writeback to force a rewrite of the configuration file.|
204204
| 32007| OnBoardingConfigUpdateError| During onboarding, we send data from the cloud to the on-premises password-reset service. That data is then written to an in-memory file before it is sent to the sync service to be stored securely on disk. This event indicates that there's a problem with writing or updating that data in memory. To fix this problem, try disabling and then re-enabling password writeback to force a rewrite of this configuration file.|
205205
| 32008| ValidationError| This event indicates we received an invalid response from the password-reset web service. To fix this problem, try disabling and then re-enabling password writeback.|
206-
| 32009| AuthTokenError| This event indicates that we couldn't get an authorization token for the global administrator account specified during Azure AD Connect setup. This error can be caused by a bad username or password specified for the global admin account. This error can also occur if the global admin account specified is federated. To fix this problem, rerun the configuration with the correct username and password and ensure that the administrator is a managed (cloud-only or password-synchronized) account.|
206+
| 32009| AuthTokenError| This event indicates that we couldn't get an authorization token for the global administrator account specified during Azure AD Connect setup. This error can be caused by a bad username or password specified for the Global Administrator account. This error can also occur if the Global Administrator account specified is federated. To fix this problem, rerun the configuration with the correct username and password and ensure that the administrator is a managed (cloud-only or password-synchronized) account.|
207207
| 32010| CryptoError| This event indicates there was an error generating the password encryption key or decrypting a password that arrives from the cloud service. This error likely indicates a problem with your environment. Look at the details of your event log to learn more about how to resolve this problem. You can also try disabling and then re-enabling the password writeback service.|
208208
| 32011| OnBoardingServiceError| This event indicates that the on-premises service couldn't properly communicate with the password-reset web service to initiate the onboarding process. This can happen as a result of a firewall rule or if there's a problem getting an authentication token for your tenant. To fix this problem, ensure that you're not blocking outbound connections over TCP 443 and TCP 9350-9354 or to https://ssprdedicatedsbprodncu.servicebus.windows.net. Also ensure that the Azure AD admin account you're using to onboard isn't federated.|
209209
| 32013| OffBoardingError| This event indicates that the on-premises service couldn't properly communicate with the password-reset web service to initiate the offboarding process. This can happen as a result of a firewall rule or if there's a problem getting an authorization token for your tenant. To fix this problem, ensure that you're not blocking outbound connections over 443 or to https://ssprdedicatedsbprodncu.servicebus.windows.net, and that the Azure Active Directory admin account you're using to offboard isn't federated.|

articles/active-directory/authentication/tutorial-enable-sspr.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: tutorial
8-
ms.date: 01/29/2023
8+
ms.date: 01/30/2023
99
ms.author: justinha
1010
author: justinha
1111
ms.reviewer: tilarso
@@ -143,6 +143,10 @@ If you no longer want to use the SSPR functionality you have set up as part of t
143143

144144
This section explains common questions from administrators and end-users who try SSPR:
145145

146+
- Why aren't on-premises password policies displayed during SSPR?
147+
148+
At this time, Azure AD Connect and cloud sync don't support sharing password policy details with the cloud. SSPR only displays the cloud password policy details, and can't show on-premises policies.
149+
146150
- Why do federated users wait up to 2 minutes after they see **Your password has been reset** before they can use passwords that are synchronized from on-premises?
147151

148152
For federated users whose passwords are synchronized, the source of authority for the passwords is on-premises. As a result, SSPR updates only the on-premises passwords. Password hash synchronization back to Azure AD is scheduled for every 2 minutes.

articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Integration with ITMS tools, such as ServiceNow, is in the future roadmap.
112112

113113
## How is Permissions Management being deployed?
114114

115-
Customers with Global Admin role have first to onboard Permissions Management on their Azure AD tenant, and then onboard their AWS accounts, GCP projects, and Azure subscriptions. More details about onboarding can be found in our product documentation.
115+
Customers with Global Administrator role have first to onboard Permissions Management on their Azure AD tenant, and then onboard their AWS accounts, GCP projects, and Azure subscriptions. More details about onboarding can be found in our product documentation.
116116

117117
## How long does it take to deploy Permissions Management?
118118

@@ -136,7 +136,7 @@ If a customer initiates a free Permissions Management 45-day trial, but does not
136136

137137
If a customer decides to discontinue licensing the service, we will also delete all previously collected data within 45 days of license termination.
138138

139-
We also have the ability to remove, export or modify specific data should the Global Admin using the Entra Permissions Management service file an official Data Subject Request. This can be initiated by opening a ticket in the Azure portal [New support request - Microsoft Entra admin center](https://entra.microsoft.com/#blade/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical), or alternately contacting your local Microsoft representative.
139+
We also have the ability to remove, export or modify specific data should the Global Administrator using the Entra Permissions Management service file an official Data Subject Request. This can be initiated by opening a ticket in the Azure portal [New support request - Microsoft Entra admin center](https://entra.microsoft.com/#blade/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical), or alternately contacting your local Microsoft representative.
140140

141141
## Do I require a license to use Entra Permissions Management?
142142

0 commit comments

Comments
 (0)