Skip to content

Commit c9e79d2

Browse files
authored
Merge pull request #167049 from MicrosoftDocs/master
7/27 AM Publish
2 parents bb1c13b + c852857 commit c9e79d2

File tree

62 files changed

+344
-68
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+344
-68
lines changed

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,8 +65,8 @@ The following table outlines when an authentication method can be used during a
6565
| Windows Hello for Business | Yes | MFA |
6666
| Microsoft Authenticator app | Yes | MFA and SSPR |
6767
| FIDO2 security key | Yes | MFA |
68-
| OATH hardware tokens (preview) | No | MFA |
69-
| OATH software tokens | No | MFA |
68+
| OATH hardware tokens (preview) | No | MFA and SSPR |
69+
| OATH software tokens | No | MFA and SSPR |
7070
| SMS | Yes | MFA and SSPR |
7171
| Voice call | No | MFA and SSPR |
7272
| Password | Yes | |

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Some OATH TOTP hardware tokens are programmable, meaning they don't come with a
3030

3131
## OATH hardware tokens (Preview)
3232

33-
Azure AD supports the use of OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds. Customers can purchase these tokens from the vendor of their choice. For a list of security token providers that are compatible with passwordless authentication, see [FIDO2 security key providers](concept-authentication-passwordless.md#fido2-security-key-providers).
33+
Azure AD supports the use of OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds. Customers can purchase these tokens from the vendor of their choice.
3434

3535
OATH TOTP hardware tokens typically come with a secret key, or seed, pre-programmed in the token. These keys must be input into Azure AD as described in the following steps. Secret keys are limited to 128 characters, which may not be compatible with all tokens. The secret key can only contain the characters *a-z* or *A-Z* and digits *2-7*, and must be encoded in *Base32*.
3636

@@ -61,3 +61,4 @@ Users may have a combination of up to five OATH hardware tokens or authenticator
6161
## Next steps
6262

6363
Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
64+
Learn about [FIDO2 security key providers](concept-authentication-passwordless.md#fido2-security-key-providers) that are compatible with passwordless authentication.

articles/active-directory/governance/entitlement-management-access-package-incompatible.md

Lines changed: 34 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,23 @@ ms.collection: M365-identity-device-management
2222
---
2323
# Configure separation of duties checks for an access package in Azure AD entitlement management (Preview)
2424

25-
In each of an access package's policies, you can specify who is able to request that access package, such as all member users in your organization, or only users who are already a member of a particular group. However, you may wish to further restrict access, in order to avoid a user from obtaining excessive access.
25+
In Azure AD entitlement management, you can configure multiple policies, with different settings for each user community that will need access through an access package. For example, employees might only need manager approval to get access to certain apps, but guests coming in from other organizations may require both a sponsor and a resource team departmental manager to approve. In a policy for users already in the directory, you can specify a particular group of users for who can request access. However, you may have a requirement to avoid a user obtaining excessive access. To meet this requirement, you will want to further restrict who can request access, based on the access the requestor already has.
2626

27-
With the separation of duties settings on an access package, you can configure that a user cannot request an access package, if they already have an assignment to another access package, or are a member of a group.
27+
With the separation of duties settings on an access package, you can configure that a user who is a member of a group or who already has an assignment to one access package cannot request an additional access package.
2828

29-
For example, you have an access package, *Marketing Campaign*, that people across your organization and other organizations can request access to, to work with your organization's marketing department on that marketing campaign. Since employees in the marketing department should already have access to that marketing campaign material, you wouldn't want employees in the marketing department to request access to that access package. Or, you may already have a dynamic group, *Marketing department employees*, with all of the marketing employees in it. You could indicate that the access package is incompatible with the membership of that dynamic group. Then, if a marketing department employee is looking for an access package to request, they couldn't request access to the *Marketing campaign* access package.
29+
![myaccess experience for attempting to request incompatible access](./media/entitlement-management-access-package-incompatible/request-prevented.png)
30+
31+
32+
## Scenarios for separation of duties checks
33+
34+
For example, you have an access package, *Marketing Campaign*, that people across your organization and other organizations can request access to, to work with your organization's marketing department while that campaign is going on. Since employees in the marketing department should already have access to that marketing campaign material, you don't want employees in the marketing department to request access to that access package. Or, you may already have a dynamic group, *Marketing department employees*, with all of the marketing employees in it. You could indicate that the access package is incompatible with the membership of that dynamic group. Then, if a marketing department employee is looking for an access package to request, they couldn't request access to the *Marketing campaign* access package.
3035

3136
Similarly, you may have an application with two roles - **Western Sales** and **Eastern Sales** - and want to ensure that a user can only have one sales territory at a time. If you have two access packages, one access package **Western Territory** giving the **Western Sales** role and the other access package **Eastern Territory** giving the **Eastern Sales** role, then you can configure
3237
- the **Western Territory** access package has the **Eastern Territory** package as incompatible, and
3338
- the **Eastern Territory** access package has the **Western Territory** package as incompatible.
3439

40+
If you’ve been using Microsoft Identity Manager or other on-premises identity management systems for automating access for on-premises apps, then you can integrate these systems with Azure AD entitlement management as well. If you will be controlling access to Azure AD-integrated apps through entitlement management, and want to prevent users from having incompatible access, you can configure that an access package is incompatible with a group. That could be a group, which your on-premises identity management system sends into Azure AD through Azure AD Connect. This check ensures a user will be unable to request an access package, if that access package would give access that's incompatible with access the user has in on-premises apps.
41+
3542
## Prerequisites
3643

3744
To use Azure AD entitlement management and assign users to access packages, you must have one of the following licenses:
@@ -55,8 +62,17 @@ Follow these steps to change the list of incompatible groups or other access pac
5562

5663
1. If you wish to prevent users who have another access package assignment already from requesting this access package, click on **Add access package** and select the access package that the user would already be assigned.
5764

65+
66+
![configuration of incompatible access packages](./media/entitlement-management-access-package-incompatible/select-incompatible-ap.png)
67+
68+
5869
1. If you wish to prevent users who have an existing group membership from requesting this access package, then click on **Add group** and select the group that the user would already be in.
5970

71+
### Configure incompatible access packages programmatically
72+
73+
You can also configure the groups and other access packages that are incompatible with access package using Microsoft Graph. A user in an appropriate role with an application that has the delegated `EntitlementManagement.ReadWrite.All` permission, or an application with that application permission, can call the API to add, remove, and list the incompatible groups and access packages [of an access package](/graph/api/resources/accesspackage?view=graph-rest-beta&preserve-view=true).
74+
75+
6076
## View other access packages that are configured as incompatible with this one
6177

6278
**Prerequisite role**: Global administrator, Identity Governance administrator, User administrator, Catalog owner or Access package manager
@@ -73,6 +89,21 @@ Follow these steps to view the list of other access packages that have indicated
7389

7490
1. Click on **Incompatible With**.
7591

92+
## Monitor and report on access assignments
93+
94+
You can use Azure Monitor workbooks to get insights on how users have been receiving their access.
95+
96+
1. Configure Azure AD to [send audit events to Azure Monitor](entitlement-management-logs-and-reporting.md).
97+
98+
1. The workbook named *Access Package Activity* displays each event related to a particular access package.
99+
100+
![View access package events](./media/entitlement-management-logs-and-reporting/view-events-access-package.png)
101+
102+
1. To see if there have been changes to application role assignments for an application that were not created due to access package assignments, then you can select the workbook named *Application role assignment activity*. If you select to omit entitlement activity, then only changes to application roles that were not made by entitlement management are shown. For example, you would see a row if a global administrator had directly assigned a user to an application role.
103+
104+
![View app role assignments](./media/entitlement-management-access-package-incompatible/workbook-ara.png)
105+
106+
76107
## Next steps
77108

78109
- [View, add, and remove assignments for an access package](entitlement-management-access-package-assignments.md)

articles/active-directory/governance/entitlement-management-access-package-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ For more information, see [Compare groups](/office365/admin/create-groups/compar
107107

108108
## Add an application resource role
109109

110-
You can have Azure AD automatically assign users access to an Azure AD enterprise application, including both SaaS applications and your organization's applications federated to Azure AD, when a user is assigned an access package. For applications that integrate with Azure AD through federated single sign-on, Azure AD will issue federation tokens for users assigned to the application.
110+
You can have Azure AD automatically assign users access to an Azure AD enterprise application, including both SaaS applications and your organization's applications integrated with Azure AD, when a user is assigned an access package. For applications that integrate with Azure AD through federated single sign-on, Azure AD will issue federation tokens for users assigned to the application.
111111

112112
Applications can have multiple roles. When adding an application to an access package, if that application has more than one role, you will need to specify the appropriate role for those users. If you are developing applications, you can read more about how those roles are added to your applications in [How to: Configure the role claim issued in the SAML token for enterprise applications](../develop/active-directory-enterprise-app-role-management.md).
113113

articles/active-directory/governance/entitlement-management-catalog-create.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,11 @@ $catalog = New-MgEntitlementManagementAccessPackageCatalog -DisplayName "Marketi
6969

7070
## Add resources to a catalog
7171

72-
To include resources in an access package, the resources must exist in a catalog. The types of resources you can add are groups, applications, and SharePoint Online sites. The groups can be cloud-created Microsoft 365 Groups or cloud-created Azure AD security groups. The applications can be Azure AD enterprise applications, including both SaaS applications and your own applications federated to Azure AD. The sites can be SharePoint Online sites or SharePoint Online site collections.
72+
To include resources in an access package, the resources must exist in a catalog. The types of resources you can add are groups, applications, and SharePoint Online sites.
73+
74+
* The groups can be cloud-created Microsoft 365 Groups or cloud-created Azure AD security groups. Groups that originate in an on-premises Active Directory cannot be assigned as resources because their owner or member attributes cannot be changed in Azure AD. Groups that originate in Exchange Online as Distribution groups cannot be modified in Azure AD either.
75+
* The applications can be Azure AD enterprise applications, including both SaaS applications and your own applications integrated with Azure AD. For more information on selecting appropriate resources for applications with multiple roles, see [add resource roles](entitlement-management-access-package-resources.md#add-resource-roles).
76+
* The sites can be SharePoint Online sites or SharePoint Online site collections.
7377

7478
**Prerequisite role:** See [Required roles to add resources to a catalog](entitlement-management-delegate.md#required-roles-to-add-resources-to-a-catalog)
7579

articles/active-directory/governance/entitlement-management-logs-and-reporting.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -75,14 +75,15 @@ Use the following procedure to view events:
7575

7676
1. Select the workbook named *Access Package Activity*.
7777

78-
1. In that workbook, select a time range (change to **All** if not sure), and select an access package Id from the drop-down list of all access packages that had activity during that time range. The events related to the access package that occurred during the selected time range will be displayed.
78+
1. In that workbook, select a time range (change to **All** if not sure), and select an access package ID from the drop-down list of all access packages that had activity during that time range. The events related to the access package that occurred during the selected time range will be displayed.
7979

8080
![View access package events](./media/entitlement-management-logs-and-reporting/view-events-access-package.png)
8181

82-
Each row includes the time, access package Id, the name of the operation, the object Id, UPN, and the display name of the user who started the operation. Additional details are included in JSON.
82+
Each row includes the time, access package ID, the name of the operation, the object ID, UPN, and the display name of the user who started the operation. Additional details are included in JSON.
8383

84-
1. If you would like to see if there have been changes to application role assignments for an application that were not due to access package assignments, such as by a global administrator directly assigning a user to an application roles, then you can select the workbook named *Application role assignment activity*.
84+
1. If you would like to see if there have been changes to application role assignments for an application that were not due to access package assignments, such as by a global administrator directly assigning a user to an application role, then you can select the workbook named *Application role assignment activity*.
8585

86+
![View app role assignments](./media/entitlement-management-access-package-incompatible/workbook-ara.png)
8687

8788
## Create custom Azure Monitor queries using the Azure portal
8889
You can create your own queries on Azure AD audit events, including entitlement management events.
@@ -162,7 +163,7 @@ $subs | ft
162163

163164
You can reauthenticate and associate your PowerShell session to that subscription using a command such as `Connect-AzAccount –Subscription $subs[0].id`. To learn more about how to authenticate to Azure from PowerShell, including non-interactively, see [Sign in with Azure PowerShell](/powershell/azure/authenticate-azureps).
164165

165-
If you have multiple Log Analytics workspaces in that subscription, then the cmdlet [Get-AzOperationalInsightsWorkspace](/powershell/module/Az.OperationalInsights/Get-AzOperationalInsightsWorkspace) returns the list of workspaces. Then you can find the one that has the Azure AD logs. The `CustomerId` field returned by this cmdlet is the same as the value of the "Workspace Id" displayed in the Azure portal in the Log Analytics workspace overview.
166+
If you have multiple Log Analytics workspaces in that subscription, then the cmdlet [Get-AzOperationalInsightsWorkspace](/powershell/module/Az.OperationalInsights/Get-AzOperationalInsightsWorkspace) returns the list of workspaces. Then you can find the one that has the Azure AD logs. The `CustomerId` field returned by this cmdlet is the same as the value of the "Workspace ID" displayed in the Azure portal in the Log Analytics workspace overview.
166167

167168
```powershell
168169
$wks = Get-AzOperationalInsightsWorkspace
Loading
Loading
44.8 KB
Loading

articles/azure-monitor/app/status-monitor-v2-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ It replaces Status Monitor.
1818
Telemetry is sent to the Azure portal, where you can [monitor](./app-insights-overview.md) your app.
1919

2020
> [!NOTE]
21-
> The module only currently supports codeless instrumentation of .NET web apps hosted with IIS. Use an SDK to instrument ASP.NET Core, Java, and Node.js applications.
21+
> The module currently supports codeless instrumentation of .NET and .NET Core web apps hosted with IIS. Use an SDK to instrument Java and Node.js applications.
2222
2323
## PowerShell Gallery
2424

@@ -57,7 +57,7 @@ Each of these options is described in the [detailed instructions](status-monitor
5757

5858
- Does Status Monitor v2 support ASP.NET Core applications?
5959

60-
*No*. For instructions to enable monitoring of ASP.NET Core applications, see [Application Insights for ASP.NET Core applications](./asp-net-core.md). There's no need to install StatusMonitor for an ASP.NET Core application. This is true even if ASP.NET Core application is hosted in IIS.
60+
*Yes*. Starting from [Application Insights Agent 2.0.0-beta1](https://www.powershellgallery.com/packages/Az.ApplicationMonitor/2.0.0-beta1), ASP.NET Core applications hosted in IIS are supported.
6161

6262
- How do I verify that the enablement succeeded?
6363

@@ -82,4 +82,4 @@ Add more telemetry:
8282
8383
* [Create web tests](monitor-web-app-availability.md) to make sure your site stays live.
8484
* [Add web client telemetry](./javascript.md) to see exceptions from web page code and to enable trace calls.
85-
* [Add the Application Insights SDK to your code](./asp-net.md) so you can insert trace and log calls.
85+
* [Add the Application Insights SDK to your code](./asp-net.md) so you can insert trace and log calls.

0 commit comments

Comments
 (0)