You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-pta-faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,7 +116,7 @@ If you are migrating from AD FS (or other federation technologies) to Pass-throu
116
116
117
117
## Can I use Pass-through Authentication in a multi-forest Active Directory environment?
118
118
119
-
Yes. Multi-forest environments are supported if there are forest trusts between your Active Directory forests and if name suffix routing is correctly configured.
119
+
Yes. Multi-forest environments are supported if there are forest trusts (two-way) between your Active Directory forests and if name suffix routing is correctly configured.
120
120
121
121
## Does Pass-through Authentication provide load balancing across multiple Authentication Agents?
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/tshoot-connect-objectsync.md
-5Lines changed: 0 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,11 +58,6 @@ When UserPrincipalName (UPN)/Alternate Login ID suffix is not verified with the
58
58
59
59

60
60
61
-
### Changing UPN Suffix from one federated domain to another federated domain
62
-
Azure Active Directory does not allow the synchronization of UserPrincipalName (UPN)/Alternate Login ID suffix change from one federated domain to another federated domain. This applies to domains, that are verified with the Azure AD Tenant and have the Authentication Type as Federated.
63
-
64
-

65
-
66
61
### Azure AD Tenant DirSync Feature ‘SynchronizeUpnForManagedUsers’ is disabled
67
62
When the Azure AD Tenant DirSync Feature ‘SynchronizeUpnForManagedUsers’ is disabled, Azure Active Directory does not allow synchronization updates to UserPrincipalName/Alternate Login ID for licensed user accounts with managed authentication.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-wildcard.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ The wildcard application is represented with just one tile in the [MyApps panel]
113
113
114
114
### Kerberos constrained delegation
115
115
116
-
For applications using [kerberos constrained delegation (KCD) as the SSO method](application-proxy-configure-single-sign-on-with-kcd.md), the SPN listed for the SSO method may also need a wildcard. For example, the SPN could be: `HTTP/*.adventure-works.com`. You still need to have the individual SPNs configured on your backend servers (for example, `http://expenses.adventure-works.com and HTTP/travel.adventure-works.com`).
116
+
For applications using [kerberos constrained delegation (KCD) as the SSO method](application-proxy-configure-single-sign-on-with-kcd.md), the SPN listed for the SSO method may also need a wildcard. For example, the SPN could be: `HTTP/*.adventure-works.com`. You still need to have the individual SPNs configured on your backend servers (for example, `HTTP/expenses.adventure-works.com and HTTP/travel.adventure-works.com`).
Copy file name to clipboardExpand all lines: articles/active-directory/users-groups-roles/directory-administrative-units.md
+72-9Lines changed: 72 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,32 +9,95 @@ ms.service: active-directory
9
9
ms.topic: article
10
10
ms.subservice: users-groups-roles
11
11
ms.workload: identity
12
-
ms.date: 11/13/2019
12
+
ms.date: 04/16/2020
13
13
ms.author: curtand
14
14
ms.reviewer: elkuzmen
15
15
ms.custom: oldportal;it-pro;
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
# Administrative units management in Azure Active Directory (preview)
19
19
20
-
This article describes administrative units in Azure Active Directory (Azure AD). An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. In this preview release, these resources can be only users. For example, an administrative unit-scoped User account admin can update profile information, reset passwords, and assign licenses for users only in their administrative unit.
20
+
This article describes administrative units in Azure Active Directory (Azure AD). An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. In this preview release, an administrative unitcan contain only users and groups.
21
21
22
-
You can use administrative units to delegate administrative permissions over subsets of users and applying policies to a subset of users. You can use administrative units to delegate permissions to regional administrators or to set policy at a granular level.
22
+
Administrative units allow you to grant admin permissions that are restricted to a department, region, or other segment of your organization that you define. You can use administrative units to delegate permissions to regional administrators or to set policy at a granular level. For example, a User account admin could update profile information, reset passwords, and assign licenses for users only in their administrative unit.
23
+
24
+
For example, delegating to regional support specialists the [Helpdesk Administrator](directory-assign-admin-roles.md#helpdesk-administrator) role restricted to managing just the users in the region they support.
23
25
24
26
## Deployment scenario
25
27
26
-
Administrative units can be useful in organizations with independent divisions. Consider the example of a large university that is made up of many autonomous schools (School of Business, School of Engineering, and so on) that each has their own IT administrators who control access, manage users, and set policies for their school. A central administrator could create an administrative unit for the School of Business and populate it with only the business school students and staff. Then the central administrator can add the Business school IT staff to a scoped role that grants administrative permissions over only Azure AD users in the business school administrative unit.
28
+
Restricting administrative scope using administrative units can be useful in organizations that are made up of independent divisions of any kind. Consider the example of a large university that is made up of many autonomous schools (School of Business, School of Engineering, and so on) that each has a team of IT admins who control access, manage users, and set policies for their school. A central administrator could:
29
+
30
+
- Create a role with administrative permissions over only Azure AD users in the business school administrative unit
31
+
- Create an administrative unit for the School of Business
32
+
- Populate the admin unit with only the business school students and staff
33
+
- Add the Business school IT team to the role with their scope
27
34
28
35
## License requirements
29
36
30
-
To use administrative units requires an Azure Active Directory Premium license for each administrative unit admin. For more information, see [Getting started with Azure AD Premium](../fundamentals/active-directory-get-started-premium.md).
37
+
Using administrative units requires an Azure Active Directory Premium license for each administrative unit admin, and Azure Active Directory Free licenses for administrative unit members. For more information, see [Getting started with Azure AD Premium](../fundamentals/active-directory-get-started-premium.md).
38
+
39
+
## Manage administrative units
40
+
41
+
In this preview release, you can manage administrative units using the Azure portal, PowerShell cmdlets and scripts, or the Microsoft Graph. You can refer to our documentation for details:
42
+
43
+
-[Create, remove, populate, and add roles to administrative units](roles-admin-units-manage.md): Complete how-to procedures
44
+
-[Working with Admin Units](https://docs.microsoft.com/powershell/azure/active-directory/working-with-administrative-units?view=azureadps-2.0): How to work with administrative units using PowerShell
45
+
-[Administrative Unit Graph support](https://docs.microsoft.com/graph/api/resources/administrativeunit?view=graph-rest-beta): Detailed documentation on Microsoft Graph for administrative units.
46
+
47
+
### Planning your administrative units
48
+
49
+
Administrative units can be used to logically group Azure AD resources. For example, for an organization whose IT department is scattered globally, it might make sense to create administrative units that define those geographical boundaries. In another scenario where a multi-national organization has different "sub-organizations", that are semi-autonomous in operations, each sub-organization may be represented by an administrative unit.
50
+
51
+
The criteria on which administrative units are created will be guided by the unique requirements of an organization. Administrative Units are a common way to define structure across M365 services. We recommend that you prepare your administrative units with their use across M365 services in mind. You can get maximum value out of administrative units when you can associate common resources across M365 under an administrative unit.
52
+
53
+
You can expect the creation of administrative units in the organization to go through the following stages:
54
+
55
+
1. Initial Adoption: Your organization will start creating administrative units based on initial criteria and the number of administrative units will increase as the criteria is refined.
56
+
1. Pruning: Once the criteria is well defined, administrative units that are no longer required will be deleted.
57
+
1. Stabilization: Your organizational structure is well defined and the number of administrative units is not going to change significantly over short durations.
58
+
59
+
## Currently supported scenarios
60
+
61
+
Global administrators or Privileged role administrators can use the Azure AD portal to create administrative units, add users as members of administrative units, and then assign IT staff to administrative unit-scoped administrator roles. The administrative unit-scoped admins can then use the Office 365 portal for basic management of users in their administrative units.
62
+
63
+
Additionally, groups can be added as members of administrative unit, and an admin unit-scoped group administrator can manage them using PowerShell, the Microsoft Graph, and the Azure AD portal.
64
+
65
+
The below table describes current support for administrative unit scenarios.
66
+
67
+
### Administrative unit management
68
+
69
+
Permissions | MS Graph/PowerShell | Azure AD portal | Microsoft 365 admin center
administrative unit-scoped management of group properties and members | Supported | Supported | Not supported
90
+
administrative unit-scoped management of group licensing | Supported | Supported | Not supported
33
91
34
-
In this preview release, the only way you can create and manage administrative units is to use the Azure Active Directory Module for Windows PowerShell cmdlets as described in [Working with Administrative Units](https://docs.microsoft.com/powershell/azure/active-directory/working-with-administrative-units?view=azureadps-2.0)
92
+
> [!NOTE]
93
+
>
94
+
> Administrators with an administrative unit scope can't manage dynamic group membership rules.
35
95
36
-
For more information on software requirements and installing the Azure AD module, and for reference information on the Azure AD Module cmdlets for managing administrative units, including syntax, parameter descriptions, and examples, see [Azure Active Directory PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview?view=azureadps-2.0).
96
+
Administrative units apply scope only to management permissions. They don't prevent members or administrators from using their [default user permissions](../fundamentals/users-default-permissions.md) to browse other users, groups, or resources outside of the administrative unit. In the Office 365 portal, users outside of a scoped admin's administrative units are filtered out, but you can browse other users in the Azure AD portal, PowerShell, and other Microsoft services.
37
97
38
98
## Next steps
39
99
40
-
[Azure Active Directory editions](../fundamentals/active-directory-whatis.md)
100
+
-[Managing AUs](roles-admin-units-manage.md)
101
+
-[Manage users in AUs](roles-admin-units-add-manage-users.md)
102
+
-[Manage groups in AUs](roles-admin-units-add-manage-groups.md)
103
+
-[Assign scoped roles to an AU](roles-admin-units-assign-roles.md)
0 commit comments