Skip to content

Commit d3bbd3a

Browse files
committed
Merge branch 'master' of https://github.com/microsoftdocs/azure-docs-pr into akv-reorg-working-branch
2 parents 7abf741 + bf797c1 commit d3bbd3a

File tree

1,018 files changed

+19682
-1006
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,018 files changed

+19682
-1006
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50406,6 +50406,11 @@
5040650406
"redirect_url": "/azure/cognitive-services/speech-service",
5040750407
"redirect_document_id": false
5040850408
},
50409+
{
50410+
"source_path": "articles/hdinsight/spark/azure-synapse-analytics-job-definition.md",
50411+
"redirect_url": "../../synapse-analytics/spark/apache-spark-job-definitions.md",
50412+
"redirect_document_id": true
50413+
},
5040950414
{
5041050415
"source_path": "articles/media-services/latest/access-api-portal.md",
5041150416
"redirect_url": "/azure/media-services/latest/access-api-howto",
@@ -51099,6 +51104,11 @@
5109951104
"source_path": "articles/security/fundamentals/database-security-overview.md",
5110051105
"redirect_url": "/azure/sql-database/sql-database-security-overview",
5110151106
"redirect_document_id": false
51107+
},
51108+
{
51109+
"source_path": "articles/azure-monitor/insights/key-vault-insights-overview.md",
51110+
"redirect_url": "/azure/azure-monitor/overview",
51111+
"redirect_document_id": false
5110251112
},
5110351113
{
5110451114
"source_path": "articles/security/fundamentals/database-best-practices.md",

.vscode/settings.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,4 @@
6262
"auditd"
6363
],
6464
"git.ignoreLimitWarning": true
65-
}
65+
}

articles/active-directory/b2b/invitation-email-elements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 02/06/2019
9+
ms.date: 04/15/2020
1010

1111
ms.author: mimart
1212
author: msmimart
301 Bytes
Loading
680 Bytes
Loading

articles/active-directory/hybrid/how-to-connect-pta-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ If you are migrating from AD FS (or other federation technologies) to Pass-throu
116116

117117
## Can I use Pass-through Authentication in a multi-forest Active Directory environment?
118118

119-
Yes. Multi-forest environments are supported if there are forest trusts between your Active Directory forests and if name suffix routing is correctly configured.
119+
Yes. Multi-forest environments are supported if there are forest trusts (two-way) between your Active Directory forests and if name suffix routing is correctly configured.
120120

121121
## Does Pass-through Authentication provide load balancing across multiple Authentication Agents?
122122

articles/active-directory/hybrid/tshoot-connect-objectsync.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -58,11 +58,6 @@ When UserPrincipalName (UPN)/Alternate Login ID suffix is not verified with the
5858

5959
![Azure AD replaces UPN](media/tshoot-connect-objectsync/objsynch2.png)
6060

61-
### Changing UPN Suffix from one federated domain to another federated domain
62-
Azure Active Directory does not allow the synchronization of UserPrincipalName (UPN)/Alternate Login ID suffix change from one federated domain to another federated domain. This applies to domains, that are verified with the Azure AD Tenant and have the Authentication Type as Federated.
63-
64-
![No UPN synch from one federated domain to another](media/tshoot-connect-objectsync/objsynch3.png)
65-
6661
### Azure AD Tenant DirSync Feature ‘SynchronizeUpnForManagedUsers’ is disabled
6762
When the Azure AD Tenant DirSync Feature ‘SynchronizeUpnForManagedUsers’ is disabled, Azure Active Directory does not allow synchronization updates to UserPrincipalName/Alternate Login ID for licensed user accounts with managed authentication.
6863

articles/active-directory/manage-apps/application-proxy-wildcard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ The wildcard application is represented with just one tile in the [MyApps panel]
113113

114114
### Kerberos constrained delegation
115115

116-
For applications using [kerberos constrained delegation (KCD) as the SSO method](application-proxy-configure-single-sign-on-with-kcd.md), the SPN listed for the SSO method may also need a wildcard. For example, the SPN could be: `HTTP/*.adventure-works.com`. You still need to have the individual SPNs configured on your backend servers (for example, `http://expenses.adventure-works.com and HTTP/travel.adventure-works.com`).
116+
For applications using [kerberos constrained delegation (KCD) as the SSO method](application-proxy-configure-single-sign-on-with-kcd.md), the SPN listed for the SSO method may also need a wildcard. For example, the SPN could be: `HTTP/*.adventure-works.com`. You still need to have the individual SPNs configured on your backend servers (for example, `HTTP/expenses.adventure-works.com and HTTP/travel.adventure-works.com`).
117117

118118
## Scenario 1: General wildcard application
119119

articles/active-directory/users-groups-roles/TOC.yml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,7 @@
149149
- name: Service plan IDs for licensing
150150
href: licensing-service-plan-reference.md
151151
- name: Azure AD administrator roles
152+
expanded: true
152153
items:
153154
- name: Roles and permissions
154155
href: directory-assign-admin-roles.md
@@ -180,6 +181,20 @@
180181
href: directory-admin-roles-secure.md
181182
- name: Create emergency accounts
182183
href: directory-emergency-access.md
184+
- name: Administrative units preview
185+
items:
186+
- name: Administrative units overview
187+
href: directory-administrative-units.md
188+
- name: Add & manage AUs
189+
href: roles-admin-units-manage.md
190+
- name: Add & manage users in AUs
191+
href: roles-admin-units-add-manage-users.md
192+
- name: Add & manage groups in AUs
193+
href: roles-admin-units-add-manage-groups.md
194+
- name: Assign a role with AU scope
195+
href: roles-admin-units-assign-roles.md
196+
- name: FAQ and troubleshooting
197+
href: roles-admin-units-faq-troubleshoot.md
183198
- name: Manage sign-in
184199
items:
185200
- name: Customize company branding
@@ -211,4 +226,4 @@
211226
- name: Azure AD PowerShell for Graph
212227
href: https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0
213228
- name: Azure AD service limits
214-
href: directory-service-limits-restrictions.md
229+
href: directory-service-limits-restrictions.md

articles/active-directory/users-groups-roles/directory-administrative-units.md

Lines changed: 72 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,32 +9,95 @@ ms.service: active-directory
99
ms.topic: article
1010
ms.subservice: users-groups-roles
1111
ms.workload: identity
12-
ms.date: 11/13/2019
12+
ms.date: 04/16/2020
1313
ms.author: curtand
1414
ms.reviewer: elkuzmen
1515
ms.custom: oldportal;it-pro;
1616
ms.collection: M365-identity-device-management
1717
---
1818
# Administrative units management in Azure Active Directory (preview)
1919

20-
This article describes administrative units in Azure Active Directory (Azure AD). An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. In this preview release, these resources can be only users. For example, an administrative unit-scoped User account admin can update profile information, reset passwords, and assign licenses for users only in their administrative unit.
20+
This article describes administrative units in Azure Active Directory (Azure AD). An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. In this preview release, an administrative unit can contain only users and groups.
2121

22-
You can use administrative units to delegate administrative permissions over subsets of users and applying policies to a subset of users. You can use administrative units to delegate permissions to regional administrators or to set policy at a granular level.
22+
Administrative units allow you to grant admin permissions that are restricted to a department, region, or other segment of your organization that you define. You can use administrative units to delegate permissions to regional administrators or to set policy at a granular level. For example, a User account admin could update profile information, reset passwords, and assign licenses for users only in their administrative unit.
23+
24+
For example, delegating to regional support specialists the [Helpdesk Administrator](directory-assign-admin-roles.md#helpdesk-administrator) role restricted to managing just the users in the region they support.
2325

2426
## Deployment scenario
2527

26-
Administrative units can be useful in organizations with independent divisions. Consider the example of a large university that is made up of many autonomous schools (School of Business, School of Engineering, and so on) that each has their own IT administrators who control access, manage users, and set policies for their school. A central administrator could create an administrative unit for the School of Business and populate it with only the business school students and staff. Then the central administrator can add the Business school IT staff to a scoped role that grants administrative permissions over only Azure AD users in the business school administrative unit.
28+
Restricting administrative scope using administrative units can be useful in organizations that are made up of independent divisions of any kind. Consider the example of a large university that is made up of many autonomous schools (School of Business, School of Engineering, and so on) that each has a team of IT admins who control access, manage users, and set policies for their school. A central administrator could:
29+
30+
- Create a role with administrative permissions over only Azure AD users in the business school administrative unit
31+
- Create an administrative unit for the School of Business
32+
- Populate the admin unit with only the business school students and staff
33+
- Add the Business school IT team to the role with their scope
2734

2835
## License requirements
2936

30-
To use administrative units requires an Azure Active Directory Premium license for each administrative unit admin. For more information, see [Getting started with Azure AD Premium](../fundamentals/active-directory-get-started-premium.md).
37+
Using administrative units requires an Azure Active Directory Premium license for each administrative unit admin, and Azure Active Directory Free licenses for administrative unit members. For more information, see [Getting started with Azure AD Premium](../fundamentals/active-directory-get-started-premium.md).
38+
39+
## Manage administrative units
40+
41+
In this preview release, you can manage administrative units using the Azure portal, PowerShell cmdlets and scripts, or the Microsoft Graph. You can refer to our documentation for details:
42+
43+
- [Create, remove, populate, and add roles to administrative units](roles-admin-units-manage.md): Complete how-to procedures
44+
- [Working with Admin Units](https://docs.microsoft.com/powershell/azure/active-directory/working-with-administrative-units?view=azureadps-2.0): How to work with administrative units using PowerShell
45+
- [Administrative Unit Graph support](https://docs.microsoft.com/graph/api/resources/administrativeunit?view=graph-rest-beta): Detailed documentation on Microsoft Graph for administrative units.
46+
47+
### Planning your administrative units
48+
49+
Administrative units can be used to logically group Azure AD resources. For example, for an organization whose IT department is scattered globally, it might make sense to create administrative units that define those geographical boundaries. In another scenario where a multi-national organization has different "sub-organizations", that are semi-autonomous in operations, each sub-organization may be represented by an administrative unit.
50+
51+
The criteria on which administrative units are created will be guided by the unique requirements of an organization. Administrative Units are a common way to define structure across M365 services. We recommend that you prepare your administrative units with their use across M365 services in mind. You can get maximum value out of administrative units when you can associate common resources across M365 under an administrative unit.
52+
53+
You can expect the creation of administrative units in the organization to go through the following stages:
54+
55+
1. Initial Adoption: Your organization will start creating administrative units based on initial criteria and the number of administrative units will increase as the criteria is refined.
56+
1. Pruning: Once the criteria is well defined, administrative units that are no longer required will be deleted.
57+
1. Stabilization: Your organizational structure is well defined and the number of administrative units is not going to change significantly over short durations.
58+
59+
## Currently supported scenarios
60+
61+
Global administrators or Privileged role administrators can use the Azure AD portal to create administrative units, add users as members of administrative units, and then assign IT staff to administrative unit-scoped administrator roles. The administrative unit-scoped admins can then use the Office 365 portal for basic management of users in their administrative units.
62+
63+
Additionally, groups can be added as members of administrative unit, and an admin unit-scoped group administrator can manage them using PowerShell, the Microsoft Graph, and the Azure AD portal.
64+
65+
The below table describes current support for administrative unit scenarios.
66+
67+
### Administrative unit management
68+
69+
Permissions | MS Graph/PowerShell | Azure AD portal | Microsoft 365 admin center
70+
----------- | ----------------------- | --------------- | -----------------
71+
Creating and deleting administrative units | Supported | Supported | Not supported
72+
Adding and removing administrative unit members individually | Supported | Supported | Not supported
73+
Bulk adding and removing administrative unit members using .csv file | Not supported | Supported | No plan to support
74+
Assigning administrative unit-scoped administrators | Supported | Supported | Not supported
75+
Adding and removing AU members dynamically based on attributes | Not supported | Not supported | Not supported
76+
77+
### User management
78+
79+
Permissions | MS Graph/PowerShell | Azure AD portal | Microsoft 365 admin center
80+
----------- | ----------------------- | --------------- | -----------------
81+
administrative unit-scoped management of user properties, passwords, licenses | Supported | Supported | Supported
82+
administrative unit-scoped blocking and unblocking of user sign-ins | Supported | Supported | Supported
83+
administrative unit-scoped management of user MFA credentials | Supported | Supported | Not supported
84+
85+
### Group management
3186

32-
## Managing administrative units
87+
Permissions | MS Graph/PowerShell | Azure AD portal | Microsoft 365 admin center
88+
----------- | ----------------------- | --------------- | -----------------
89+
administrative unit-scoped management of group properties and members | Supported | Supported | Not supported
90+
administrative unit-scoped management of group licensing | Supported | Supported | Not supported
3391

34-
In this preview release, the only way you can create and manage administrative units is to use the Azure Active Directory Module for Windows PowerShell cmdlets as described in [Working with Administrative Units](https://docs.microsoft.com/powershell/azure/active-directory/working-with-administrative-units?view=azureadps-2.0)
92+
> [!NOTE]
93+
>
94+
> Administrators with an administrative unit scope can't manage dynamic group membership rules.
3595
36-
For more information on software requirements and installing the Azure AD module, and for reference information on the Azure AD Module cmdlets for managing administrative units, including syntax, parameter descriptions, and examples, see [Azure Active Directory PowerShell](https://docs.microsoft.com/powershell/azure/active-directory/overview?view=azureadps-2.0).
96+
Administrative units apply scope only to management permissions. They don't prevent members or administrators from using their [default user permissions](../fundamentals/users-default-permissions.md) to browse other users, groups, or resources outside of the administrative unit. In the Office 365 portal, users outside of a scoped admin's administrative units are filtered out, but you can browse other users in the Azure AD portal, PowerShell, and other Microsoft services.
3797

3898
## Next steps
3999

40-
[Azure Active Directory editions](../fundamentals/active-directory-whatis.md)
100+
- [Managing AUs](roles-admin-units-manage.md)
101+
- [Manage users in AUs](roles-admin-units-add-manage-users.md)
102+
- [Manage groups in AUs](roles-admin-units-add-manage-groups.md)
103+
- [Assign scoped roles to an AU](roles-admin-units-assign-roles.md)

0 commit comments

Comments
 (0)