Skip to content

Commit d7ac608

Browse files
committed
making minor freshness edits
1 parent 509d63f commit d7ac608

6 files changed

+45
-52
lines changed

articles/active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md

Lines changed: 18 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: how-to
12-
ms.date: 08/17/2022
12+
ms.date: 01/23/2023
1313
ms.author: barclayn
1414
ms.reviewer: jeffsta
1515
ms.custom: "it-pro, seodec18, contperf-fy20q4"
@@ -18,46 +18,40 @@ ms.collection: M365-identity-device-management
1818

1919
# Associate or add an Azure subscription to your Azure Active Directory tenant
2020

21-
An Azure subscription has a trust relationship with Azure Active Directory (Azure AD). A subscription trusts Azure AD to authenticate users, services, and devices.
22-
23-
Multiple subscriptions can trust the same Azure AD directory. Each subscription can only trust a single directory.
24-
25-
One or more Azure subscriptions can establish a trust relationship with an instance of Azure Active Directory (Azure AD) in order to authenticate and authorize security principals and devices against Azure services. When a subscription expires, the trusted instance of the Azure AD service remains, but the security principals lose access to Azure resources.
21+
All Azure subscriptions have a trust relationship with an Azure Active Directory (Azure AD) instance. Subscriptions rely on their trusted Azure AD to authenticate and authorize security principals and devices. When a subscription expires, the trusted instance of the Azure AD service remains, but the security principals lose access to Azure resources. Subscriptions can only trust a single directory while one Azure AD may be trusted by multiple subscriptions.
2622

2723
When a user signs up for a Microsoft cloud service, a new Azure AD tenant is created and the user is made a member of the Global Administrator role. However, when an owner of a subscription joins their subscription to an existing tenant, the owner isn't assigned to the Global Administrator role.
2824

29-
All of your users have a single *home* directory for authentication. Your users can also be guests in other directories. You can see both the home and guest directories for each user in Azure AD.
25+
While users may only have a single authentication *home* directory, users may participate as guests in multiple directories. You can see both the home and guest directories for each user in Azure AD.
3026

3127
:::image type="content" source="media/active-directory-how-subscriptions-associated-directory/trust-relationship-azure-ad.png" alt-text="Screenshot that shows the trust relationship between Azure subscriptions and Azure active directories.":::
3228

3329
> [!Important]
34-
> When you associate a subscription with a different directory, users that have roles assigned using [Azure role-based access control](../../role-based-access-control/role-assignments-portal.md) lose their access. Classic subscription administrators, including Service Administrator and Co-Administrators, also lose access.
30+
> When a subscription is associated with a different directory, users who have roles assigned using [Azure role-based access control](../../role-based-access-control/role-assignments-portal.md) lose their access. Classic subscription administrators, including Service Administrator and Co-Administrators, also lose access.
3531
>
3632
> Moving your Azure Kubernetes Service (AKS) cluster to a different subscription, or moving the cluster-owning subscription to a new tenant, causes the cluster to lose functionality due to lost role assignments and service principal's rights. For more information about AKS, see [Azure Kubernetes Service (AKS)](../../aks/index.yml).
3733
3834
## Before you begin
3935

40-
Before you can associate or add your subscription, do the following tasks:
41-
42-
- Review the following list of changes that will occur after you associate or add your subscription, and how you might be affected:
36+
Before you can associate or add your subscription, do the following steps:
4337

44-
- Users that have been assigned roles using Azure RBAC will lose their access.
45-
- Service Administrator and Co-Administrators will lose access.
46-
- If you have any key vaults, they'll be inaccessible, and you'll have to fix them after association.
47-
- If you have any managed identities for resources such as Virtual Machines or Logic Apps, you must re-enable or recreate them after the association.
48-
- If you have a registered Azure Stack, you'll have to re-register it after association.
49-
- For more information, see [Transfer an Azure subscription to a different Azure AD directory](../../role-based-access-control/transfer-subscription.md).
38+
- Review the following list of changes that will occur after you associate or add your subscription, and how you might be affected:
39+
- Users that have been assigned roles using Azure RBAC will lose their access.
40+
- Service Administrator and Co-Administrators will lose access.
41+
- If you have any key vaults, they'll be inaccessible, and you'll have to fix them after association.
42+
- If you have any managed identities for resources such as Virtual Machines or Logic Apps, you must re-enable or recreate them after the association.
43+
- If you have a registered Azure Stack, you'll have to re-register it after association.
44+
45+
For more information, see [Transfer an Azure subscription to a different Azure AD directory](../../role-based-access-control/transfer-subscription.md).
5046

5147
- Sign in using an account that:
52-
53-
- Has an [Owner](../../role-based-access-control/built-in-roles.md#owner) role assignment for the subscription. For information about how to assign the Owner role, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
54-
- Exists in both the current directory and in the new directory. The current directory is associated with the subscription. You'll associate the new directory with the subscription. For more information about getting access to another directory, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../external-identities/add-users-administrator.md).
55-
56-
- Make sure that you're not using an Azure Cloud Service Providers (CSP) subscription (MS-AZR-0145P, MS-AZR-0146P, MS-AZR-159P), a Microsoft Internal subscription (MS-AZR-0015P), or a Microsoft Azure for Students Starter subscription (MS-AZR-0144P).
48+
- Has an [Owner](../../role-based-access-control/built-in-roles.md#owner) role assignment for the subscription. For information about how to assign the Owner role, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
49+
- Exists in both the current directory and in the new directory. The current directory is associated with the subscription. You'll associate the new directory with the subscription. For more information about getting access to another directory, see [Add Azure Active Directory B2B collaboration users in the Azure portal](../external-identities/add-users-administrator.md).
50+
- Make sure that you're not using an Azure Cloud Service Providers (CSP) subscription (MS-AZR-0145P, MS-AZR-0146P, MS-AZR-159P), a Microsoft Internal subscription (MS-AZR-0015P), or a Microsoft Azure for Students Starter subscription (MS-AZR-0144P).
5751

5852
## Associate a subscription to a directory<a name="to-associate-an-existing-subscription-to-your-azure-ad-directory"></a>
5953

60-
To associate an existing subscription to your Azure AD directory, follow these steps:
54+
To associate an existing subscription with your Azure AD, follow these steps:
6155

6256
1. Sign in and select the subscription you want to use from the [Subscriptions page in Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_Billing/SubscriptionsBlade).
6357

@@ -81,7 +75,7 @@ Changing the subscription directory is a service-level operation, so it doesn't
8175

8276
## Post-association steps
8377

84-
After you associate a subscription to a different directory, you might need to do the following tasks to resume operations:
78+
After you associate a subscription with a different directory, you might need to do the following tasks to resume operations:
8579

8680
- If you have any key vaults, you must change the key vault tenant ID. For more information, see [Change a key vault tenant ID after a subscription move](../../key-vault/general/move-subscription.md).
8781

articles/active-directory/fundamentals/active-directory-how-to-find-tenant.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: how-to
12-
ms.date: 08/17/2022
12+
ms.date: 01/23/2023
1313
ms.author: barclayn
1414
ms.reviewer: jeffsta
1515
ms.custom: "it-pro, devx-track-azurepowershell"
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818

1919
# How to find your Azure Active Directory tenant ID
2020

21-
Azure subscriptions have a trust relationship with Azure Active Directory (Azure AD). Azure AD is trusted to authenticate users, services, and devices for the subscription. Each subscription has a tenant ID associated with it, and there are a few ways you can find the tenant ID for your subscription.
21+
Azure subscriptions have a trust relationship with Azure Active Directory (Azure AD). Azure AD is trusted to authenticate the subscription's users, services, and devices. Each subscription has a tenant ID associated with it, and there are a few ways you can find the tenant ID for your subscription.
2222

2323
## Find tenant ID through the Azure portal
2424

@@ -28,7 +28,7 @@ Azure subscriptions have a trust relationship with Azure Active Directory (Azure
2828

2929
1. Select **Properties**.
3030

31-
1. Scroll down to the **Tenant ID** field. Your tenant ID will be in the box.
31+
1. Scroll down to the **Tenant ID** section and you can find your tenant ID in the box.
3232

3333
:::image type="content" source="media/active-directory-how-to-find-tenant/portal-tenant-id.png" alt-text="Azure Active Directory - Properties - Tenant ID - Tenant ID field":::
3434

@@ -41,13 +41,14 @@ Connect-AzAccount
4141
Get-AzTenant
4242
```
4343

44-
For more information, see this Azure PowerShell cmdlet reference for [Get-AzTenant](/powershell/module/az.accounts/get-aztenant).
44+
For more information, see the [Get-AzTenant](/powershell/module/az.accounts/get-aztenant) cmdlet reference.
4545

4646

4747
## Find tenant ID with CLI
48+
4849
The [Azure CLI](/cli/azure/install-azure-cli) or [Microsoft 365 CLI](https://pnp.github.io/cli-microsoft365/) can be used to find the tenant ID.
4950

50-
For Azure CLI, use one of the commands **az login**, **az account list**, or **az account tenant list** as shown in the following example. Notice the **tenantId** property for each of your subscriptions in the output from each command.
51+
For Azure CLI, use one of the commands **az login**, **az account list**, or **az account tenant list**. All of command's included below return the **tenantId** property for each of your subscriptions.
5152

5253
```azurecli-interactive
5354
az login

articles/active-directory/fundamentals/active-directory-users-reset-password-azure-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.subservice: fundamentals
1212
ms.workload: identity
1313
ms.topic: how-to
14-
ms.date: 08/17/2022
14+
ms.date: 01/23/2023
1515
ms.author: barclayn
1616
ms.reviewer: jeffsta
1717
ms.custom: "it-pro, seodec18"
@@ -20,15 +20,15 @@ ms.collection: M365-identity-device-management
2020
---
2121
# Reset a user's password using Azure Active Directory
2222

23-
As an administrator, you can reset a user's password if the password is forgotten, if the user gets locked out of a device, or if the user never received a password.
23+
Azure Active Directory (Azure AD) administrators can reset a user's password if the password is forgotten, if the user gets locked out of a device, or if the user never received a password.
2424

2525
>[!Note]
2626
>Unless your Azure AD tenant is the home directory for a user, you won't be able reset their password. This means that if your user is signing in to your organization using an account from another organization, a Microsoft account, or a Google account, you won't be able to reset their password.
2727
>
2828
>If your user has a source of authority as Windows Server Active Directory, you'll only be able to reset the password if you've turned on password writeback and the user domain is managed. Changing the user password from Azure Active Directory for federated domains is not supported. In this case, you should change the user password in the on-premises Active Directory.<br><br>If your user has a source of authority as External Azure AD, you won't be able to reset the password. Only the user, or an administrator in External Azure AD, can reset the password.
2929
3030
>[!Note]
31-
>If you're not an administrator and are instead looking for instructions about how to reset your own work or school password, see [Reset your work or school password](https://support.microsoft.com/account-billing/reset-your-work-or-school-password-using-security-info-23dde81f-08bb-4776-ba72-e6b72b9dda9e).
31+
>If you're not an administrator and you need instructions on how to reset your own work or school password, see [Reset your work or school password](https://support.microsoft.com/account-billing/reset-your-work-or-school-password-using-security-info-23dde81f-08bb-4776-ba72-e6b72b9dda9e).
3232
3333
## To reset a password
3434

@@ -51,7 +51,7 @@ As an administrator, you can reset a user's password if the password is forgotte
5151
>The temporary password never expires. The next time the user signs in, the password will still work, regardless how much time has passed since the temporary password was generated.
5252
5353
> [!IMPORTANT]
54-
> If an administrator is unable to reset the user's password, and in the Application Event Logs on the Azure AD Connect server the following error code hr=80231367 is seen, review the user's attributes in Active Directory. If the attribute **AdminCount** is set to 1, this will prevent an administrator from resetting the user's password. The attribute **AdminCount** must be set to 0, in order for an administrators to reset the user's password.
54+
> If an administrator is unable to reset the user's password, and the Application Event Logs on the Azure AD Connect server has error code hr=80231367, review the user's attributes in Active Directory. If the attribute **AdminCount** is set to 1, this will prevent an administrator from resetting the user's password. The attribute **AdminCount** must be set to 0, in order for an administrators to reset the user's password.
5555
5656

5757
## Next steps

0 commit comments

Comments
 (0)