Skip to content

Commit e7613df

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 216b19b + e88188b commit e7613df

File tree

202 files changed

+5279
-883
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

202 files changed

+5279
-883
lines changed

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,18 +39,21 @@ The following administrator roles are available:
3939

4040
* **[Application Developer](#application-developer)**: Users in this role can create application registrations when the "Users can register applications" setting is set to No. This role also allows members to consent on their own behalf when the "Users can consent to apps accessing company data on their behalf" setting is set to No. Members of this role are added as owners when creating new application registrations or enterprise applications.
4141

42-
* **[Authentication Administrator](#authentication-administrator)**: Users with this role can set or reset non-password credentials. Authentication Administrators can force users to re-register against existing non-password credential (e.g. MFA, FIDO) and revoke remember MFA on the device’, prompting for MFA on the next login of other users who are non-administrators or members of the following roles only:
42+
* **[Authentication Administrator](#authentication-administrator)**: Users with this role can set or reset non-password credentials. Authentication Administrators can require users to re-register against existing non-password credential (for example, MFA or FIDO) and revoke **remember MFA on the device**, pwhich rompts for MFA on the next sign-in of users who are non-administrators or members of the following roles only:
4343
* Authentication Administrator
4444
* Directory Readers
4545
* Guest Inviter
4646
* Message Center Reader
4747
* Reports Reader
48-
48+
49+
The Authentication administrator role is currently in public preview. This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
50+
4951
<b>Important</b>: Users with this role can change credentials for people who may have access to sensitive or private information or critical configuration inside and outside of Azure Active Directory. Changing the credentials of a user may mean the ability to assume that user's identity and permissions. For example:
52+
5053
* Application Registration and Enterprise Application owners, who can manage credentials of apps they own. Those apps may have privileged permissions in Azure AD and elsewhere not granted to Authentication Administrators. Through this path a Authentication Administrator may be able to assume the identity of an application owner and then further assume the identity of a privileged application by updating the credentials for the application.
51-
* Azure subscription owners, who may have access to sensitive or private information or critical configuration in Azure.
52-
* Security Group and Office 365 Group owners, who can manage group membership. Those groups may grant access to sensitive or private information or critical configuration in Azure AD and elsewhere.
53-
* Administrators in other services outside of Azure AD like Exchange Online, Office Security and Compliance Center, and human resources systems.
54+
* Azure subscription owners, who may have access to sensitive or private information or critical configuration in Azure.
55+
* Security Group and Office 365 Group owners, who can manage group membership. Those groups may grant access to sensitive or private information or critical configuration in Azure AD and elsewhere.
56+
* Administrators in other services outside of Azure AD like Exchange Online, Office Security and Compliance Center, and human resources systems.
5457
* Non-administrators like executives, legal counsel, and human resources employees who may have access to sensitive or private information.
5558

5659
* **[Billing Administrator](#billing-administrator)**: Makes purchases, manages subscriptions, manages support tickets, and monitors service health.
@@ -294,7 +297,7 @@ Can create application registrations independent of the ‘Users can register ap
294297
| microsoft.aad.directory/servicePrincipals/createAsOwner | Create servicePrincipals in Azure Active Directory. Creator is added as the first owner, and the created object counts against the creator's 250 created objects quota. |
295298

296299
### Authentication Administrator
297-
Allowed to view, set and reset authentication method information for any non-admin user.
300+
Allowed to view, set, and reset authentication method information for any non-admin user.
298301

299302
| **Actions** | **Description** |
300303
| --- | --- |
13.6 KB
Loading

0 commit comments

Comments
 (0)