Skip to content

Commit ee5b53f

Browse files
committed
Bringing even with master.
2 parents c7b7b69 + e9f0901 commit ee5b53f

File tree

142 files changed

+2303
-796
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

142 files changed

+2303
-796
lines changed

articles/active-directory/b2b/google-federation.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.component: B2B
99
ms.topic: conceptual
10-
ms.date: 08/20/2018
10+
ms.date: 11/07/2018
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -42,15 +42,21 @@ First, create a new project in the Google Developers Console to obtain a client
4242

4343
![Google API credentials](media/google-federation/google-api.png)
4444

45-
4. Choose the **Oauth consent screen** tab and enter a **Product name shown to users**. (Leave the other settings.) Select **Save**.
45+
4. Choose the **OAuth consent screen** tab and enter an **Application name**. (Leave the other settings.)
4646

4747
![Google OAuth consent screen](media/google-federation/google-oauth-consent-screen.png)
4848

49-
5. Choose the **Credentials** tab. In the **Create credentials** menu, choose **OAuth client ID**.
49+
5. Scroll to the **Authorized domains** section and enter microsoftonline.com.
50+
51+
![Authorized domains section](media/google-federation/google-oauth-authorized-domains.png)
52+
53+
6. Select **Save**.
54+
55+
7. Choose the **Credentials** tab. In the **Create credentials** menu, choose **OAuth client ID**.
5056

5157
![Google API credentials](media/google-federation/google-api-credentials.png)
5258

53-
6. Under **Application type**, choose **Web application**, and then under **Authorized redirect URIs**, enter the following URIs:
59+
8. Under **Application type**, choose **Web application**, and then under **Authorized redirect URIs**, enter the following URIs:
5460
- `https://login.microsoftonline.com`
5561
- `https://login.microsoftonline.com/te/<directory id>/oauth2/authresp` <br>(where `<directory id>` is your directory ID)
5662

@@ -59,7 +65,7 @@ First, create a new project in the Google Developers Console to obtain a client
5965
6066
![Create OAuth client ID](media/google-federation/google-create-oauth-client-id.png)
6167

62-
7. Select **Create**. Copy the client ID and client secret, which you'll use when you add the identity provider in the Azure AD portal.
68+
9. Select **Create**. Copy the client ID and client secret, which you'll use when you add the identity provider in the Azure AD portal.
6369

6470
![OAuth client ID and client secret](media/google-federation/google-auth-client-id-secret.png)
6571

16.7 KB
Loading
-13.3 KB
Loading
-272 Bytes
Loading
17.3 KB
Loading
-5.35 KB
Loading

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ To enable / disable a device, you have two options:
150150
**Remarks:**
151151

152152
- You need to be a global administrator in Azure AD to enable / disable a device.
153-
- Disabling a device prevents a device from accessing your Azure AD resources.
153+
- Disabling a device prevents a device from successfully authenticating with Azure AD, therby preventing the device from accessing your Azure AD resources that are guarded by device CA or using your WH4B credentials.
154154

155155

156156

articles/active-directory/devices/faq.md

Lines changed: 55 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -18,29 +18,10 @@ ms.author: markvi
1818
ms.reviewer: jairoc
1919

2020
---
21-
# Azure Active Directory device management FAQ
22-
23-
**Q: Can I register Android or iOS BYOD devices?**
24-
25-
**A:** Yes, but only with Azure device registration service and for hybrid customers. It is not supported with on-premises device registration service in AD FS.
26-
27-
**Q: How can I register a macOS device?**
28-
29-
**A:** To register macOS device:
30-
31-
1. [Create a compliance policy](https://docs.microsoft.com/intune/compliance-policy-create-mac-os)
32-
2. [Define a conditional access policy for macOS devices](../active-directory-conditional-access-azure-portal.md)
3321

34-
**Remarks:**
35-
36-
- The users that are included in your conditional access policy need a [supported version of Office for macOS](../conditional-access/technical-reference.md#client-apps-condition) to access resources.
37-
38-
- During the first access attempt, your users are prompted to enroll the device using the company portal.
39-
40-
---
41-
42-
**Q: I registered the device recently. Why can’t I see the device under my user info in the Azure portal?**
22+
# Azure Active Directory device management FAQ
4323

24+
**Q: I registered the device recently. Why can’t I see the device under my user info in the Azure portal? Or Why is device owner marked as N/A for hybrid Azure AD joined devices?**
4425
**A:** Windows 10 devices that are hybrid Azure AD joined do not show up under the USER devices.
4526
You need to use All devices view in Azure portal. You can also use PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice?view=azureadps-1.0) cmdlet.
4627

@@ -54,15 +35,20 @@ Only the following devices are listed under the USER devices:
5435

5536
**Q: How do I know what the device registration state of the client is?**
5637

57-
**A:** You can use the Azure portal, go to All devices and search for the device using device ID. Check the value under the join type column.
58-
59-
If you want to check the local device registration state from a registered device:
38+
**A:** You can use the Azure portal, go to All devices and search for the device using device ID. Check the value under the join type column. Sometimes, the device could have been reset or re-imaged. So, it is essential to also check device registration state on the device too:
6039

6140
- For Windows 10 and Windows Server 2016 or later devices, run dsregcmd.exe /status.
6241
- For down-level OS versions, run "%programFiles%\Microsoft Workplace Join\autoworkplace.exe"
6342

6443
---
6544

45+
**Q: I see the device record under the USER info in the Azure portal and can see the state as registered on the device. Am I setup correctly for using conditional access?**
46+
47+
**A:** The device join state, reflected by deviceID, must match with that on Azure AD and meet any evaluation criteria for conditional access.
48+
For more information, see [Require managed devices for cloud app access with conditional access](../conditional-access/require-managed-devices.md).
49+
50+
---
51+
6652
**Q: I have deleted in the Azure portal or using Windows PowerShell, but the local state on the device says that it is still registered?**
6753

6854
**A:** This is by design. The device will not have access to resources in the cloud.
@@ -83,25 +69,6 @@ For down-level Windows OS versions that are on-premises AD domain-joined:
8369
2. Type `"%programFiles%\Microsoft Workplace Join\autoworkplace.exe /l"`.
8470
3. Type `"%programFiles%\Microsoft Workplace Join\autoworkplace.exe /j"`.
8571

86-
---
87-
**Q: How do I unjoin an Azure AD Joined device locally on the device?**
88-
89-
**A:**
90-
- For hybrid Azure AD Joined devices, make sure to turn off auto registration so that the scheduled task does not register the device again. Next, open command prompt as an administrator and type `dsregcmd.exe /debug /leave`. Alternatively, this command can be run as a script across multiple devices to unjoin in bulk.
91-
92-
- For pure Azure AD Joined devices, make sure you have an offline local administrator account or create one, as you won't be able to sign in with any Azure AD user credentials. Next, go to **Settings** > **Accounts** > **Access Work or School**. Select your account and click on **Disconnect**. Follow the prompts and provide the local administrator credentials when prompted. Reboot the device to complete the unjoin process.
93-
94-
---
95-
96-
**Q: My users cannot search printers from Azure AD Joined devices. How can I enable printing from Azure AD Joined devices ?**
97-
98-
**A:** For deploying printers for Azure AD Joined devices, see [Hybrid cloud print](https://docs.microsoft.com/windows-server/administration/hybrid-cloud-print/hybrid-cloud-print-deploy). You will need an on-premises Windows Server to deploy hybrid cloud print. Currently, cloud-based print service is not available.
99-
100-
---
101-
102-
**Q: How do I connect to a remote Azure AD joined device?**
103-
**A:** Refer to the article https://docs.microsoft.com/windows/client-management/connect-to-remote-aadj-pc for details.
104-
10572
---
10673

10774
**Q: Why do I see duplicate device entries in Azure portal?**
@@ -124,7 +91,27 @@ For down-level Windows OS versions that are on-premises AD domain-joined:
12491

12592
>[!Note]
12693
>For enrolled devices, we recommend wiping the device to ensure that users cannot access the resources. For more information, see [Enroll devices for management in Intune](https://docs.microsoft.com/intune/deploy-use/enroll-devices-in-microsoft-intune).
94+
---
95+
96+
# Azure AD Join FAQ
97+
98+
**Q: How do I unjoin an Azure AD Joined device locally on the device?**
99+
100+
**A:**
101+
- For hybrid Azure AD Joined devices, make sure to turn off auto registration so that the scheduled task does not register the device again. Next, open command prompt as an administrator and type `dsregcmd.exe /debug /leave`. Alternatively, this command can be run as a script across multiple devices to unjoin in bulk.
102+
103+
- For pure Azure AD Joined devices, make sure you have an offline local administrator account or create one, as you won't be able to sign in with any Azure AD user credentials. Next, go to **Settings** > **Accounts** > **Access Work or School**. Select your account and click on **Disconnect**. Follow the prompts and provide the local administrator credentials when prompted. Reboot the device to complete the unjoin process.
104+
105+
---
106+
107+
**Q: My users cannot search printers from Azure AD Joined devices. How can I enable printing from Azure AD Joined devices ?**
108+
109+
**A:** For deploying printers for Azure AD Joined devices, see [Hybrid cloud print](https://docs.microsoft.com/windows-server/administration/hybrid-cloud-print/hybrid-cloud-print-deploy). You will need an on-premises Windows Server to deploy hybrid cloud print. Currently, cloud-based print service is not available.
127110

111+
---
112+
113+
**Q: How do I connect to a remote Azure AD joined device?**
114+
**A:** Refer to the article https://docs.microsoft.com/windows/client-management/connect-to-remote-aadj-pc for details.
128115

129116
---
130117

@@ -141,13 +128,6 @@ Please evaluate the conditional access policy rules and ensure that the device i
141128

142129
---
143130

144-
**Q: I see the device record under the USER info in the Azure portal and can see the state as registered on the device. Am I setup correctly for using conditional access?**
145-
146-
**A:** The device join state, reflected by deviceID, must match with that on Azure AD and meet any evaluation criteria for conditional access.
147-
For more information, see [Require managed devices for cloud app access with conditional access](../conditional-access/require-managed-devices.md).
148-
149-
---
150-
151131
**Q: Why do I get a "username or password is incorrect" message for a device I have just joined to Azure AD?**
152132

153133
**A:** Common reasons for this scenario are:
@@ -156,7 +136,7 @@ For more information, see [Require managed devices for cloud app access with con
156136

157137
- Your computer is unable to communicate with Azure Active Directory. Check for any network connectivity issues.
158138

159-
- Federated logins requires your federation server to support a WS-Trust active endpoint.
139+
- Federated logins requires your federation server to support WS-Trust endpoints enabled and accessible.
160140

161141
- You have enabled Pass through Authentication and the user has a temporary password that needs to be changed on logon.
162142

@@ -168,15 +148,16 @@ For more information, see [Require managed devices for cloud app access with con
168148

169149
---
170150

171-
**Q: Why did my attempt to join a PC fail although I didn't get any error information?**
151+
**Q: Why did my attempt to Azure AD join a PC fail although I didn't get any error information?**
172152

173153
**A:** A likely cause is that the user is logged in to the device using the local built-in administrator account.
174154
Please create a different local account before using Azure Active Directory Join to complete the setup.
175155

176-
177156
---
178157

179-
**Q: Where can I find troubleshooting information about the automatic device registration?**
158+
# Hybrid Azure AD Join FAQ
159+
160+
**Q: Where can I find troubleshooting information for diagnosing hybrid Azure AD join failures?**
180161

181162
**A:** For troubleshooting information, see:
182163

@@ -187,3 +168,23 @@ Please create a different local account before using Azure Active Directory Join
187168

188169
---
189170

171+
# Azure AD Register FAQ
172+
173+
**Q: Can I register Android or iOS BYOD devices?**
174+
175+
**A:** Yes, but only with Azure device registration service and for hybrid customers. It is not supported with on-premises device registration service in AD FS.
176+
177+
**Q: How can I register a macOS device?**
178+
179+
**A:** To register macOS device:
180+
181+
1. [Create a compliance policy](https://docs.microsoft.com/intune/compliance-policy-create-mac-os)
182+
2. [Define a conditional access policy for macOS devices](../active-directory-conditional-access-azure-portal.md)
183+
184+
**Remarks:**
185+
186+
- The users that are included in your conditional access policy need a [supported version of Office for macOS](../conditional-access/technical-reference.md#client-apps-condition) to access resources.
187+
188+
- During the first access attempt, your users are prompted to enroll the device using the company portal.
189+
190+
---

articles/active-directory/users-groups-roles/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,8 @@
128128
href: directory-assign-admin-roles.md
129129
- name: View and assign roles
130130
href: directory-manage-roles-portal.md
131+
- name: Least-privileged roles by task
132+
href: roles-delegate-by-task.md
131133
- name: Administrator role security
132134
items:
133135
- name: Role security planning

0 commit comments

Comments
 (0)