Skip to content

Commit f0fc1e0

Browse files
Merge pull request #210256 from eringreenlee/master
fixing clickthrough rate on 4 articles
2 parents 7fc3f44 + 39228bc commit f0fc1e0

File tree

4 files changed

+20
-13
lines changed

4 files changed

+20
-13
lines changed

articles/active-directory/manage-apps/assign-user-or-group-access-portal.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 10/23/2021
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.custom: contperf-fy22q2, contperf-fy22q3
1414

@@ -17,7 +17,7 @@ ms.custom: contperf-fy22q2, contperf-fy22q3
1717

1818
# Assign users and groups to an application
1919

20-
This article shows you how to assign users and groups to an enterprise application in Azure Active Directory (Azure AD) using PowerShell. When you assign a user to an application, the application appears in the user's [My Apps](https://myapps.microsoft.com/) portal for easy access. If the application exposes roles, you can also assign a specific role to the user.
20+
This article shows you how to assign users and groups to an enterprise application in Azure Active Directory (Azure AD) using PowerShell. When you assign a user to an application, the application appears in the user's [My Apps](https://myapps.microsoft.com/) portal for easy access. If the application exposes app roles, you can also assign a specific app role to the user.
2121

2222
When you assign a group to an application, only users in the group will have access. The assignment does not cascade to nested groups.
2323

@@ -33,7 +33,6 @@ To assign users to an app using PowerShell, you need:
3333
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3434
- If you have not yet installed the AzureAD module (use the command `Install-Module -Name AzureAD`). If you're prompted to install a NuGet module or the new Azure Active Directory V2 PowerShell module, type Y and press ENTER.
3535
- Azure Active Directory Premium P1 or P2 for group-based assignment. For more licensing requirements for the features discussed in this article, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory).
36-
- Optional: Completion of [Configure an app](add-application-portal-configure.md).
3736

3837
## Assign users, and groups, to an app using PowerShell
3938

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/10/2022
11+
ms.date: 09/02/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414
ms.custom: contperf-fy22q2
@@ -34,7 +34,7 @@ To configure the admin consent workflow, you need:
3434

3535
To enable the admin consent workflow and choose reviewers:
3636

37-
1. Sign in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites.
37+
1. Sign-in to the [Azure portal](https://portal.azure.com) with one of the roles listed in the prerequisites.
3838
1. Search for and select **Azure Active Directory**.
3939
1. Select **Enterprise applications**.
4040
1. Under **Manage**, select **User settings**.
@@ -58,3 +58,5 @@ To configure the admin consent workflow programmatically, use the [Update adminC
5858
## Next steps
5959

6060
[Grant tenant-wide admin consent to an application](grant-admin-consent.md)
61+
62+
[Reivew admin consent requests](review-admin-consent-requests.md)

articles/active-directory/manage-apps/disable-user-sign-in-portal.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,19 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 09/23/2021
11+
ms.date: 09/06/2022
1212
ms.author: ergreenl
1313
ms.custom: it-pro
1414
ms.collection: M365-identity-device-management
1515
#customer intent: As an admin, I want to disable the way a user signs in for an application so that no user can sign in to it in Azure Active Directory.
1616
---
17-
# Disable how a user signs in for an application
17+
# Disable user sign-in for an application
18+
19+
There may be situations while configuring or managing an application where you don't want tokens to be issued for an application. Or, you may want to preemptively block an application that you do not want your employees to try to access. To accomplish this, you can disable user sign-in for the application, which will prevent all tokens from being issued for that application.
20+
21+
In this article, you will learn how to disable how a user signs in to an application in Azure Active Directory through both the Azure portal and PowerShell. If you are looking for how to block specific users from accessing an application, use [user or group assignment](./assign-user-or-group-access-portal.md).
22+
1823

19-
In this article, you disable how a user signs in to an application in Azure Active Directory.
2024

2125
## Prerequisites
2226

@@ -39,7 +43,7 @@ To disable how a user signs in, you need:
3943

4044
Ensure you have installed the AzureAD module (use the command Install-Module -Name AzureAD). In case you are prompted to install a NuGet module or the new Azure Active Directory V2 PowerShell module, type Y and press ENTER.
4145

42-
If you know the AppId of an app that doesn't appear on the Enterprise apps list (for example, because you deleted the app or the service principal hasn't yet been created due to the app being pre-authorized by Microsoft), you can manually create the service principal for the app and then disable it by using [AzureAD PowerShell cmdlet](/powershell/module/azuread/New-AzureADServicePrincipal).
46+
If you know the AppId of an app that doesn't appear on the Enterprise apps list (for example, because you deleted the app or the service principal hasn't yet been created due to the app being pre-authorized by Microsoft), you can manually create the service principal for the app and then disable it by using the cmdlet below.
4347

4448
```PowerShell
4549
# The AppId of the app to be disabled

articles/active-directory/manage-apps/grant-admin-consent.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 10/23/2021
11+
ms.date: 09/02/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414
ms.custom: contperf-fy22q2
@@ -18,13 +18,15 @@ ms.custom: contperf-fy22q2
1818

1919
# Grant tenant-wide admin consent to an application
2020

21-
In this article, you'll learn how to grant tenant-wide admin consent to an application in Azure Active Directory (Azure AD).
21+
In this article, you'll learn how to grant tenant-wide admin consent to an application in Azure Active Directory (Azure AD). To understand how individual users consent, see [Configure how end-users consent to applications](configure-user-consent.md).
2222

23-
When you grant tenant-wide admin consent to an application, all users can sign in to the app. To restrict which users can sign in to an application, configure the app to require user assignment and then assign users or groups to the application.
23+
When you grant tenant-wide admin consent to an application, you give the application access on behalf of the whole organization to the permissions requested. Granting admin consent on behalf of an organization is a sensitive operation, potentially allowing the application's publisher access to significant portions of your organization's data, or the permission to do highly privileged operations. Examples of such operations might be role management, full access to all mailboxes or all sites, and full user impersonation.
24+
25+
By default, granting tenant-wide admin consent to an application will allow all users to access the application unless otherwise restricted. To restrict which users can sign-in to an application, configure the app to [require user assignment](application-properties.md#assignment-required) and then [assign users or groups to the application](assign-user-or-group-access-portal.md).
2426

2527
Tenant-wide admin consent to an app grants the app and the app's publisher access to your organization's data. Carefully review the permissions that the application is requesting before you grant consent. For more information on consenting to applications, see [Azure Active Directory consent framework](../develop/consent-framework.md).
2628

27-
Granting tenant-wide admin consent may revoke any permissions which had previously been granted tenant-wide. Permissions which have previously been granted by users on their own behalf will not be affected.
29+
Granting tenant-wide admin consent may revoke any permissions which had previously been granted tenant-wide for that application. Permissions which have previously been granted by users on their own behalf will not be affected.
2830

2931
## Prerequisites
3032

0 commit comments

Comments
 (0)