Skip to content

Commit f613792

Browse files
Merge pull request #235386 from MicrosoftGuyJFlo/LAPSPreviewFixes
[Azure AD] Devices - LAPS Build Fixes
2 parents 318127d + 672646e commit f613792

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/active-directory/devices/howto-manage-local-admin-passwords.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 04/20/2023
9+
ms.date: 04/21/2023
1010

1111
ms.author: sandeo
1212
author: sandeo-MSFT
1313
ms.reviewer: joflore
14+
ms.custom: references_regions
1415

1516
ms.collection: M365-identity-device-management
1617
---
@@ -72,7 +73,7 @@ LAPS is supported on Azure AD joined or hybrid Azure AD joined devices only. Azu
7273

7374
LAPS is available to all customers with Azure AD Free or higher licenses. Other related features like administrative units, custom roles, Conditional Access, and Intune have other licensing requirements.
7475

75-
## Required roles or permission
76+
### Required roles or permission
7677

7778
Other than the built-in Azure AD roles of Cloud Device Administrator, Intune Administrator, and Global Administrator that are granted *device.LocalCredentials.Read.All*, you can use [Azure AD custom roles](/azure/active-directory/roles/custom-create) or administrative units to authorize local administrator password recovery. For example,
7879

@@ -117,7 +118,7 @@ Conditional Access policies can be scoped to the built-in roles like Cloud Devic
117118
> [!NOTE]
118119
> Other role types including administrative unit-scoped roles and custom roles aren't supported
119120
120-
## Frequently Asked Questions
121+
## Frequently asked questions
121122

122123
### Is Windows LAPS with Azure AD management configuration supported using Group Policy Objects (GPO)?
123124

0 commit comments

Comments
 (0)