Skip to content

Commit f67111d

Browse files
authored
Merge pull request #250649 from barclayn/enterprise-users-first-steps
part 1, editing the first two steps in enterprise user articles
2 parents 10284d7 + 9984eb9 commit f67111d

30 files changed

+210
-184
lines changed

articles/active-directory/enterprise-users/directory-delete-howto.md

Lines changed: 24 additions & 24 deletions
Large diffs are not rendered by default.

articles/active-directory/enterprise-users/domains-admin-takeover.md

Lines changed: 19 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 08/31/2023
12+
ms.date: 09/08/2023
1313
ms.author: barclayn
1414
ms.reviewer: sumitp
1515
ms.custom: it-pro, seo-update-azuread-jan, has-azure-ad-ps-ref
@@ -18,21 +18,22 @@ ms.collection: M365-identity-device-management
1818
---
1919
# Take over an unmanaged directory as administrator in Azure Active Directory
2020

21-
This article describes two ways to take over a DNS domain name in an unmanaged directory in Azure Active Directory (Azure AD), part of Microsoft Entra. When a self-service user signs up for a cloud service that uses Azure AD, they're added to an unmanaged Azure AD directory based on their email domain. For more about self-service or "viral" sign-up for a service, see [What is self-service sign-up for Azure Active Directory?](directory-self-service-signup.md)
21+
This article describes two ways to take over a DNS domain name in an unmanaged directory in Microsoft Entra ID formerly known as Azure AD. When a self-service user signs up for a cloud service that uses Microsoft Entra ID, they're added to an unmanaged Entra ID directory based on their email domain. For more about self-service or "viral" sign-up for a service, see [What is self-service sign-up for Microsoft Entra ID?](directory-self-service-signup.md)
2222

2323

2424
> [!VIDEO https://www.youtube.com/embed/GOSpjHtrRsg]
2525
2626
## Decide how you want to take over an unmanaged directory
27-
During the process of admin takeover, you can prove ownership as described in [Add a custom domain name to Azure AD](../fundamentals/add-custom-domain.md). The next sections explain the admin experience in more detail, but here's a summary:
27+
28+
During the process of admin takeover, you can prove ownership as described in [Add a custom domain name to Microsoft Entra ID](../fundamentals/add-custom-domain.md). The next sections explain the admin experience in more detail, but here's a summary:
2829

2930
* When you perform an ["internal" admin takeover](#internal-admin-takeover) of an unmanaged Azure directory, you're added as the global administrator of the unmanaged directory. No users, domains, or service plans are migrated to any other directory you administer.
3031

3132
* When you perform an ["external" admin takeover](#external-admin-takeover) of an unmanaged Azure directory, you add the DNS domain name of the unmanaged directory to your managed Azure directory. When you add the domain name, a mapping of users to resources is created in your managed Azure directory so that users can continue to access services without interruption.
3233

3334
## Internal admin takeover
3435

35-
Some products that include SharePoint and OneDrive, such as Microsoft 365, don't support external takeover. If that is your scenario, or if you're an admin and want to take over an unmanaged or "shadow" Azure AD organization create by users who used self-service sign-up, you can do this with an internal admin takeover.
36+
Some products that include SharePoint and OneDrive, such as Microsoft 365, don't support external takeover. If that is your scenario, or if you're an admin and want to take over an unmanaged or "shadow" Microsoft Entra ID organization created by users who used self-service sign-up, you can do this with an internal admin takeover.
3637

3738
1. Create a user context in the unmanaged organization through signing up for Power BI. For convenience of example, these steps assume that path.
3839

@@ -48,11 +49,11 @@ Some products that include SharePoint and OneDrive, such as Microsoft 365, don't
4849

4950
![Add a txt record for the domain name](./media/domains-admin-takeover/become-admin-txt-record.png)
5051

51-
When the DNS TXT records are verified at your domain name registrar, you can manage the Azure AD organization.
52+
When the DNS TXT records are verified at your domain name registrar, you can manage the Entra ID organization.
5253

5354
When you complete the preceding steps, you're now the global administrator of the Fourth Coffee organization in Microsoft 365. To integrate the domain name with your other Azure services, you can remove it from Microsoft 365 and add it to a different managed organization in Azure.
5455

55-
### Adding the domain name to a managed organization in Azure AD
56+
### Adding the domain name to a managed organization in Entra ID
5657

5758
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
5859

@@ -65,26 +66,28 @@ When you complete the preceding steps, you're now the global administrator of th
6566

6667
5. If you have any users or groups in Microsoft 365 that reference the removed domain name, they must be renamed to the .onmicrosoft.com domain. If you force delete the domain name, all users are automatically renamed, in this example to *user\@fourthcoffeexyz.onmicrosoft.com*.
6768

68-
6. Sign in to the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview) with an account that is the Global Administrator for the Azure AD organization.
69-
70-
7. Select **Custom domain names**, then add the domain name. You'll have to enter the DNS TXT records to verify ownership of the domain name.
69+
6. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
70+
7. In the search box at the top of the page, search for **Domain Names**.
71+
72+
8. Select **+ Add custom domain names**, then add the domain name. You'll have to enter the DNS TXT records to verify ownership of the domain name.
7173

72-
![domain verified as added to Azure AD](./media/domains-admin-takeover/add-domain.png)
74+
![domain verified as added to Entra ID](./media/domains-admin-takeover/add-domain.png)
7375

7476
> [!NOTE]
7577
> Any users of Power BI or Azure Rights Management service who have licenses assigned in the Microsoft 365 organization must save their dashboards if the domain name is removed. They must sign in with a user name like *user\@fourthcoffeexyz.onmicrosoft.com* rather than *user\@fourthcoffee.xyz*.
7678
7779
## External admin takeover
7880

79-
If you already manage an organization with Azure services or Microsoft 365, you can't add a custom domain name if it's already verified in another Azure AD organization. However, from your managed organization in Azure AD you can take over an unmanaged organization as an external admin takeover. The general procedure follows the article [Add a custom domain to Azure AD](../fundamentals/add-custom-domain.md).
81+
If you already manage an organization with Azure services or Microsoft 365, you can't add a custom domain name if it's already verified in another Entra ID organization. However, from your managed organization in Entra ID you can take over an unmanaged organization as an external admin takeover. The general procedure follows the article [Add a custom domain to Entra ID](../fundamentals/add-custom-domain.md).
8082

81-
When you verify ownership of the domain name, Azure AD removes the domain name from the unmanaged organization and moves it to your existing organization. External admin takeover of an unmanaged directory requires the same DNS TXT validation process as internal admin takeover. The difference is that the following are also moved over with the domain name:
83+
When you verify ownership of the domain name, Entra ID removes the domain name from the unmanaged organization and moves it to your existing organization. External admin takeover of an unmanaged directory requires the same DNS TXT validation process as internal admin takeover. The difference is that the following are also moved over with the domain name:
8284

8385
- Users
8486
- Subscriptions
8587
- License assignments
8688

8789
### Support for external admin takeover
90+
8891
External admin takeover is supported by the following online services:
8992

9093
- Azure Rights Management
@@ -103,17 +106,16 @@ External admin takeover isn't supported for any service that has service plans t
103106
> [!NOTE]
104107
> External admin takeover is not supported cross cloud boundaries (ex. Azure Commercial to Azure Government). In these scenarios it is recommended to perform External admin takeover into another Azure Commercial tenant, and then delete the domain from this tenant so you may verify successfully into the destination Azure Government tenant.
105108
106-
You can optionally use the [**ForceTakeover** option](#azure-ad-powershell-cmdlets-for-the-forcetakeover-option) for removing the domain name from the unmanaged organization and verifying it on the desired organization.
107109

108110
#### More information about RMS for individuals
109111

110112
For [RMS for individuals](/azure/information-protection/rms-for-individuals), when the unmanaged organization is in the same region as the organization that you own, the automatically created [Azure Information Protection organization key](/azure/information-protection/plan-implement-tenant-key) and [default protection templates](/azure/information-protection/configure-usage-rights#rights-included-in-the-default-templates) are additionally moved over with the domain name.
111113

112114
The key and templates aren't moved over when the unmanaged organization is in a different region. For example, if the unmanaged organization is in Europe and the organization that you own is in North America.
113115

114-
Although RMS for individuals is designed to support Azure AD authentication to open protected content, it doesn't prevent users from also protecting content. If users did protect content with the RMS for individuals subscription, and the key and templates weren't moved over, that content isn't accessible after the domain takeover.
116+
Although RMS for individuals is designed to support Entra ID authentication to open protected content, it doesn't prevent users from also protecting content. If users did protect content with the RMS for individuals subscription, and the key and templates weren't moved over, that content isn't accessible after the domain takeover.
115117

116-
### Azure AD PowerShell cmdlets for the ForceTakeover option
118+
### Entra ID PowerShell cmdlets for the ForceTakeover option
117119

118120
You can see these cmdlets used in [PowerShell example](#powershell-example).
119121

@@ -128,7 +130,7 @@ cmdlet | Usage
128130
`get-mgdomain` | The domain list now shows the domain name as **Verified**.
129131

130132
> [!NOTE]
131-
> The unmanaged Azure AD organization is deleted 10 days after you exercise the external takeover force option.
133+
> The unmanaged Entra ID organization is deleted 10 days after you exercise the external takeover force option.
132134
133135
### PowerShell example
134136

@@ -143,7 +145,7 @@ cmdlet | Usage
143145
```powershell
144146
Get-MgDomain
145147
```
146-
3. Run the New-MgDomain cmdlet to add a new domain in Azure:
148+
3. Run the New-MgDomain cmdlet to add a new domain:
147149
```powershell
148150
New-MgDomain -BodyParameter @{Id="<your domain name>"; IsDefault="False"}
149151
```

articles/active-directory/enterprise-users/domains-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@ A domain name is an important part of the identifier for resources in many Azure
2828

2929
When your organization is created, the initial domain name, such as ‘contoso.onmicrosoft.com,’ is also the primary domain name. The primary domain is the default domain name for a new user when you create a new user. Setting a primary domain name streamlines the process for an administrator to create new users in the portal. To change the primary domain name:
3030

31-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's a Global Administrator for the organization.
32-
2. Select **Azure Active Directory**.
31+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
32+
1. Select Microsoft Entra ID (Azure AD).
3333
3. Select **Custom domain names**.
3434

3535
![Opening the user management page](./media/domains-manage/add-custom-domain.png)

articles/active-directory/enterprise-users/groups-assign-sensitivity-labels.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/28/2023
12+
ms.date: 09/08/2023
1313
ms.author: barclayn
1414
ms.reviewer: krbain
1515
ms.custom: it-pro, has-azure-ad-ps-ref
@@ -81,10 +81,9 @@ You will also need to synchronize your sensitivity labels to Azure AD. For instr
8181
8282
## Assign a label to a new group in Azure portal
8383
84-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
85-
86-
1. Sign in to the [Azure portal](https://portal.azure.com).
87-
1. Browse to **Azure Active Directory** > **Groups**, and then select **New group**.
84+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
85+
1. Select Microsoft Entra ID (Azure AD).
86+
1. Choose **Groups** > **All groups** > **New group**.
8887
1. On the **New Group** page, select **Office 365**, and then fill out the required information for the new group and select a sensitivity label from the list.
8988
9089
![Assign a sensitivity label in the New groups page](./media/groups-assign-sensitivity-labels/new-group-page.png)
@@ -95,8 +94,9 @@ Your group is created and the site and group settings associated with the select
9594
9695
## Assign a label to an existing group in Azure portal
9796
98-
1. Sign in to the [Azure portal](https://portal.azure.com) with a Groups admin account, or as a group owner.
99-
1. Browse to **Azure Active Directory** > **Groups**.
97+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
98+
1. Select Microsoft Entra ID (Azure AD).
99+
1. Select **Groups**.
100100
1. From the **All groups** page, select the group that you want to label.
101101
1. On the selected group's page, select **Properties** and select a sensitivity label from the list.
102102
@@ -106,8 +106,9 @@ Your group is created and the site and group settings associated with the select
106106
107107
## Remove a label from an existing group in Azure portal
108108
109-
1. Sign in to the [Azure portal](https://portal.azure.com) with a Global Administrator or Groups admin account, or as a group owner.
110-
1. Browse to **Azure Active Directory** > **Groups**.
109+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
110+
1. Select Microsoft Entra ID (Azure AD).
111+
1. Select **Groups** > **All groups**.
111112
1. From the **All groups** page, select the group that you want to remove the label from.
112113
1. On the **Group** page, select **Properties**.
113114
1. Select **Remove**.
@@ -146,9 +147,10 @@ If the label you are looking for is not in the list, this could be the case for
146147
147148
Labels can be swapped at any time using the same steps as assigning a label to an existing group, as follows:
148149
149-
1. Sign in to the [Azure portal](https://portal.azure.com) with a Global or Group administrator account or as group owner.
150-
1. Browse to **Azure Active Directory** > **Groups**.
151-
1. From the **All groups** page, select the group that you want to label.
150+
1. 1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
151+
1. Select Microsoft Entra ID (Azure AD).
152+
1. Select **Groups**.
153+
1. Choose **All groups**, select the group that you want to label.
152154
1. On the selected group's page, select **Properties** and select a new sensitivity label from the list.
153155
1. Select **Save**.
154156

articles/active-directory/enterprise-users/groups-bulk-download-members.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: barclayn
66
ms.author: barclayn
77
manager: amycolannino
8-
ms.date: 04/24/2023
8+
ms.date: 09/06/2023
99
ms.topic: how-to
1010
ms.service: active-directory
1111
ms.subservice: enterprise-users
@@ -17,14 +17,13 @@ ms.collection: M365-identity-device-management
1717

1818
# Bulk download members of a group in Azure Active Directory
1919

20-
You can bulk download the members of a group in your organization to a comma-separated values (CSV) file in the portal for Azure Active Directory (Azure AD), part of Microsoft Entra. All admins and non-admin users can download group membership lists.
20+
You can bulk download the members of a group in your organization to a comma-separated values (CSV) file from the Microsoft Entra Admin center. All admins and non-admin users can download group membership lists.
2121

2222
## To bulk download group membership
2323

24-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
25-
26-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account in the organization.
27-
1. In Azure AD, select **Groups** > **All groups**.
24+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
25+
1. Select Microsoft Entra ID (Azure AD).
26+
1. Select **Groups** > **All groups**.
2827
1. Open the group whose membership you want to download, and then select **Members**.
2928
1. On the **Members** page, select **Bulk operations** and choose, **Download members** to download a CSV file listing the group members.
3029

articles/active-directory/enterprise-users/groups-bulk-download.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,9 @@ You can download a list of all the groups in your organization to a comma-separa
2727
>[!NOTE]
2828
> The columns downloaded are pre-defined
2929
30-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account in your organization.
31-
1. In Azure AD, select **Groups** > **Download groups**.
30+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
31+
1. Select Microsoft Entra ID (Azure AD).
32+
1. Select **Groups** > **Download groups**.
3233
1. On the **Groups download** page, select **Start** to receive a CSV file listing your groups.
3334

3435
![The download groups command is on the All groups page](./media/groups-bulk-download/bulk-download.png)

articles/active-directory/enterprise-users/groups-bulk-import-members.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,12 @@ The rows in a downloaded CSV template are as follows:
4545

4646
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4747

48-
1. Sign in to the [Azure portal](https://portal.azure.com) with a User administrator account in the organization. Group owners can also bulk import members of groups they own.
49-
1. In Azure AD, select **Groups** > **All groups**.
48+
49+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
50+
1. Select Microsoft Entra ID (Azure AD).
51+
>[!NOTE]
52+
>Group owners can also bulk import members of groups they own.
53+
1. Select **Groups** > **All groups**.
5054
1. Open the group to which you're adding members and then select **Members**.
5155
1. On the **Members** page, select **bulk operations** and then choose **Import members**.
5256
1. On the **Bulk import group members** page, select **Download** to get the CSV file template with required group member properties.

articles/active-directory/enterprise-users/groups-bulk-remove-members.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: barclayn
66
ms.author: barclayn
77
manager: amycolannino
8-
ms.date: 09/22/2021
8+
ms.date: 09/08/2023
99
ms.topic: how-to
1010
ms.service: active-directory
1111
ms.subservice: enterprise-users
@@ -44,8 +44,9 @@ The rows in a downloaded CSV template are as follows:
4444

4545
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com) with a User administrator account in the organization. Group owners can also bulk remove members of groups they own.
48-
1. In Azure AD, select **Groups** > **All groups**.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
48+
1. Select Microsoft Entra ID (Azure AD).
49+
1. Select **Groups** > **All groups**.
4950
1. Open the group from which you're removing members and then select **Members**.
5051
1. On the **Members** page, select **Remove members**.
5152
1. On the **Bulk remove group members** page, select **Download** to get the CSV file template with required group member properties.

0 commit comments

Comments
 (0)