Skip to content

Commit fad6419

Browse files
authored
Merge pull request #214458 from MicrosoftDocs/main
10/13 AM Publish
2 parents 91cf702 + 7bfeaca commit fad6419

File tree

106 files changed

+1670
-1262
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

106 files changed

+1670
-1262
lines changed

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 03/18/2022
9+
ms.date: 10/13/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -17,9 +17,9 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable Azure Active Directory self-service password reset at the Windows sign-in screen
1919

20-
Self-service password reset (SSPR) gives users in Azure Active Directory (Azure AD) the ability to change or reset their password, with no administrator or help desk involvement. Typically, users open a web browser on another device to access the [SSPR portal](https://aka.ms/sspr). To improve the experience on computers that run Windows 7, 8, 8.1, and 10, you can enable users to reset their password at the Windows sign-in screen.
20+
Self-service password reset (SSPR) gives users in Azure Active Directory (Azure AD) the ability to change or reset their password, with no administrator or help desk involvement. Typically, users open a web browser on another device to access the [SSPR portal](https://aka.ms/sspr). To improve the experience on computers that run Windows 7, 8, 8.1, 10, and 11 you can enable users to reset their password at the Windows sign-in screen.
2121

22-
![Example Windows 7 and 10 login screens with SSPR link shown](./media/howto-sspr-windows/windows-reset-password.png)
22+
![Example Windows login screens with SSPR link shown](./media/howto-sspr-windows/windows-reset-password.png)
2323

2424
> [!IMPORTANT]
2525
> This tutorial shows an administrator how to enable SSPR for Windows devices in an enterprise.
@@ -37,7 +37,6 @@ The following limitations apply to using SSPR from the Windows sign-in screen:
3737
- Hybrid Azure AD joined machines must have network connectivity line of sight to a domain controller to use the new password and update cached credentials. This means that devices must either be on the organization's internal network or on a VPN with network access to an on-premises domain controller.
3838
- If using an image, prior to running sysprep ensure that the web cache is cleared for the built-in Administrator prior to performing the CopyProfile step. More information about this step can be found in the support article [Performance poor when using custom default user profile](https://support.microsoft.com/help/4056823/performance-issue-with-custom-default-user-profile).
3939
- The following settings are known to interfere with the ability to use and reset passwords on Windows 10 devices:
40-
- If Ctrl+Alt+Del is required by policy in Windows 10, **Reset password** won't work.
4140
- If lock screen notifications are turned off, **Reset password** won't work.
4241
- *HideFastUserSwitching* is set to enabled or 1
4342
- *DontDisplayLastUserName* is set to enabled or 1
@@ -55,11 +54,11 @@ The following limitations apply to using SSPR from the Windows sign-in screen:
5554
> These limitations also apply to Windows Hello for Business PIN reset from the device lock screen.
5655
>
5756
58-
## Windows 10 password reset
57+
## Windows 11 and 10 password reset
5958

60-
To configure a Windows 10 device for SSPR at the sign-in screen, review the following prerequisites and configuration steps.
59+
To configure a Windows 11 or 10 device for SSPR at the sign-in screen, review the following prerequisites and configuration steps.
6160

62-
### Windows 10 prerequisites
61+
### Windows 11 and 10 prerequisites
6362

6463
- An administrator [must enable Azure AD self-service password reset from the Azure portal](tutorial-enable-sspr.md).
6564
- Users must register for SSPR before using this feature at [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup)
@@ -71,17 +70,17 @@ To configure a Windows 10 device for SSPR at the sign-in screen, review the foll
7170
- Azure AD joined
7271
- Hybrid Azure AD joined
7372

74-
### Enable for Windows 10 using Microsoft Endpoint Manager
73+
### Enable for Windows 11 and 10 using Microsoft Endpoint Manager
7574

7675
Deploying the configuration change to enable SSPR from the login screen using Microsoft Endpoint Manager is the most flexible method. Microsoft Endpoint Manager allows you to deploy the configuration change to a specific group of machines you define. This method requires Microsoft Endpoint Manager enrollment of the device.
7776

7877
#### Create a device configuration policy in Microsoft Endpoint Manager
7978

8079
1. Sign in to the [Azure portal](https://portal.azure.com) and select **Endpoint Manager**.
8180
1. Create a new device configuration profile by going to **Device configuration** > **Profiles**, then select **+ Create Profile**
82-
- For **Platform** choose *Windows 10 and later*
81+
- For **Platform** choose *Windows 11 and later*
8382
- For **Profile type**, choose *Custom*
84-
1. Select **Create**, then provide a meaningful name for the profile, such as *Windows 10 sign-in screen SSPR*
83+
1. Select **Create**, then provide a meaningful name for the profile, such as *Windows 11 sign-in screen SSPR*
8584

8685
Optionally, provide a meaningful description of the profile, then select **Next**.
8786
1. Under *Configuration settings*, select **Add** and provide the following OMA-URI setting to enable the reset password link:
@@ -99,7 +98,7 @@ Deploying the configuration change to enable SSPR from the login screen using Mi
9998
1. Configure applicability rules as desired for your environment, such as to *Assign profile if OS edition is Windows 10 Enterprise*, then select **Next**.
10099
1. Review your profile, then select **Create**.
101100

102-
### Enable for Windows 10 using the Registry
101+
### Enable for Windows 11 and 10 using the Registry
103102

104103
To enable SSPR at the sign-in screen using a registry key, complete the following steps:
105104

@@ -112,13 +111,13 @@ To enable SSPR at the sign-in screen using a registry key, complete the followin
112111
"AllowPasswordReset"=dword:00000001
113112
```
114113
115-
### Troubleshooting Windows 10 password reset
114+
### Troubleshooting Windows 11 and 10 password reset
116115
117116
If you have problems with using SSPR from the Windows sign-in screen, the Azure AD audit log includes information about the IP address and *ClientType* where the password reset occurred, as shown in the following example output:
118117
119118
![Example Windows 7 password reset in the Azure AD Audit log](media/howto-sspr-windows/windows-7-sspr-azure-ad-audit-log.png)
120119
121-
When users reset their password from the sign-in screen of a Windows 10 device, a low-privilege temporary account called `defaultuser1` is created. This account is used to keep the password reset process secure.
120+
When users reset their password from the sign-in screen of a Windows 11 or 10 device, a low-privilege temporary account called `defaultuser1` is created. This account is used to keep the password reset process secure.
122121
123122
The account itself has a randomly generated password, which is validated against an organizations password policy, doesn't show up for device sign-in, and is automatically removed after the user resets their password. Multiple `defaultuser` profiles may exist but can be safely ignored.
124123

articles/active-directory/fundamentals/license-users-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ There are several license plans available for the Azure AD service, including:
3232

3333
For specific information about each license plan and the associated licensing details, see [What license do I need?](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing). To sign up for Azure AD premium license plans see [here](./active-directory-get-started-premium.md).
3434

35-
Not all Microsoft services are available in all locations. Before a license can be assigned to a group, you must specify the **Usage location** for all members. You can set this value in the **Azure Active Directory > Users > Profile > Settings** area in Azure AD. Any user whose usage location isn't specified inherits the location of the Azure AD organization.
35+
Not all Microsoft services are available in all locations. Before a license can be assigned to a group, you must specify the **Usage location** for all members. You can set this value in the **Azure Active Directory > Users > Profile > Settings** area in Azure AD. When assigning licenses to a group or bulk updates such as disabling the synchronization status for the organization, any user whose usage location isn't specified inherits the location of the Azure AD organization.
3636

3737
## View license plans and plan details
3838

@@ -80,7 +80,7 @@ Make sure that anyone needing to use a licensed Azure AD service has the appropr
8080
The **Assign license** page updates to show that a user is selected and that the assignments are configured.
8181

8282
> [!NOTE]
83-
> Not all Microsoft services are available in all locations. Before a license can be assigned to a user, you must specify the **Usage location**. You can set this value in the **Azure Active Directory > Users > Profile > Settings** area in Azure AD. Any user whose usage location is not specified inherits the location of the Azure AD organization.
83+
> Not all Microsoft services are available in all locations. Before a license can be assigned to a user, you must specify the **Usage location**. You can set this value in the **Azure Active Directory > Users > Profile > Settings** area in Azure AD. When assigning licenses to a group or bulk updates such as disabling the synchronization status for the organization, any user whose usage location isn't specified inherits the location of the Azure AD organization.
8484
8585
1. Select **Assign**.
8686

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This page is updated monthly, so revisit it regularly.
2323

2424

2525

26-
## September 2022
26+
## October 2022
2727

2828
### General Availability - Azure AD certificate-based authentication
2929

@@ -65,6 +65,8 @@ For more information on how to use this feature, see: [Dynamic membership rule f
6565

6666
---
6767

68+
## September 2022
69+
6870

6971
### General Availability - No more waiting, provision groups on demand into your SaaS applications.
7072

articles/active-directory/reports-monitoring/reports-faq.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,11 @@ sections:
8989
I see .XXX in part of the IP address from a user in my sign-in logs. Why is that happening?
9090
answer: |
9191
Azure AD may redact part of an IP address in the sign-in logs to protect user privacy when a user may not belong to the tenant viewing the logs. This action happens in two cases: first, during cross tenant sign ins, such as when a CSP technician signs into a tenant that CSP manages. Second, when our service wasn't able to determine the user's identity with sufficient confidence to be sure the user belongs to the tenant viewing the logs.
92+
- question: |
93+
I see "PII Removed" in the Device Details of a user in my sign-in logs. Why is that happening?
94+
answer: |
95+
Azure AD redacts Personally Identifiable Information (PII) generated by devices that do not belong to your tenant to ensure customer data does not spread beyond tenant boundaries without user and data owner consent.
96+
9297
9398
- name: Conditional Access
9499
questions:

articles/active-directory/saas-apps/sap-successfactors-writeback-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -327,7 +327,7 @@ Once the SuccessFactors provisioning app configurations have been completed, you
327327
> ![Select Writeback scope](./media/sap-successfactors-inbound-provisioning/select-writeback-scope.png)
328328
329329
> [!NOTE]
330-
> The SuccessFactors Writeback provisioning app does not support "group assignment". Only "user assignment" is supported.
330+
> SuccessFactors Writeback provisioning apps created after 12-Oct-2022 support the "group assignment" feature. If you created the app prior to 12-Oct-2022, it will only have "user assignment" support. To use the "group assignment" feature, create a new instance of the SuccessFactors Writeback application and move your existing mapping configurations to this app.
331331
332332
1. Click **Save**.
333333

@@ -350,4 +350,4 @@ Refer to the [Writeback scenarios section](../app-provisioning/sap-successfactor
350350
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)
351351
* [Learn how to configure single sign-on between SuccessFactors and Azure Active Directory](successfactors-tutorial.md)
352352
* [Learn how to integrate other SaaS applications with Azure Active Directory](tutorial-list.md)
353-
* [Learn how to export and import your provisioning configurations](../app-provisioning/export-import-provisioning-configuration.md)
353+
* [Learn how to export and import your provisioning configurations](../app-provisioning/export-import-provisioning-configuration.md)

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Tutorial - Configure your tenant for Microsoft Entra Verified ID
3-
description: In this tutorial, you learn how to configure your tenant to support the Verifiable Credentials service.
3+
description: In this tutorial, you learn how to configure your tenant to support the Verified ID service.
44
ms.service: decentralized-identity
55
ms.subservice: verifiable-credentials
66
author: barclayn
@@ -24,7 +24,7 @@ Specifically, you learn how to:
2424

2525
> [!div class="checklist"]
2626
> - Create an Azure Key Vault instance.
27-
> - Set up the Verifiable Credentials service.
27+
> - Set up the Verified ID service.
2828
> - Register an application in Azure AD.
2929
3030
The following diagram illustrates the Verified ID architecture and the component you configure.
@@ -77,6 +77,7 @@ The Verifiable credentials service request is the Request Service API, and it ne
7777

7878
1. To save the changes, select **Add**.
7979

80+
8081
## Set up Verified ID
8182

8283
To set up Verified ID, follow these steps:
@@ -87,7 +88,7 @@ To set up Verified ID, follow these steps:
8788

8889
1. Set up your organization by providing the following information:
8990

90-
1. **Organization name**: Enter a name to reference your business within Verifiable Credentials. Your customers don't see this name.
91+
1. **Organization name**: Enter a name to reference your business within Verified IDs. Your customers don't see this name.
9192

9293
1. **Domain**: Enter a domain that's added to a service endpoint in your decentralized identity (DID) document. The domain is what binds your DID to something tangible that the user might know about your business. Microsoft Authenticator and other digital wallets use this information to validate that your DID is linked to your domain. If the wallet can verify the DID, it displays a verified symbol. If the wallet can't verify the DID, it informs the user that the credential was issued by an organization it couldn't validate.
9394

@@ -99,7 +100,7 @@ To set up Verified ID, follow these steps:
99100
1. Under **Advanced**, you may choose the **trust system** that you want to use for your tenant. You can choose from either **Web** or **ION**. Web means your tenant uses [did:web](https://w3c-ccg.github.io/did-method-web/) as the did method and ION means it uses [did:ion](https://identity.foundation/ion/).
100101

101102
>[!IMPORTANT]
102-
> The only way to change the trust system is to opt-out of verifiable credentials and redo the onboarding.
103+
> The only way to change the trust system is to opt-out of the Verified ID service and redo the onboarding.
103104
104105

105106
1. Select **Save and get started**.
@@ -156,7 +157,8 @@ You can choose to grant issuance and presentation permissions separately if you
156157

157158
## Service endpoint configuration
158159

159-
1. Navigate to the Verified ID in the Azure portal.
160+
161+
1. Navigate to the Verified ID service in the Azure portal.
160162
1. Select **Registration**.
161163
1. Notice that there are two sections:
162164
1. Website ID registration

0 commit comments

Comments
 (0)