Skip to content

Commit

Permalink
Merge pull request #1029 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
1/2/2024 PM Publish
  • Loading branch information
Taojunshen authored Jan 2, 2024
2 parents 8cd65fe + ea118b7 commit ee768ae
Show file tree
Hide file tree
Showing 4 changed files with 14 additions and 16 deletions.
2 changes: 1 addition & 1 deletion docs/fundamentals/whats-new.md
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ For more information, see:

Custom security attributes in Microsoft Entra ID are business-specific attributes (key-value pairs) that you can define and assign to Microsoft Entra objects. These attributes can be used to store information, categorize objects, or enforce fine-grained access control over specific Azure resources. Custom security attributes can be used with [Azure attribute-based access control (Azure ABAC)](/azure/role-based-access-control/conditions-overview). For more information, see: [What are custom security attributes in Microsoft Entra ID?](./custom-security-attributes-overview.md).

Changes were made to custom security attribute audit logs for general availability that might impact your daily operations. If you have been using custom security attribute audit logs during the preview, there are the actions you must take before February 2024 to ensure your audit log operations aren't disrupted. For more information, see: [Custom security attribute audit logs](./custom-security-attributes-manage.md#step-6-assign-roles).
Changes were made to custom security attribute audit logs for general availability that might impact your daily operations. If you have been using custom security attribute audit logs during the preview, there are the actions you must take before February 2024 to ensure your audit log operations aren't disrupted. For more information, see: [Custom security attribute audit logs](./custom-security-attributes-manage.md#custom-security-attribute-audit-logs).

---

Expand Down
8 changes: 3 additions & 5 deletions docs/identity/authentication/fido2-compatibility.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ services: active-directory
ms.service: active-directory
ms.subservice: authentication
ms.topic: conceptual
ms.date: 12/06/2023
ms.date: 01/02/2024

author: justinha
ms.author: justinha
Expand All @@ -26,10 +26,8 @@ Microsoft applications provide native support for FIDO2 authentication in previe
| Operating system | Authentication broker | Supports FIDO2 |
|------------------|---------------------------------|----------------|
| iOS | Microsoft Authenticator | ✅ |
| macOS | Microsoft Intune Company Portal <sup>1</sup> | &#x2705; |
| Android<sup>2</sup> | Authenticator or Company Portal | &#10060; |

<sup>1</sup>On macOS, the [Microsoft Enterprise SSO plug-in](/entra/identity-platform/apple-sso-plugin) is required to enable Company Portal as an authentication broker. macOS devices must meet SSO plug-in requirements, including enrollment in mobile device management. In addition, FIDO2 authentication for initial sign-in to the Company Portal app is not currently supported.
| macOS | Microsoft Intune Company Portal | &#10060; |
| Android<sup>1</sup> | Authenticator or Company Portal | &#10060; |

<sup>2</sup>Native app support for FIDO2 on Android is in development.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ The SLA attainment is truncated at three places after the decimal. Numbers aren'
| September | 99.999% | 99.998% | 99.999% |
| October | 99.999% | 99.999% | 99.999% |
| November | 99.998% | 99.999% | 99.999% |
| December | 99.978% | 99.999% | |
| December | 99.978% | 99.999% | 99.999% |

<a name='how-is-azure-ad-sla-measured-'></a>

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ ms.service: active-directory
ms.topic: conceptual
ms.subservice: roles
ms.workload: identity
ms.date: 06/22/2023
ms.date: 01/02/2024
ms.author: rolyon
ms.reviewer:
ms.custom: oldportal;it-pro;
Expand Down Expand Up @@ -54,15 +54,15 @@ For administrators not explicitly assigned at the restricted management administ

| Operation type | Blocked | Allowed |
| --- | :---: | :---: |
| Read standard properties like user principal name, user photo | | :heavy_check_mark: |
| Read standard properties like user principal name, user photo | | :white_check_mark: |
| Modify any Microsoft Entra properties of the user, group, or device | :x: | |
| Delete the user, group, or device | :x: | |
| Update password for a user | :x: | |
| Modify owners or members of the group in the restricted management administrative unit | :x: | |
| Add users, groups, or devices in a restricted management administrative unit to groups in Microsoft Entra ID | | :heavy_check_mark: |
| Modify email & mailbox settings in Exchange for the user in the restricted management administrative unit | | :heavy_check_mark: |
| Apply policies to a device in a restricted management administrative unit using Intune | | :heavy_check_mark: |
| Add or remove a group as a site owner in SharePoint | | :heavy_check_mark: |
| Add users, groups, or devices in a restricted management administrative unit to groups in Microsoft Entra ID | | :white_check_mark: |
| Modify email & mailbox settings in Exchange for the user in the restricted management administrative unit | | :white_check_mark: |
| Apply policies to a device in a restricted management administrative unit using Intune | | :white_check_mark: |
| Add or remove a group as a site owner in SharePoint | | :white_check_mark: |

## Who can modify objects?

Expand All @@ -72,8 +72,8 @@ Only administrators with an explicit assignment at the scope of a restricted man
| --- | :---: | :---: |
| Global Administrator | :x: | |
| Tenant-scoped administrators (including Global Administrator) | :x: | |
| Administrators assigned at the scope of restricted management administrative unit | | :heavy_check_mark: |
| Administrators assigned at the scope of another restricted management administrative unit of which the object is a member | | :heavy_check_mark: |
| Administrators assigned at the scope of restricted management administrative unit | | :white_check_mark: |
| Administrators assigned at the scope of another restricted management administrative unit of which the object is a member | | :white_check_mark: |
| Administrators assigned at the scope of another regular administrative unit of which the object is a member | :x: | |
| Groups Administrator, User Administrator, and other role assigned at the scope of a resource | :x: | |
| Owners of groups or devices added to restricted management administrative units | :x: | |
Expand All @@ -83,7 +83,7 @@ Only administrators with an explicit assignment at the scope of a restricted man
Here are some of the limits and constraints for restricted management administrative units.

- The restricted management setting must be applied during administrative unit creation and can't be changed once the administrative unit is created.
- Groups in a restricted management administrative unit can't be managed with [Microsoft Entra Privileged Identity Management](~/id-governance/privileged-identity-management/groups-discover-groups.md).
- Groups in a restricted management administrative unit can't be managed with Microsoft Entra ID Governance features such as [Microsoft Entra Privileged Identity Management](../../id-governance/privileged-identity-management/groups-discover-groups.md) or [Microsoft Entra entitlement management](../../id-governance/entitlement-management-overview.md).
- Role-assignable groups, when added to a restricted management administrative unit, can't have their membership modified. Group owners aren't allowed to manage groups in restricted management administrative units and only Global Administrators and Privileged Role Administrators (neither of which can be assigned at administrative unit scope) can modify membership.
- Certain actions may not be possible when an object is in a restricted management administrative unit, if the required role isn't one of the roles that can be assigned at administrative unit scope. For example, a Global Administrator in a restricted management administrative unit can't have their password reset by any other administrator in the system, because there's no admin role that can be assigned at the administrative unit scope that can reset the password of a Global Administrator. In such scenarios, the Global Administrator would need to be removed from the restricted management administrative unit first, and then have their password reset by another Global Administrator or Privileged Role Administrator.
- When deleting a restricted management administrative unit, it can take up to 30 minutes to remove all protections from the former members.
Expand Down

0 comments on commit ee768ae

Please sign in to comment.