Azure AD 'generic' settings for users, devices - azure

There are some default settings for devices in Azure AD:
- Users may join devices to Azure AD (All-Selected-none)
- Additional local administrators on Azure AD joined devices (Selected-None)
- Require Multi-Factor Auth to join devices
an so on.
I am not able to find any solution to do this PROGRAMMATICALLY.
I went thru all MS Graph (also beta), tried PowerShell - Azure AD, Exchange Online, but without any result.
Only Msol has cmdlet Set-MsolDeviceRegistratioinServicePolicy, which does the job. But not whole job - I can't find how to set users/groups which can be selected.
And anyway, does MS Graph have this functionality?

MS Graph doesn't have this functionality yet. All the operations of Device are list here. Currently we can manage device identity using the Azure portal. You can send your feedback regarding this at the bottom of this link. Hope it helps.

Related

Azure Join AD Failed in Windows 10

I wanted to Join my Windows 10 device to Azure AD, but unfortunately I'm getting this below error, i tried to solve this issue by Disable/Enable Auto enrollment, Microsoft intune Settings etc. but still this issue is not solved. I'm using AD P1 Premium currently, Even i registered my device using P1 license 6 months ago, but now i can't able to register new devices.
Kindly disable the MDM settings in the Azure portal. After Turning off MDM and MAM check whether you were able to join the device to Azure AD.
Kindly let me know if you have any further queries.
Did you try this:
Login to https://portal.azure.com with your administrator
credentials.
Select Azure Active Directory on the left.
Go to Devices and then select Device Settings.
Set Users may join devices to Azure AD to All or Selected.

Azure AD is not redirecting to the MDM term of use URL

I have added an MDM (On-Premise) to Azure AD tenant in order to auto-enroll users (on windows 10) to a third party MDM once they sign in with their Azure AD accounts. When users try to sign in on Access work or school >> Connect >> Join this device to Azure Active Directory they got this error: Something went wrong. Looks like we can't connect to the URL for your organization's MDM terms of use.
Checking the MDM's server logs I realize that Azure AD never calls/redirect the user to the MDM's terms of use URL, in other words, on the MDM server there is no sign that Azure AD is trying to reach it.
Would you please give me some hints why this happens?.
On Azure AD tenant I have configured the following:
Enabled P2 license for each user.
Scope of the MDM is set to Some and for a Group where its members need to be enrolled to the third party MDM.
On MDM Settings (on Azure AD) the reply URL (just one) is set correctly.
MDM terms of use URL and discovery are set correctly.
The MDM config on Azure AD looks like this:
Azure AD MDM URL configuration.
The MDM Properties on Azure AD look like this:
Azure AD MDM properties.
In advance thanks a lot.
The Azure AD Premium P2 license allows you to join Azure AD with the Windows client, but it does not include Intune.
I would check settings to see if you auto-enroll is configured for Intune. That could explain the above message.
Also, please ensure that you have the right App ID URI and App ID configured as setting the wrong one here can also cause this error.
I ran into this problem today from an OOBE and all of my searching pointed to licensing issues, which turned out to not be the fix for me.
The object in Azure AD had been disabled. This was strange because it was an autopilot device and was disabled in AAD straight from the vendor, which hadn't been the case for other devices I had been receiving for years. I searched for and enabled the device in AAD and it joined without issue. I poked around and found about 30 other devices were in the same state. Hopefully this isn't a new step I'll have to do for all autopilot devices going forward.

AD on premises integration to windows azure

I have a little confusion about directory sync which is used for AD azure integration.
1) Can anyone let me know, whether we can integrate complete on premises AD to
windows azure AD using this? Or only users and groups?
2) If directory sync will not be helpful for complete AD integration what
method will be used?
Can anyone let me know, whether we can integrate complete on-premises AD to windows azure AD using this ? or only users and groups?
Yes, your on-premises AD can be integrated with Azure AD (AAD) with AAD Connect tool. The integration needs prerequisites you can refer here https://learn.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-prerequisites. It means not all the cases can be done. For example, if you need to use password writeback functionality, your on-premises AD domain controller must be at least Windows Server 2008. Another prerequisite is that if your on-premises is using single label domain, it is not supported. Best to check the link above before the integration.
IF directory sync will not be helpful for complete AD integartion what methord will be used ?
AAD Connect provides set of features to help you build a comprehensive hybrid identity between on-premises AD and AAD. However, if this doesn't meet your requirement, you can build some extensions programmatically to interact with AAD. I don't know your preferred programming language, but here is the Authentication Library (ADAL) which is pretty much preferred for AAD development https://learn.microsoft.com/en-us/azure/active-directory/develop/active-directory-authentication-libraries
AAD not only supports user and group sync, but also for custom attributes, filtering, password sync & writeback or so on. Remember AAD Connect is purposely for synchronization. It does not offer too much for AAD interaction (saying that you need to manage, add more attributes or retrieve user attributes, 3rd integration...)

Not able Add the B2B invitation in Azure new portal

Currently we are working on Azure SSO migration project and doing most of the task using old azure site. we have received a mail from the Microsoft via Client to use the new azure portal.
To provide the access for B2B, in old portal we straight uploaded the files with application id and the group id and that worked well.
But, in new portal when the did the same, the ids' are getting created in azure AD portal but they are not mapped in the groups that we have created for B2B invitation for the application.
Is there any approach is there. please help.
Regards,
Avisekh
The feature in the Azure Portal allows you to add individual requests by adding guest accounts, but if you need to invite multiple people or have any type of automation, you should:
Use PowerShell New-AzureADMSInvitation cmdlet
[or]
Use the Microsoft Graph API invitations
If you need to add users to groups, then you can also use the Dynamic Groups feature in Azure B2B (perhaps this is more similar to what you used to have), as well as Graph API Groups API or via PowerShell.

Enable Azure Active Directory Access Control with Office 365 Azure Active Directory tenant

I currently have an Office 365 tenant with around 1,400 users all licensed. We have enabled the Azure AD tenant with the same account and are now using Azure AD Dirsync to have same sign-on to Office 365.
We are now having an external Sharepoint site developed and have been offered either ADFS or Azure AD ACS as an authentication method. As we've already got an Azure AD subscription (through Office 365) I thought this would be the easiest method. However, when in my tenant on https://manage.windowsazure.com, I have access to Active Directory, can add a new directory but cannot add a new Access Control service. It's greyed out and says "not available" underneath.
I've tried talking to Office 365 support, who referred me to Azure support, who then said we don't have support so can't help. I've spoken to Azure sales and they've referred me to Azure support, who then guess what, said we don't have support.
Has anyone else managed to implement an Azure Access Control service from an Office 365 tenancy using the free Azure Active Directory subscription? I get the feeling I just need to buy a cheap Azure subscription and the option would become available, but without knowing for sure I'm a bit hesitant about taking the plunge.
Thanks.
I can imagine that you cannot use the free Azure subscription for this purpose because using the Access Control Service brings costs. The free subscription is not tied to any creditcard. When you have e.g. a pay-as-you-go subscription you should be able to create a ACS namespace. I just tried in one of my pay-as-you-go subscriptions.
You are (still) able to create a namespace but I suggest you to also take a look into the identity possibilities Azure AD itself has. Azure AD has currently only support for SAML 2.0 (and a lot of other protocols but they are not directly relevant for SharePoint). I know SharePoint (on-premises) only talks SAML 1.1 so that's where ACS comes in. You can read more about this topic here. Azure AD itself is going to support SAML 1.1. The only question is when. (see one of the comments from the source mentioned below this answer)
I also would make one remark about Azure AD ACS because this is going to be replaced by Azure AD. The only question left is when.
ACS Capabilities in Azure AD
As we've mentioned previously, we are adding ACS-like capabilities into Azure AD. In the coming months, as part of a feature preview Azure AD administrators will be able to add federation with social identity providers, and later custom identity providers to Azure AD. This will allow app developers to use Azure AD to simplify the identity implementation in their apps, similar to how developers use ACS today. We look forward to getting your feedback on the preview to improve these experiences.
Migrating ACS Customers to Azure AD
Once these new ACS capabilities of Azure AD are out of preview and generally available, we will start migrating ACS namespaces to use the new Azure AD capabilities.
Source: The future of Azure ACS is Azure Active Directory
Quick solution:
Create an Azure paid account. Add the administrator user of the paid account in the Office 365 directory, and set it as global administrator of this later directory (you can add users from other directories).
Then switch back to the paid account. The new global administrator will be able to manage the Office 365 directory and add a namespace.

Resources