mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-29 01:03:36 +00:00
Merge pull request #8140 from MicrosoftDocs/main
Publish to live, Tuesday 10:30AM PST, 4/11
This commit is contained in:
@ -69,10 +69,11 @@ Now that the app is configured, you must enable it for the users in Google Works
|
||||
## Configure Azure AD as a Service Provider (SP) for Google Workspace
|
||||
|
||||
The configuration of Azure AD consists of changing the authentication method for the custom DNS domains. This configuration can be done using PowerShell.\
|
||||
Using the **IdP metadata** XML file downloaded from Google Workspace, modify the *$DomainName* variable of the following script to match your environment, and then run it in an elevated PowerShell session. When prompted to authenticate to Azure AD, use the credentials of an account with the *Global Administrator* role.
|
||||
Using the **IdP metadata** XML file downloaded from Google Workspace, modify the *$DomainName* variable of the following script to match your environment, and then run it in a PowerShell session. When prompted to authenticate to Azure AD, use the credentials of an account with the *Global Administrator* role.
|
||||
|
||||
```powershell
|
||||
Install-Module Microsoft.Graph
|
||||
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser -Force
|
||||
Install-Module Microsoft.Graph -Scope CurrentUser
|
||||
Import-Module Microsoft.Graph
|
||||
|
||||
$domainId = "<your domain name>"
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure federated sign-in for Windows devices
|
||||
description: Description of federated sign-in feature for the Education SKUs of Windows 11 and how to configure it via Intune or provisioning packages.
|
||||
ms.date: 04/04/2023
|
||||
ms.date: 04/11/2023
|
||||
ms.topic: how-to
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
@ -146,11 +146,16 @@ In a scenario where a user is federated and you want to change the ImmutableId,
|
||||
Here's a PowerShell example to update the ImmutableId for a federated user:
|
||||
|
||||
```powershell
|
||||
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser -Force
|
||||
Install-Module Microsoft.Graph -Scope CurrentUser
|
||||
Import-Module Microsoft.Graph
|
||||
Connect-MgGraph -Scopes 'User.Read.All', 'User.ReadWrite.All'
|
||||
|
||||
#1. Convert the user from federated to cloud-only
|
||||
Get-AzureADUser -SearchString alton@example.com | Set-AzureADUser -UserPrincipalName alton@example.onmicrosoft.com
|
||||
Update-MgUser -UserId alton@example.com -UserPrincipalName alton@example.onmicrosoft.com
|
||||
|
||||
#2. Convert the user back to federated, while setting the immutableId
|
||||
Get-AzureADUser -SearchString alton@example.onmicrosoft.com | Set-AzureADUser -UserPrincipalName alton@example.com -ImmutableId '260051'
|
||||
Update-MgUser -UserId alton@example.onmicrosoft.com -UserPrincipalName alton@example.com -OnPremisesImmutableId '260051'
|
||||
```
|
||||
|
||||
## Troubleshooting
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: What's new 2023
|
||||
description: This article lists the 2023 feature releases and any corresponding Message center post numbers.
|
||||
ms.date: 04/04/2023
|
||||
ms.date: 04/11/2023
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: whats-new
|
||||
@ -24,6 +24,7 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
|
||||
| Message center post number | Description |
|
||||
| ----- | ----- |
|
||||
| [MC538728](https://admin.microsoft.com/adminportal/home#/MessageCenter) | Update: Windows Autopatch quality updates release communication |
|
||||
| [MC536881](https://admin.microsoft.com/adminportal/home#/MessageCenter) | Take action: Review Windows Autopatch Tenant management blade for potential action required to prevent inactive status |
|
||||
|
||||
## March 2023
|
||||
|
@ -89,7 +89,7 @@ The default configuration for the **Bypass traverse checking** setting is to all
|
||||
|
||||
### Countermeasure
|
||||
|
||||
Organizations that are concerned about security may want to remove the Everyone group, and perhaps the Users group, from the list of groups that have the **Bypass traverse checking** user right. Taking explicit control over traversal assignments can be an effective way to limit access to sensitive information. Access–based enumeration can also be used. If you use access–based enumeration, users can't see any folder or file to which they don't have access. For more info about this feature, see [Access-based Enumeration](/previous-versions/windows/it-pro/windows-server-2003/cc784710(v=ws.10)).
|
||||
Organizations that are concerned about security may want to remove the Everyone group from the list of groups that have the **Bypass traverse checking** user right. Taking explicit control over traversal assignments can be an effective way to limit access to sensitive information. Access–based enumeration can also be used. If you use access–based enumeration, users can't see any folder or file to which they don't have access. For more info about this feature, see [Access-based Enumeration](/previous-versions/windows/it-pro/windows-server-2003/cc784710(v=ws.10)).
|
||||
|
||||
### Potential impact
|
||||
|
||||
|
Reference in New Issue
Block a user