Comments on: Microsoft Extends Retirement Date for Azure AD and MSOL License Assignment Cmdlets https://practical365.com/azure-ad-license-management-extension/ Practical Office 365 News, Tips, and Tutorials Fri, 16 Jun 2023 11:47:01 +0000 hourly 1 https://wordpress.org/?v=6.3.2 By: Tony Redmond https://practical365.com/azure-ad-license-management-extension/#comment-248331 Wed, 14 Dec 2022 13:41:55 +0000 https://practical365.com/?p=56936#comment-248331 In reply to Watto.

That issue is being discussed with the Graph SDK development team at https://github.com/microsoftgraph/microsoft-graph-docs/issues/17374

I have pinged some folks that I know to see what the current state of play might be.

]]>
By: Watto https://practical365.com/azure-ad-license-management-extension/#comment-248327 Wed, 14 Dec 2022 09:12:42 +0000 https://practical365.com/?p=56936#comment-248327 In reply to Tony Redmond.

Thank you Tony for the article you shared, it is very useful when it comes to reporting of MFA status of available users accounts.
What we need to accomplish same behavior when you set MFA auth state to Enforced using MSOL module, but this time using graph API.
Setting MFA status to “Enforced” for particular user forces that user to register at least one MFA Authentication method and use it as default each time he signs in, if not then the user is not allowed to sign in.

]]>
By: Tony Redmond https://practical365.com/azure-ad-license-management-extension/#comment-247966 Tue, 06 Dec 2022 15:59:13 +0000 https://practical365.com/?p=56936#comment-247966 In reply to Watto.

In the Graph world, these are called authentication methods and you can script them with cmdlets in the Microsoft Graph PowerShell SDK. Here’s an example of reporting authentication methods for Azure AD accounts: https://office365itpros.com/2022/10/07/authentication-methods-scripts/

]]>
By: Watto https://practical365.com/azure-ad-license-management-extension/#comment-247955 Tue, 06 Dec 2022 12:02:48 +0000 https://practical365.com/?p=56936#comment-247955 Hope they will create Microsoft graph replacement command for set-msoluser -StrongAuthenticationRequirements parameter.

Example bellow:

$user = “testMFADisabled@sometenant.onmicrosoft.com
$auth = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
$auth.RelyingParty = “*”
$auth.State = “Enforced”
$authst = @($auth)
Set-MsolUser -UserPrincipalName $user -StrongAuthenticationRequirements $authst

]]>
By: Mike Patterson https://practical365.com/azure-ad-license-management-extension/#comment-241875 Fri, 12 Aug 2022 15:28:34 +0000 https://practical365.com/?p=56936#comment-241875 I guess they finally figured out not all the commands available in the 2 are in either of the Graph options.

]]>
By: Tony Redmond https://practical365.com/azure-ad-license-management-extension/#comment-241843 Thu, 11 Aug 2022 20:06:31 +0000 https://practical365.com/?p=56936#comment-241843 In reply to Bennett.

License assignment cmdlets will stop working on the dates as stated. The modules are due for deprecation in early 2023. I imagine Microsoft will align this with the March 31, 2023 date for license assignment.

]]>
By: Bennett https://practical365.com/azure-ad-license-management-extension/#comment-241842 Thu, 11 Aug 2022 19:25:36 +0000 https://practical365.com/?p=56936#comment-241842 Is this exclusive to license assignments or will it be the whole of the AzureAD module that is being pushed back to this date?

]]>