Skip to content

Commit 0226262

Browse files
authored
Merge pull request #98441 from TimShererWithAquent/us1645361z
[1645361 portal-nav] including screen caps
2 parents 768625c + 4008df6 commit 0226262

File tree

9 files changed

+8
-8
lines changed

9 files changed

+8
-8
lines changed

articles/active-directory/authentication/howto-mfa-nps-extension-rdg.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,11 +117,11 @@ This section provides instructions for configuring RDS infrastructure to use Azu
117117
As part of the configuration of the NPS extension, you need to supply admin credentials and the Azure AD ID for your Azure AD tenant. The following steps show you how to get the tenant ID.
118118

119119
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
120-
1. In the left navigation, select the **Azure Active Directory** icon.
120+
1. In the Azure portal menu, select **Azure Active Directory**, or search for and select **Azure Active Directory** from any page.
121121
1. Select **Properties**.
122122
1. In the Properties blade, beside the Directory ID, click the **Copy** icon, as shown below, to copy the ID to clipboard.
123123

124-
![Getting the Directory ID from the Azure portal](./media/howto-mfa-nps-extension-rdg/image1.png)
124+
![Getting the Directory ID from the Azure portal](./media/howto-mfa-nps-extension-rdg/azure-active-directory-id-in-azure-portal.png)
125125

126126
### Install the NPS extension
127127

articles/active-directory/authentication/howto-mfa-nps-extension-vpn.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -323,13 +323,13 @@ As part of the configuration of the NPS extension, you must supply administrator
323323

324324
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
325325

326-
2. In the left pane, select the **Azure Active Directory** button.
326+
2. In the Azure portal menu, select **Azure Active Directory**, or search for and select **Azure Active Directory** from any page.
327327

328328
3. Select **Properties**.
329329

330330
4. To copy your Azure AD ID, select the **Copy** button.
331331

332-
![Azure AD Directory ID in the Azure portal](./media/howto-mfa-nps-extension-vpn/image35.png)
332+
![Azure AD Directory ID in the Azure portal](./media/howto-mfa-nps-extension-vpn/azure-active-directory-id-in-azure-portal.png)
333333

334334
### Install the NPS extension
335335

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ As an administrator, you can manage the following user and device settings:
2727

2828
As an administrator assigned the Authentication Administrator role you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object.
2929

30-
![Manage authentication methods from the Azure portal](./media/howto-mfa-userdevicesettings/manage-authentication-methods.png)
30+
![Manage authentication methods from the Azure portal](./media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png)
3131

3232
1. Sign in to the [Azure portal](https://portal.azure.com).
3333
1. On the left, select **Azure Active Directory** > **Users** > **All users**.

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ Complete these steps to enable combined registration:
3737

3838
1. Sign in to the Azure portal as a user administrator or global administrator.
3939
2. Go to **Azure Active Directory** > **User settings** > **Manage settings for access panel preview features**.
40-
3. Under **Users can use preview features for registering and managing security info - refresh**, choose to enable for a **Selected** group of users or for **All** users.
40+
3. Under **Users can use preview features for registering and managing security info**, choose to enable for a **Selected** group of users or for **All** users.
4141

42-
![Enable the combined security info preview experience for All users](media/howto-registration-mfa-sspr-combined/combined-security-info-enable.png)
42+
![Enable the combined security info preview experience for All users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info-preview.png)
4343

4444
> [!IMPORTANT]
4545
> Starting in March 2019, the phone call options won't be available to Multi-Factor Authentication and SSPR users in free/trial Azure AD tenants. SMS messages are not affected by this change. The phone call options will still be available to users in paid Azure AD tenants.
@@ -61,7 +61,7 @@ Securing when and how users register for Azure Multi-Factor Authentication and s
6161

6262
The following policy applies to all selected users, who attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network.
6363

64-
![Create a CA policy to control security info registration](media/howto-registration-mfa-sspr-combined/conditional-access-register-security-info.png)
64+
![Create a CA policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6565

6666
1. In the **Azure portal**, browse to **Azure Active Directory** > **Conditional Access**
6767
1. Select **New policy**
Loading
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)