Skip to content

Commit 0325e7a

Browse files
Merge pull request #218845 from Justinha/converge-policy
Converge policy
2 parents 227258f + 106a92b commit 0325e7a

17 files changed

+348
-77
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 76 additions & 66 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@
2626
items:
2727
- name: Overview
2828
href: concept-authentication-methods.md
29+
- name: Manage
30+
href: concept-authentication-methods-manage.md
2931
- name: Microsoft Authenticator app
3032
href: concept-authentication-authenticator-app.md
3133
- name: OATH tokens
@@ -84,6 +86,80 @@
8486
href: concept-resilient-controls.md
8587
- name: How-to guides
8688
items:
89+
- name: Manage authentication methods
90+
href: how-to-authentication-methods-manage.md
91+
- name: Passwordless
92+
items:
93+
- name: Deploying passwordless
94+
href: howto-authentication-passwordless-deployment.md
95+
- name: Passwordless FIDO2 security keys
96+
items:
97+
- name: Enable FIDO2 security keys
98+
href: howto-authentication-passwordless-security-key.md
99+
- name: Sign in to Windows 10 devices
100+
href: howto-authentication-passwordless-security-key-windows.md
101+
- name: SSO to on-premises resources
102+
href: howto-authentication-passwordless-security-key-on-premises.md
103+
- name: Hybrid FAQs
104+
href: howto-authentication-passwordless-faqs.md
105+
- name: Troubleshoot hybrid
106+
href: howto-authentication-passwordless-troubleshoot.md
107+
- name: Passwordless phone sign-in
108+
items:
109+
- name: Manage
110+
href: howto-authentication-passwordless-phone.md
111+
- name: Run a registration campaign
112+
href: how-to-mfa-registration-campaign.md
113+
- name: Use number matching
114+
href: how-to-mfa-number-match.md
115+
- name: Use additional context
116+
href: how-to-mfa-additional-context.md
117+
- name: Use Microsoft managed settings
118+
href: how-to-mfa-microsoft-managed.md
119+
- name: Windows Hello for Business
120+
href: /windows/security/identity-protection/hello-for-business/hello-identity-verification
121+
- name: Use a Temporary Access Pass
122+
href: howto-authentication-temporary-access-pass.md
123+
- name: Use SMS-based authentication
124+
items:
125+
- name: Manage
126+
href: howto-authentication-sms-signin.md
127+
- name: Supported apps for SMS-based authentication
128+
href: how-to-authentication-sms-supported-apps.md
129+
- name: Two-way SMS unsupported
130+
href: how-to-authentication-two-way-sms-unsupported.md
131+
- name: Use email address sign-in
132+
href: howto-authentication-use-email-signin.md
133+
- name: Certificate-based authentication
134+
items:
135+
- name: Azure AD CBA
136+
items:
137+
- name: Overview
138+
href: concept-certificate-based-authentication.md
139+
- name: How Azure AD CBA works
140+
href: concept-certificate-based-authentication-technical-deep-dive.md
141+
- name: Configure Azure AD CBA
142+
href: how-to-certificate-based-authentication.md
143+
- name: Windows smart card logon
144+
href: concept-certificate-based-authentication-smartcard.md
145+
- name: iOS devices
146+
href: concept-certificate-based-authentication-mobile-ios.md
147+
- name: Android devices
148+
href: concept-certificate-based-authentication-mobile-android.md
149+
- name: Certificate user IDs
150+
href: concept-certificate-based-authentication-certificateuserids.md
151+
- name: Migrate federated users
152+
href: concept-certificate-based-authentication-migration.md
153+
- name: FAQ
154+
href: certificate-based-authentication-faq.yml
155+
- name: Federated CBA with Azure AD
156+
items:
157+
- name: Configure CBA with federation
158+
href: active-directory-certificate-based-authentication-get-started.md
159+
- name: Use on Android Devices
160+
href: active-directory-certificate-based-authentication-android.md
161+
- name: Use on iOS Devices
162+
href: active-directory-certificate-based-authentication-ios.md
87163
- name: Self-service password reset
88164
items:
89165
- name: Deployment guide
@@ -130,26 +206,6 @@
130206
href: howto-mfa-nps-extension-rdg.md
131207
- name: VPN
132208
href: howto-mfa-nps-extension-vpn.md
133-
- name: Passwordless
134-
items:
135-
- name: Deploying passwordless
136-
href: howto-authentication-passwordless-deployment.md
137-
- name: Passwordless FIDO2 security keys
138-
items:
139-
- name: Enable FIDO2 security keys for your tenant
140-
href: howto-authentication-passwordless-security-key.md
141-
- name: Sign in to Windows 10 devices
142-
href: howto-authentication-passwordless-security-key-windows.md
143-
- name: SSO to on-premises resources
144-
href: howto-authentication-passwordless-security-key-on-premises.md
145-
- name: Hybrid FAQs
146-
href: howto-authentication-passwordless-faqs.md
147-
- name: Troubleshoot hybrid
148-
href: howto-authentication-passwordless-troubleshoot.md
149-
- name: Passwordless phone sign-in
150-
href: howto-authentication-passwordless-phone.md
151-
- name: Windows Hello for Business
152-
href: /windows/security/identity-protection/hello-for-business/hello-identity-verification
153209
- name: Security info registration
154210
items:
155211
- name: Enable combined registration
@@ -170,54 +226,8 @@
170226
href: howto-password-ban-bad-on-premises-faq.yml
171227
- name: Agent version history
172228
href: howto-password-ban-bad-on-premises-agent-versions.md
173-
- name: Run a registration campaign
174-
href: how-to-mfa-registration-campaign.md
175-
- name: Use number matching
176-
href: how-to-mfa-number-match.md
177-
- name: Use additional context
178-
href: how-to-mfa-additional-context.md
179-
- name: Use a Temporary Access Pass
180-
href: howto-authentication-temporary-access-pass.md
181-
- name: Use SMS-based authentication
182-
href: howto-authentication-sms-signin.md
183-
- name: Supported apps for SMS-based authentication
184-
href: how-to-authentication-sms-supported-apps.md
185-
- name: Two-way SMS unsupported
186-
href: how-to-authentication-two-way-sms-unsupported.md
187-
- name: Use email address sign-in
188-
href: howto-authentication-use-email-signin.md
189229
- name: Azure AD smart lockout
190230
href: howto-password-smart-lockout.md
191-
- name: Certificate-based authentication
192-
items:
193-
- name: Azure AD CBA
194-
items:
195-
- name: Overview
196-
href: concept-certificate-based-authentication.md
197-
- name: How Azure AD CBA works
198-
href: concept-certificate-based-authentication-technical-deep-dive.md
199-
- name: Configure Azure AD CBA
200-
href: how-to-certificate-based-authentication.md
201-
- name: Windows SmartCard logon
202-
href: concept-certificate-based-authentication-smartcard.md
203-
- name: iOS devices
204-
href: concept-certificate-based-authentication-mobile-ios.md
205-
- name: Android devices
206-
href: concept-certificate-based-authentication-mobile-android.md
207-
- name: Certificate user IDs
208-
href: concept-certificate-based-authentication-certificateuserids.md
209-
- name: Migrate federated users
210-
href: concept-certificate-based-authentication-migration.md
211-
- name: FAQ
212-
href: certificate-based-authentication-faq.yml
213-
- name: Federated CBA with Azure AD
214-
items:
215-
- name: Configure CBA with federation
216-
href: active-directory-certificate-based-authentication-get-started.md
217-
- name: Use on Android Devices
218-
href: active-directory-certificate-based-authentication-android.md
219-
- name: Use on iOS Devices
220-
href: active-directory-certificate-based-authentication-ios.md
221231
- name: Reporting
222232
items:
223233
- name: Authentication methods activity
Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
---
2+
title: Manage authentication methods - Azure Active Directory
3+
description: Learn about the authentication methods policy and different ways to manage authentication methods.
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: conceptual
9+
ms.date: 11/17/2022
10+
11+
ms.author: justinha
12+
author: justinha
13+
manager: amycolannino
14+
15+
ms.collection: M365-identity-device-management
16+
ms.custom: contperf-fy20q4
17+
18+
# Customer intent: As an identity administrator, I want to understand what authentication options are available in Azure AD and how I can manage them.
19+
---
20+
# Manage authentication methods for Azure AD
21+
22+
Azure Active Directory (Azure AD) allows the use of a range of authentication methods to support a wide variety of sign-in scenarios. Administrators can specifically configure each method to meet their goals for user experience and security. This topic explains how to manage authentication methods for Azure AD, and how configuration options affect user sign-in and password reset scenarios.
23+
24+
## Authentication methods policy
25+
26+
The Authentication methods policy is the recommended way to manage authentication methods, including modern methods like passwordless authentication. [Authentication Policy Administrators](../roles/permissions-reference.md#authentication-policy-administrator) can edit this policy to enable authentication methods for specific users and groups.
27+
28+
Methods enabled in the Authentication methods policy can typically be used anywhere in Azure AD - for both authentication and password reset scenarios. The exception is that some methods are inherently limited to use in authentication, such as FIDO2 and Windows Hello for Business, and others are limited to use in password reset, such as security questions. For more control over which methods are usable in a given authentication scenario, consider using the **Authentication Strengths** feature.
29+
30+
Most methods also have configuration parameters to more precisely control how that method can be used. For example, if you enable **Phone call**, you can also specify whether an office phone can be used in addition to a mobile phone.
31+
32+
Or let's say you want to enable passwordless authentication with Microsoft Authenticator. You can set extra parameters like showing the user sign-in location or the name of the app being signed into. These options provide more context for users when they sign-in and help prevent accidental MFA approvals.
33+
34+
To manage the Authentication methods policy, click **Security** > **Authentication methods** > **Policies**.
35+
36+
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/authentication-methods-policy.png" alt-text="Screenshot of Authentication methods policy.":::
37+
38+
Only the [converged registration experience](concept-registration-mfa-sspr-combined.md) is aware of the Authentication methods policy. Users in scope of the Authentication methods policy but not the converged registration experience won't see the correct methods to register.
39+
40+
>[!NOTE]
41+
>Some pieces of the Authentication methods policy experience are in preview. This includes management of Email OTP, third party software OATH tokens, SMS, and voice call as noted in the portal. Also, use of the authentication methods policy alone with the legacy MFA and SSPR polices disabled is a preview experience.
42+
43+
## Legacy MFA and SSPR policies
44+
45+
Two other policies, located in **Multifactor authentication** settings and **Password reset** settings, provide a legacy way to manage some authentication methods for all users in the tenant. You can't control who uses an enabled authentication method, or how the method can be used. A [Global Administrator](../roles/permissions-reference.md#global-administrator) is needed to manage these policies.
46+
47+
>[!NOTE]
48+
>Hardware OATH tokens and security questions can only be enabled today by using these legacy policies. In the future, these methods will be available in the Authentication methods policy.
49+
50+
To manage the legacy MFA policy, click **Security** > **Multifactor Authentication** > **Additional cloud-based multifactor authentication settings**.
51+
52+
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/service-settings.png" alt-text="Screenshot of MFA service settings.":::
53+
54+
To manage authentication methods for self-service password reset (SSPR), click **Password reset** > **Authentication methods**. The **Mobile phone** option in this policy allows either voice call or SMS to be sent to a mobile phone. The **Office phone** option allows only voice call.
55+
56+
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/password-reset.png" alt-text="Screenshot of password reset settings.":::
57+
58+
## How policies work together
59+
60+
Settings aren't synchronized between the policies, which allows administrators to manage each policy independently. Azure AD respects the settings in all of the policies so a user who is enabled for an authentication method in _any_ policy can register and use that method. To prevent users from using a method, it must be disabled in all policies.
61+
62+
Let's walk through an example where a user who belongs to the Accounting group wants to register Microsoft Authenticator. The registration process first checks the Authentication methods policy. If the Accounting group is enabled for Microsoft Authenticator, the user can register it.
63+
64+
If not, the registration process checks the legacy MFA policy. In that policy, any user can register Microsoft Authenticator if one of these settings is enabled for MFA:
65+
66+
- **Notification through mobile app**
67+
- **Verification code from mobile app or hardware token**
68+
69+
If the user can't register Microsoft Authenticator based on either of those policies, the registration process checks the legacy SSPR policy. In that policy too, a user can register Microsoft Authenticator if the user is enabled for SSPR and any of these settings are enabled:
70+
71+
- **Mobile app notification**
72+
- **Mobile app code**
73+
74+
For users who are enabled for **Mobile phone** for SSPR, the independent control between policies can impact sign-in behavior. Where the other policies have separate options for SMS and voice call, the **Mobile phone** for SSPR enables both options. As a result, anyone who uses **Mobile phone** for SSPR can also use voice call for password reset, even if the other policies don't allow phone calls.
75+
76+
Similarly, let's suppose you enable **Phone call** for a group. After you enable it, you find that even users who aren't group members can sign-in with a voice call. In this case, it's likely those users are enabled for **Mobile phone** in the legacy SSPR policy or **Call to phone** in the legacy MFA policy.
77+
78+
## Migration between policies
79+
80+
The Authentication methods policy provides a migration path toward unified administration of all authentication methods. All desired methods can be enabled in the Authentication methods policy. Methods in the legacy MFA and SSPR policies can be disabled. Migration has three settings to let you move at your own pace, and avoid problems with sign-in or SSPR during the transition. After migration is complete, you'll centralize control over authentication methods for both sign-in and SSPR in a single place, and the legacy MFA and SSPR policies will be disabled.
81+
82+
>[!Note]
83+
>Controls in the Authentication methods policy for Hardware OATH tokens and security questions are coming soon, but not yet available. If you are using hardware OATH tokens, which are currently in public preview, you should hold off on migrating OATH tokens and do not complete the migration process. If you are using security questions, and don't want to disable them, make sure to keep them enabled in the legacy SSPR policy until the new control is available in the future.
84+
85+
To view the migration options, open the Authentication methods policy and click **Manage migration**.
86+
87+
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/manage-migration.png" alt-text="Screenshot of migration options.":::
88+
89+
The following table describes each option.
90+
91+
| Option | Description |
92+
|:-------|:------------|
93+
| Pre-migration | The Authentication methods policy is used only for authentication.<br>Legacy policy settings are respected. |
94+
| Migration in Progress | The Authentication methods policy is used for authentication and SSPR.<br>Legacy policy settings are respected. |
95+
| Migration Complete | Only the Authentication methods policy is used for authentication and SSPR.<br>Legacy policy settings are ignored. |
96+
97+
Tenants are set to either Pre-migration or Migration in Progress by default, depending on their tenant's current state. At any time, you can change to another option. If you move to Migration Complete, and then choose to roll back to an earlier state, we'll ask why so we can evaluate performance of the product.
98+
99+
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/reason.png" alt-text="Screenshot of reasons for rollback.":::
100+
101+
## Known issues
102+
103+
* Currently, all users must be enabled for at least one MFA method that isn't passwordless and the user can register in interrupt mode. Possible methods include Microsoft Authenticator, SMS, voice call, and software OATH/mobile app code. The method(s) can be enabled in any policy. If a user is not eligible for at least one of those methods, the user will see an error during registration and when visiting My Security Info. We're working to improve this experience to enable fully passwordless configurations.
104+
105+
## Next steps
106+
107+
- [How to migrate MFA and SSPR policy settings to the Authentication methods policy](how-to-authentication-methods-manage.md)
108+
- [What authentication and verification methods are available in Azure Active Directory?](concept-authentication-methods.md)
109+
- [How Azure AD Multi-Factor Authentication works](concept-mfa-howitworks.md)
110+
- [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview)

0 commit comments

Comments
 (0)