You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-sspr-policy.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 01/25/2023
9
+
ms.date: 04/29/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -60,9 +60,9 @@ The following Azure AD password policy options are defined. Unless noted, you ca
60
60
61
61
By default, administrator accounts are enabled for self-service password reset, and a strong default *two-gate* password reset policy is enforced. This policy may be different from the one you have defined for your users, and this policy can't be changed. You should always test password reset functionality as a user without any Azure administrator roles assigned.
62
62
63
-
With a two-gate policy, administrators don't have the ability to use security questions.
63
+
The two-gate policy requires two pieces of authentication data, such as an email address, authenticator app, or a phone number, and it prohibits security questions. Office and mobile voice calls are also prohibited for trial or free versions of Azure AD.
64
64
65
-
The two-gate policy requires two pieces of authentication data, such as an email address, authenticator app, or a phone number. A two-gate policy applies in the following circumstances:
65
+
A two-gate policy applies in the following circumstances:
66
66
67
67
* All the following Azure administrator roles are affected:
68
68
* Application administrator
@@ -110,7 +110,7 @@ A one-gate policy requires one piece of authentication data, such as an email ad
110
110
111
111
## Password expiration policies
112
112
113
-
A *global administrator* or *user administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
113
+
A *Global Administrator* or *User Administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
114
114
115
115
You can also use PowerShell cmdlets to remove the never-expires configuration or to see which user passwords are set to never expire.
116
116
@@ -127,7 +127,7 @@ After the module is installed, use the following steps to complete each task as
127
127
128
128
### Check the expiration policy for a password
129
129
130
-
1. Open a PowerShell prompt and [connect to your Azure AD tenant](/powershell/module/azuread/connect-azuread#examples) using a *global administrator* or *user administrator* account.
130
+
1. Open a PowerShell prompt and [connect to your Azure AD tenant](/powershell/module/azuread/connect-azuread#examples) using a *Global Administrator* or *User Administrator* account.
131
131
132
132
1. Run one of the following commands for either an individual user or for all users:
133
133
@@ -145,7 +145,7 @@ After the module is installed, use the following steps to complete each task as
145
145
146
146
### Set a password to expire
147
147
148
-
1. Open a PowerShell prompt and [connect to your Azure AD tenant](/powershell/module/azuread/connect-azuread#examples) using a *global administrator* or *user administrator* account.
148
+
1. Open a PowerShell prompt and [connect to your Azure AD tenant](/powershell/module/azuread/connect-azuread#examples) using a *Global Administrator* or *User Administrator* account.
149
149
150
150
1. Run one of the following commands for either an individual user or for all users:
151
151
@@ -163,7 +163,7 @@ After the module is installed, use the following steps to complete each task as
163
163
164
164
### Set a password to never expire
165
165
166
-
1. Open a PowerShell prompt and [connect to your Azure AD tenant](/powershell/module/azuread/connect-azuread#examples) using a *global administrator* or *user administrator* account.
166
+
1. Open a PowerShell prompt and [connect to your Azure AD tenant](/powershell/module/azuread/connect-azuread#examples) using a *Global Administrator* or *User Administrator* account.
167
167
1. Run one of the following commands for either an individual user or for all users:
168
168
169
169
* To set the password of one user to never expire, run the following cmdlet. Replace `<user ID>` with the user ID of the user you want to check, such as *driley\@contoso.onmicrosoft.com*
0 commit comments