Skip to content

Commit 101a596

Browse files
Merge pull request #251583 from Justinha/steps-auth-12
revised portal steps
2 parents f8eb149 + f95c079 commit 101a596

6 files changed

+24
-23
lines changed

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/10/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -45,11 +45,11 @@ If your MFA provider isn't linked to an Azure AD tenant, or you link the new MFA
4545
> [!CAUTION]
4646
> There is no confirmation when deleting an authentication provider. Selecting **Delete** is a permanent process.
4747
48-
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
48+
Authentication providers can be found in the [Microsoft Entra admin center](https://entra.microsoft.com). Sign in as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator). Browse to **Protection** > **Multifactor authentication** > **Providers**. Click the listed providers to see details and configurations associated with that provider.
4949

5050
Before removing an authentication provider, take note of any customized settings configured in your provider. Decide what settings need to be migrated to general MFA settings from your provider and complete the migration of those settings.
5151

52-
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
52+
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
5353

5454
- caCert
5555
- cert
@@ -59,9 +59,9 @@ Azure MFA Servers linked to providers will need to be reactivated using credenti
5959
- licenseKey
6060
- pkey
6161

62-
![Delete an auth provider from the Azure portal](./media/concept-mfa-authprovider/authentication-provider-removal.png)
62+
![Delete an authentication provider](./media/concept-mfa-authprovider/authentication-provider-removal.png)
6363

64-
After you confirm that all settings are migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
64+
After you confirm that all settings are migrated, browse to **Providers** and select the ellipses **...** and select **Delete**.
6565

6666
> [!WARNING]
6767
> Deleting an authentication provider will delete any reporting information associated with that provider. You may want to save activity reports before deleting your provider.

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/29/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -78,14 +78,14 @@ If you use MFA Server, the following personal data is stored.
7878

7979
## Organizational data stored by Azure AD multifactor authentication
8080

81-
Organizational data is tenant-level information that can expose configuration or environment setup. Tenant settings from the following Azure portal multifactor authentication pages might store organizational data such as lockout thresholds or caller ID information for incoming phone authentication requests:
81+
Organizational data is tenant-level information that can expose configuration or environment setup. Tenant settings from the Multifactor authentication pages might store organizational data such as lockout thresholds or caller ID information for incoming phone authentication requests:
8282

8383
* Account lockout
8484
* Fraud alert
8585
* Notifications
8686
* Phone call settings
8787

88-
For MFA Server, the following Azure portal pages might contain organizational data:
88+
For MFA Server, the following pages might contain organizational data:
8989

9090
* Server settings
9191
* One-time bypass

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/03/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -130,7 +130,7 @@ To secure when and how users register for Azure AD Multi-Factor Authentication a
130130

131131
An admin has enforced registration.
132132

133-
A user has not set up all required security info and goes to the Azure portal. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for multifactor authentication. To complete the setup process, the user confirms the info and continues to the Azure portal.
133+
A user has not set up all required security info and goes to the Microsoft Entra admin center. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for multifactor authentication. To complete the setup process, the user confirms the info and continues to the Microsoft Entra admin center.
134134

135135
### Set up security info from My Account
136136

@@ -161,7 +161,7 @@ For example, a user sets Microsoft Authenticator app push notification as the pr
161161
This user is also configured with SMS/Text option on a resource tenant.
162162
If this user removes SMS/Text as one of the authentication options on their home tenant, they get confused when access to the resource tenant asks them to respond to SMS/Text message.
163163

164-
To switch the directory in the Azure portal, click the user account name in the upper right corner and click **Switch directory**.
164+
To switch the directory in the Microsoft Entra admin center, click the user account name in the upper right corner and click **Switch directory**.
165165

166166
![External users can switch directory.](media/concept-registration-mfa-sspr-combined/switch-directory.png)
167167

articles/active-directory/authentication/concept-sspr-howitworks.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/19/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -71,14 +71,14 @@ To get started with SSPR, complete the following tutorial:
7171
You can enable the option to require a user to complete the SSPR registration if they use modern authentication or web browser to sign in to any applications using Azure AD. This workflow includes the following applications:
7272

7373
* Microsoft 365
74-
* Azure portal
74+
* Microsoft Entra admin center
7575
* Access Panel
7676
* Federated applications
7777
* Custom applications using Azure AD
7878

7979
When you don't require registration, users aren't prompted during sign-in, but they can manually register. Users can either visit [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup) or select the **Register for password reset** link under the **Profile** tab in the Access Panel.
8080

81-
![Registration options for SSPR in the Azure portal][Registration]
81+
![Registration options for SSPR in the Microsoft Entra admin center][Registration]
8282

8383
> [!NOTE]
8484
> Users can dismiss the SSPR registration portal by selecting **cancel** or by closing the window. However, they're prompted to register each time they sign in until they complete their registration.
@@ -109,7 +109,7 @@ Users can only reset their password if they have registered an authentication me
109109
> [!WARNING]
110110
> Accounts assigned Azure *administrator* roles are required to use methods as defined in the section [Administrator reset policy differences](concept-sspr-policy.md#administrator-reset-policy-differences).
111111
112-
![Authentication methods selection in the Azure portal][Authentication]
112+
![Authentication methods selection in the Microsoft Entra admin center][Authentication]
113113

114114
### Number of authentication methods required
115115

@@ -186,7 +186,7 @@ If you have a hybrid environment, you can configure Azure AD Connect to write pa
186186

187187
![Validating password writeback is enabled and working][Writeback]
188188

189-
Azure AD checks your current hybrid connectivity and provides one of the following messages in the Azure portal:
189+
Azure AD checks your current hybrid connectivity and provides one of the following messages in the Microsoft Entra admin center:
190190

191191
* Your on-premises writeback client is up and running.
192192
* Azure AD is online and is connected to your on-premises writeback client. However, it looks like the installed version of Azure AD Connect is out-of-date. Consider [Upgrading Azure AD Connect](../hybrid/connect/how-to-upgrade-previous-version.md) to ensure that you have the latest connectivity features and important bug fixes.
@@ -202,7 +202,7 @@ To get started with SSPR writeback, complete the following tutorial:
202202
203203
### Write back passwords to your on-premises directory
204204

205-
You can enable password writeback using the Azure portal. You can also temporarily disable password writeback without having to reconfigure Azure AD Connect.
205+
You can enable password writeback using the Microsoft Entra admin center. You can also temporarily disable password writeback without having to reconfigure Azure AD Connect.
206206

207207
* If the option is set to **Yes**, then writeback is enabled. Federated, pass-through authentication, or password hash synchronized users are able to reset their passwords.
208208
* If the option is set to **No**, then writeback is disabled. Federated, pass-through authentication, or password hash synchronized users aren't able to reset their passwords.

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: conceptual
8-
ms.date: 01/29/2023
8+
ms.date: 09/14/2023
99
ms.author: justinha
1010
author: justinha
1111
manager: amycolannino
@@ -33,7 +33,7 @@ Password writeback provides the following features:
3333
* **Enforcement of on-premises Active Directory Domain Services (AD DS) password policies**: When a user resets their password, it's checked to ensure it meets your on-premises AD DS policy before committing it to that directory. This review includes checking the history, complexity, age, password filters, and any other password restrictions that you define in AD DS.
3434
* **Zero-delay feedback**: Password writeback is a synchronous operation. Users are notified immediately if their password doesn't meet the policy or can't be reset or changed for any reason.
3535
* **Supports password changes from the access panel and Microsoft 365**: When federated or password hash synchronized users come to change their expired or non-expired passwords, those passwords are written back to AD DS.
36-
* **Supports password writeback when an admin resets them from the Azure portal**: When an admin resets a user's password in the [Azure portal](https://portal.azure.com), if that user is federated or password hash synchronized, the password is written back to on-premises. This functionality is currently not supported in the Office admin portal.
36+
* **Supports password writeback when an admin resets them from the Microsoft Entra admin center**: When an admin resets a user's password in the [Microsoft Entra admin center](https://entra.microsoft.com), if that user is federated or password hash synchronized, the password is written back to on-premises. This functionality is currently not supported in the Office admin portal.
3737
* **Doesn't require any inbound firewall rules**: Password writeback uses an Azure Service Bus relay as an underlying communication channel. All communication is outbound over port 443.
3838
* **Supports side-by-side domain-level deployment** using [Azure AD Connect](tutorial-enable-sspr-writeback.md) or [cloud sync](tutorial-enable-cloud-sync-sspr-writeback.md) to target different sets of users depending on their needs, including users who are in disconnected domains.
3939

@@ -139,7 +139,7 @@ Passwords are written back in all the following situations:
139139
* Any administrator self-service voluntary change password operation.
140140
* Any administrator self-service force change password operation, for example, password expiration.
141141
* Any administrator self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com).
142-
* Any administrator-initiated end-user password reset from the [Azure portal](https://portal.azure.com).
142+
* Any administrator-initiated end-user password reset from the Microsoft Entra admin center.
143143
* Any administrator-initiated end-user password reset from the [Microsoft Graph API](/graph/api/passwordauthenticationmethod-resetpassword).
144144

145145
## Unsupported writeback operations

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 06/28/2023
7+
ms.date: 09/13/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -28,11 +28,12 @@ After system-preferred MFA is enabled, the authentication system does all the wo
2828
>[!NOTE]
2929
>System-preferred MFA is an important security enhancement for users authenticating by using telecom transports. Starting July 07, 2023, the Microsoft managed value of system-preferred MFA will change from **Disabled** to **Enabled**. If you don't want to enable system-preferred MFA, change the state from **Default** to **Disabled**, or exclude users and groups from the policy.
3030
31-
## Enable system-preferred MFA in the Azure portal
31+
## Enable system-preferred MFA in the Microsoft Entra admin center
3232

3333
By default, system-preferred MFA is Microsoft managed and disabled for all users.
3434

35-
1. In the Azure portal, click **Security** > **Authentication methods** > **Settings**.
35+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
36+
1. Browse to **Protection** > **Authentication methods** > **Settings**.
3637
1. For **System-preferred multifactor authentication**, choose whether to explicitly enable or disable the feature, and include or exclude any users. Excluded groups take precedence over include groups.
3738

3839
For example, the following screenshot shows how to make system-preferred MFA explicitly enabled for only the Engineering group.

0 commit comments

Comments
 (0)