You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To enable the certificate-based authentication in the Azure Portal, complete the following steps:
112
+
113
+
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Authentication Policy Administrator.
114
+
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
115
+
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
116
+
1. Under **Basics**, select **Yes** to enable CBA.
117
+
1. CBA can be enabled for a targeted set of users.
118
+
1. Click **All users** to enable all users.
119
+
1. Click **Select users** to enable selected users or groups.
120
+
1. Click **+ Add users**, select specific users and groups.
121
+
1. Click **Select** to add them.
122
+
123
+
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::
124
+
125
+
Once certificate-based authentication is enabled on the tenant, all users in the tenant will see the option to sign in with a certificate. Only users who are enabled for certificate-based authentication will be able to authenticate using the X.509 certificate.
126
+
127
+
>[!NOTE]
128
+
>The network administrator should allow access to certauth endpoint for the customer’s cloud environment in addition to login.microsoftonline.com. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
The authentication binding policy helps determine the strength of authentication to either a single factor or multi factor. An admin can change the default value from single-factor to multifactor and configure custom policy rules by mapping to issuer Subject or policy OID fields in the certificate.
113
134
@@ -154,7 +175,7 @@ To enable the certificate-based authentication and configure user bindings in th
154
175
155
176
1. Click **Ok** to save any custom rule.
156
177
157
-
## Step 3: Configure username binding policy
178
+
## Step 4: Configure username binding policy
158
179
159
180
The username binding policy helps determine the user in the tenant. By default, we map Principal Name in the certificate to onPremisesUserPrincipalName in the user object to determine the user.
160
181
@@ -187,27 +208,6 @@ The final configuration will look like this image:
187
208
188
209
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/final.png" alt-text="Screenshot of the final configuration.":::
189
210
190
-
## Step 4: Enable CBA on the tenant
191
-
192
-
To enable the certificate-based authentication in the Azure MyApps portal, complete the following steps:
193
-
194
-
1. Sign in to the [MyApps portal](https://myapps.microsoft.com/) as an Authentication Policy Administrator.
195
-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
196
-
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
197
-
1. Under **Basics**, select **Yes** to enable CBA.
198
-
1. CBA can be enabled for a targeted set of users.
199
-
1. Click **All users** to enable all users.
200
-
1. Click **Select users** to enable selected users or groups.
201
-
1. Click **+ Add users**, select specific users and groups.
202
-
1. Click **Select** to add them.
203
-
204
-
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::
205
-
206
-
Once certificate-based authentication is enabled on the tenant, all users in the tenant will see the option to sign in with a certificate. Only users who are enabled for certificate-based authentication will be able to authenticate using the X.509 certificate.
207
-
208
-
>[!NOTE]
209
-
>The network administrator should allow access to certauth endpoint for the customer’s cloud environment in addition to login.microsoftonline.com. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
210
-
211
211
## Step 5: Test your configuration
212
212
213
213
This section covers how to test your certificate and custom authentication binding rules.
0 commit comments