You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-server-migration-utility.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -268,9 +268,10 @@ As mentioned in the confirmation message, it can take several minutes for the mi
268
268
You can use Audit logs or Log Analytics to view details of MFA Server to Azure MFA user migrations.
269
269
270
270
##### Use Audit logs
271
-
To access the Audit logs in the Azure portal to view details of MFA Server to Azure MFA user migrations, follow these steps:
271
+
To access the Audit logs in the Microsoft Entra admin center to view details of MFA Server to Azure MFA user migrations, follow these steps:
272
272
273
-
1. Click **Azure Active Directory** > **Audit logs**. To filter the logs, click **Add filters**.
273
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
274
+
1. Browse to **Identity** > **Monitoring & health** > **Audit logs**. To filter the logs, click **Add filters**.
274
275
275
276
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/add-filter.png" alt-text="Screenshot of how to add filters.":::
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-server-settings.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,23 @@
1
1
---
2
2
title: Configure MFA Server
3
-
description: Learn how to configure settings for Azure MFA Server in the Azure portal
3
+
description: Learn how to configure settings for Azure MFA Server
4
4
5
5
services: multi-factor-authentication
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 01/29/2023
9
+
ms.date: 09/13/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
13
13
manager: amycolannino
14
-
ms.reviewer: michmcla
14
+
ms.reviewer: jpettere
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
18
# Configure MFA Server settings
19
19
20
-
This article helps you to manage Azure MFA Server settings in the Azure portal.
20
+
This article helps you to manage Azure MFA Server settings.
21
21
22
22
> [!IMPORTANT]
23
23
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
@@ -39,8 +39,8 @@ The one-time bypass feature allows a user to authenticate a single time without
39
39
40
40
To create a one-time bypass, complete the following steps:
41
41
42
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
43
-
1.Search for and select **Azure Active Directory**, then browse to **Security** > **MFA** > **One-time bypass**.
42
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
43
+
1.Browse to **Protection** > **Multifactor authentication** > **One-time bypass**.
44
44
1. Select **Add**.
45
45
1. If necessary, select the replication group for the bypass.
46
46
1. Enter the username as `[email protected]`. Enter the number of seconds that the bypass should last and the reason for the bypass.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-userdevicesettings.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,17 +33,17 @@ When managing Azure AD Multi-Factor Authentication methods for your users, Authe
33
33
34
34
## Add authentication methods for a user
35
35
36
-
You can add authentication methods for a user via the Azure portal or Microsoft Graph.
36
+
You can add authentication methods for a user by using the Microsoft Entra admin center or Microsoft Graph.
37
37
38
38
> [!NOTE]
39
39
> For security reasons, public user contact information fields should not be used to perform MFA. Instead, users should populate their authentication method numbers to be used for MFA.
40
40
41
-
:::image type="content" source="media/howto-mfa-userdevicesettings/add-authentication-method-detail.png" alt-text="Add authentication methods from the Azure portal":::
41
+
:::image type="content" source="media/howto-mfa-userdevicesettings/add-authentication-method-detail.png" alt-text="Add authentication methods from the Microsoft Entra admin center":::
42
42
43
-
To add authentication methods for a user via the Azure portal:
43
+
To add authentication methods for a user in the Microsoft Entra admin center:
44
44
45
-
1. Sign into the **Azure portal**.
46
-
1. Browse to **Azure Active Directory** > **Users** > **All users**.
45
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
46
+
1. Browse to **Identity** > **Users** > **All users**.
47
47
1. Choose the user for whom you wish to add an authentication method and select **Authentication methods**.
48
48
1. At the top of the window, select **+ Add authentication method**.
49
49
1. Select a method (phone number or email). Email may be used for self-password reset but not authentication. When adding a phone number, select a phone type and enter phone number with valid format (e.g. +1 4255551234).
@@ -88,26 +88,26 @@ Authentication methods can also be managed using Microsoft Graph APIs. For more
88
88
89
89
If you're assigned the *Authentication Administrator* role, you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object. To manage user settings, complete the following steps:
90
90
91
-
1. Sign in to the [Azure portal](https://portal.azure.com).
92
-
1.On the left, select **Azure Active Directory** > **Users** > **All users**.
91
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
92
+
1.Browse to **Identity** > **Users** > **All users**.
93
93
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
94
94
-**Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
95
95
-**Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
96
96
> [!NOTE]
97
97
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
98
98
-**Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
99
99
100
-
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Azure portal":::
100
+
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Microsoft Entra admin center":::
101
101
102
102
## Delete users' existing app passwords
103
103
104
104
For users that have defined app passwords, administrators can also choose to delete these passwords, causing legacy authentication to fail in those applications. These actions may be necessary if you need to provide assistance to a user, or need to reset their authentication methods. Non-browser apps that were associated with these app passwords will stop working until a new app password is created.
105
105
106
106
To delete a user's app passwords, complete the following steps:
107
107
108
-
1. Sign in to the [Azure portal](https://portal.azure.com).
109
-
1.On the left-hand side, select **Azure Active Directory** > **Users** > **All users**.
110
-
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
108
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
109
+
1.Browse to **Identity** > **Users** > **All users**.
110
+
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full window and menu location:
111
111
[](media/howto-mfa-userstates/selectmfa.png#lightbox)
112
112
1. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
113
113
1. Select **Manage user settings**, then check the box for **Delete all existing app passwords generated by the selected users**, as shown in the following example:
To view and manage user states, complete the following steps to access the Azure portal page:
56
+
To view and manage user states, complete the following steps:
57
57
58
-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global administrator.
59
-
1.Search for and select **Azure Active Directory**, then select**Users** > **All users**.
58
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
59
+
1.Browse to **Identity** >**Users** > **All users**.
60
60
1. Select **Per-user MFA**.
61
61
:::image type="content" border="true" source="media/howto-mfa-userstates/selectmfa-cropped.png" alt-text="Screenshot of select Multi-Factor Authentication from the Users window in Azure AD.":::
62
62
1. A new page opens that displays the user state, as shown in the following example.
0 commit comments