Skip to content

Commit 1884ec3

Browse files
committed
revised portal steps
1 parent 770ffe4 commit 1884ec3

File tree

4 files changed

+23
-22
lines changed

4 files changed

+23
-22
lines changed

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -268,9 +268,10 @@ As mentioned in the confirmation message, it can take several minutes for the mi
268268
You can use Audit logs or Log Analytics to view details of MFA Server to Azure MFA user migrations.
269269

270270
##### Use Audit logs
271-
To access the Audit logs in the Azure portal to view details of MFA Server to Azure MFA user migrations, follow these steps:
271+
To access the Audit logs in the Microsoft Entra admin center to view details of MFA Server to Azure MFA user migrations, follow these steps:
272272

273-
1. Click **Azure Active Directory** > **Audit logs**. To filter the logs, click **Add filters**.
273+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
274+
1. Browse to **Identity** > **Monitoring & health** > **Audit logs**. To filter the logs, click **Add filters**.
274275

275276
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/add-filter.png" alt-text="Screenshot of how to add filters.":::
276277

articles/active-directory/authentication/howto-mfa-server-settings.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
22
title: Configure MFA Server
3-
description: Learn how to configure settings for Azure MFA Server in the Azure portal
3+
description: Learn how to configure settings for Azure MFA Server
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla
14+
ms.reviewer: jpettere
1515

1616
ms.collection: M365-identity-device-management
1717
---
1818
# Configure MFA Server settings
1919

20-
This article helps you to manage Azure MFA Server settings in the Azure portal.
20+
This article helps you to manage Azure MFA Server settings.
2121

2222
> [!IMPORTANT]
2323
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
@@ -39,8 +39,8 @@ The one-time bypass feature allows a user to authenticate a single time without
3939

4040
To create a one-time bypass, complete the following steps:
4141

42-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
43-
1. Search for and select **Azure Active Directory**, then browse to **Security** > **MFA** > **One-time bypass**.
42+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
43+
1. Browse to **Protection** > **Multifactor authentication** > **One-time bypass**.
4444
1. Select **Add**.
4545
1. If necessary, select the replication group for the bypass.
4646
1. Enter the username as `[email protected]`. Enter the number of seconds that the bypass should last and the reason for the bypass.

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -33,17 +33,17 @@ When managing Azure AD Multi-Factor Authentication methods for your users, Authe
3333

3434
## Add authentication methods for a user
3535

36-
You can add authentication methods for a user via the Azure portal or Microsoft Graph.
36+
You can add authentication methods for a user by using the Microsoft Entra admin center or Microsoft Graph.
3737

3838
> [!NOTE]
3939
> For security reasons, public user contact information fields should not be used to perform MFA. Instead, users should populate their authentication method numbers to be used for MFA.
4040
41-
:::image type="content" source="media/howto-mfa-userdevicesettings/add-authentication-method-detail.png" alt-text="Add authentication methods from the Azure portal":::
41+
:::image type="content" source="media/howto-mfa-userdevicesettings/add-authentication-method-detail.png" alt-text="Add authentication methods from the Microsoft Entra admin center":::
4242

43-
To add authentication methods for a user via the Azure portal:
43+
To add authentication methods for a user in the Microsoft Entra admin center:
4444

45-
1. Sign into the **Azure portal**.
46-
1. Browse to **Azure Active Directory** > **Users** > **All users**.
45+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
46+
1. Browse to **Identity** > **Users** > **All users**.
4747
1. Choose the user for whom you wish to add an authentication method and select **Authentication methods**.
4848
1. At the top of the window, select **+ Add authentication method**.
4949
1. Select a method (phone number or email). Email may be used for self-password reset but not authentication. When adding a phone number, select a phone type and enter phone number with valid format (e.g. +1 4255551234).
@@ -88,26 +88,26 @@ Authentication methods can also be managed using Microsoft Graph APIs. For more
8888

8989
If you're assigned the *Authentication Administrator* role, you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object. To manage user settings, complete the following steps:
9090

91-
1. Sign in to the [Azure portal](https://portal.azure.com).
92-
1. On the left, select **Azure Active Directory** > **Users** > **All users**.
91+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
92+
1. Browse to **Identity** > **Users** > **All users**.
9393
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
9494
- **Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
9595
- **Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
9696
> [!NOTE]
9797
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
9898
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
9999

100-
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Azure portal":::
100+
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Microsoft Entra admin center":::
101101

102102
## Delete users' existing app passwords
103103

104104
For users that have defined app passwords, administrators can also choose to delete these passwords, causing legacy authentication to fail in those applications. These actions may be necessary if you need to provide assistance to a user, or need to reset their authentication methods. Non-browser apps that were associated with these app passwords will stop working until a new app password is created.
105105

106106
To delete a user's app passwords, complete the following steps:
107107

108-
1. Sign in to the [Azure portal](https://portal.azure.com).
109-
1. On the left-hand side, select **Azure Active Directory** > **Users** > **All users**.
110-
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
108+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
109+
1. Browse to **Identity** > **Users** > **All users**.
110+
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full window and menu location:
111111
[![Select Multi-Factor Authentication from the Users window in Azure AD.](media/howto-mfa-userstates/selectmfa-cropped.png)](media/howto-mfa-userstates/selectmfa.png#lightbox)
112112
1. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
113113
1. Select **Manage user settings**, then check the box for **Delete all existing app passwords generated by the selected users**, as shown in the following example:

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,10 +53,10 @@ All users start out *Disabled*. When you enroll users in per-user Azure AD Multi
5353

5454
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
5555

56-
To view and manage user states, complete the following steps to access the Azure portal page:
56+
To view and manage user states, complete the following steps:
5757

58-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global administrator.
59-
1. Search for and select **Azure Active Directory**, then select **Users** > **All users**.
58+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
59+
1. Browse to **Identity** > **Users** > **All users**.
6060
1. Select **Per-user MFA**.
6161
:::image type="content" border="true" source="media/howto-mfa-userstates/selectmfa-cropped.png" alt-text="Screenshot of select Multi-Factor Authentication from the Users window in Azure AD.":::
6262
1. A new page opens that displays the user state, as shown in the following example.

0 commit comments

Comments
 (0)