You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-mfasettings.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,7 +90,7 @@ The following fraud alert configuration options are available:
90
90
91
91
To enable and configure fraud alerts, complete the following steps:
92
92
93
-
1.Browse to **Azure Active Directory** > **Security** > **MFA** > **Fraud alert**.
93
+
1.Go to **Azure Active Directory** > **Security** > **MFA** > **Fraud alert**.
94
94
1. Set **Allow users to submit fraud alerts** to **On**.
95
95
1. Configure the **Automatically block users who report fraud** or **Code to report fraud during initial greeting** setting as needed.
96
96
1. Select **Save**.
@@ -171,17 +171,17 @@ Before you begin, be aware of the following restrictions:
171
171
172
172
* The supported file formats are .wav and .mp3.
173
173
* The file size limit is 1 MB.
174
-
* Authentication messages should be shorter than 20 seconds. Messages that are longer than 20 seconds can cause the verification to fail. The user might not respond before the message finishes and the verification times out.
174
+
* Authentication messages should be shorter than 20 seconds. Messages that are longer than 20 seconds can cause the verification to fail. If the user doesn't respond before the message finishes, the verification times out.
175
175
176
176
### Custom message language behavior
177
177
178
178
When a custom voice message is played to the user, the language of the message depends on the following factors:
179
179
180
-
* The language of the current user.
180
+
* The language of the user.
181
181
* The language detected by the user's browser.
182
182
* Other authentication scenarios might behave differently.
183
183
* The language of any available custom messages.
184
-
* This language is chosen by the administrator, when a custom message is added.
184
+
* This language is chosen by the administrator when a custom message is added.
185
185
186
186
For example, if there's only one custom message, and it's in German:
187
187
@@ -190,7 +190,7 @@ For example, if there's only one custom message, and it's in German:
190
190
191
191
### Custom voice message defaults
192
192
193
-
You can use the following sample scripts to create your own custom messages. These phrases are the defaults if you don't configure your own custom messages:
193
+
You can use the following sample scripts to create your own custom messages. These phrases are the defaults if you don't configure your own custom messages.
194
194
195
195
| Message name | Script |
196
196
| --- | --- |
@@ -203,9 +203,9 @@ You can use the following sample scripts to create your own custom messages. The
| Retry (standard) | Thank you for using the Microsoft sign-in verification system. Please press the pound key to finish your verification. |
205
205
| Greeting (standard) | Thank you for using the Microsoft sign-in verification system. Please press the pound key to finish your verification. |
206
-
| Greeting (PIN) | Thank you for using Microsoft sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. |
206
+
| Greeting (PIN) | Thank you for using Microsoft's sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. |
207
207
| Fraud greeting (PIN) | Thank you for using Microsoft's sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. If you did not initiate this verification, someone may be trying to access your account. Please press zero pound to submit a fraud alert. This will notify your company's IT team and block further verification attempts. |
208
-
| Retry(PIN) | Thank you for using Microsoft's sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. |
208
+
| Retry(PIN) | Thank you for using Microsoft's sign-in verification system. Please enter your PIN followed by the pound key to finish your verification. |
209
209
| Extension prompt after digits | If already at this extension, press the pound key to continue. |
210
210
| Authentication denied | I'm sorry, we cannot sign you in at this time. Please try again later. |
211
211
| Activation greeting (standard) | Thank you for using the Microsoft sign-in verification system. Please press the pound key to finish your verification. |
@@ -226,7 +226,7 @@ To use your own custom messages, complete the following steps:
226
226
227
227
## Multi-factor authentication service settings
228
228
229
-
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure portal.
229
+
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure AD portal.
230
230
231
231
You can access service settings from the Azure portal by going to **Azure Active Directory** > **Security** > **MFA** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**. A window or tab opens with additional service settings options.
232
232
@@ -248,21 +248,21 @@ If your organization uses the NPS extension to provide multi-factor authenticati
248
248
249
249
Trusted IP bypass works only from inside the company intranet. If you select the **All Federated Users** option and a user signs in from outside the company intranet, the user has to authenticate by using multi-factor authentication. The process is the same even if the user presents an AD FS claim.
250
250
251
-
#### End-user experience inside the corporate network
251
+
#### User experience inside the corporate network
252
252
253
253
When the trusted IPs feature is disabled, multi-factor authentication is required for browser flows. App passwords are required for older rich-client applications.
254
254
255
255
When trusted IPs are used, multi-factor authentication isn't required for browser flows. App passwords aren't required for older rich-client applications if the user hasn't created an app password. After an app password is in use, the password is required.
256
256
257
-
#### End-user experience outside the corporate network
257
+
#### User experience outside the corporate network
258
258
259
259
Regardless of whether trusted IP are defined, multi-factor authentication is required for browser flows. App passwords are required for older rich-client applications.
260
260
261
261
#### Enable named locations by using Conditional Access
262
262
263
263
You can use Conditional Access rules to define named locations by using the following steps:
264
264
265
-
1. In the Azure portal, search for and select **Azure Active Directory**, and then browse to **Security** > **Conditional Access** > **Named locations**.
265
+
1. In the Azure portal, search for and select **Azure Active Directory**, and then go to **Security** > **Conditional Access** > **Named locations**.
266
266
1. Select **New location**.
267
267
1. Enter a name for the location.
268
268
1. Select **Mark as trusted location**.
@@ -273,17 +273,17 @@ You can use Conditional Access rules to define named locations by using the foll
273
273
274
274
To enable trusted IPs by using Conditional Access policies, complete the following steps:
275
275
276
-
1. In the Azure portal, search for and select **Azure Active Directory**, and then browse to **Security** > **Conditional Access** > **Named locations**.
276
+
1. In the Azure portal, search for and select **Azure Active Directory**, and then go to **Security** > **Conditional Access** > **Named locations**.
277
277
1. Select **Configure MFA trusted IPs**.
278
278
1. On the **Service Settings** page, under **Trusted IPs**, choose one of these options:
279
279
280
-
***For requests from federated users originating from my intranet**: To choose this option, select the check box. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
280
+
***For requests from federated users originating from my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
***For requests from a specific range of public IPs**: To choose this option, enter the IP addresses in the text box, in CIDR notation.
285
-
* For IP addresses that are in the range xxx.xxx.xxx.1 through xxx.xxx.xxx.254, use notation like **xxx.xxx.xxx.0/24**.
286
-
* For a single IP address, use notation like **xxx.xxx.xxx.xxx/32**.
285
+
* For IP addresses that are in the range *xxx.xxx.xxx*.1 through *xxx.xxx.xxx*.254, use notation like ***xxx.xxx.xxx*.0/24**.
286
+
* For a single IP address, use notation like ***xxx.xxx.xxx.xxx*/32**.
287
287
* Enter up to 50 IP address ranges. Users who sign in from these IP addresses bypass multi-factor authentication.
288
288
289
289
1. Select **Save**.
@@ -297,7 +297,7 @@ If you don't want to use Conditional Access policies to enable trusted IPs, you
297
297
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
298
298
1. On the **service settings** page, under **Trusted IPs**, choose one or both of the following options:
299
299
300
-
***For requests from federated users on my intranet**: To choose this option, select the check box. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
300
+
***For requests from federated users on my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
@@ -321,7 +321,7 @@ The following verification methods are available:
321
321
| Notification through mobile app |Sends a push notification to the user's phone or registered device. The user views the notification and selects **Verify** to complete verification. The Microsoft Authenticator app is available for [Windows Phone](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6), [Android](https://go.microsoft.com/fwlink/?Linkid=825072), and [iOS](https://go.microsoft.com/fwlink/?Linkid=825073). |
322
322
| Verification code from mobile app or hardware token |The Microsoft Authenticator app generates a new OATH verification code every 30 seconds. The user enters the verification code into the sign-in interface. The Microsoft Authenticator app is available for [Windows Phone](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6), [Android](https://go.microsoft.com/fwlink/?Linkid=825072), and [iOS](https://go.microsoft.com/fwlink/?Linkid=825073). |
323
323
324
-
For more information, see [What authentication and verification methods are available in Azure AD?](concept-authentication-methods.md)
324
+
For more information, see [What authentication and verification methods are available in Azure AD?](concept-authentication-methods.md).
325
325
326
326
#### Enable and disable verification methods
327
327
@@ -338,7 +338,7 @@ To enable or disable verification methods, complete the following steps:
338
338
The **remember multi-factor authentication** feature lets users bypass subsequent verifications for a specified number of days, after they've successfully signed in to a device by using multi-factor authentication. To enhance usability and minimize the number of times a user has to perform multi-factor authentication on a given device, select a duration of 90 days or more.
339
339
340
340
> [!IMPORTANT]
341
-
> If an account or device is compromised, remembering multi-factor authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke multi-factor authentication sessions](howto-mfa-userdevicesettings.md).
341
+
> If an account or device is compromised, remembering multi-factor authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke MFA Sessions](howto-mfa-userdevicesettings.md).
342
342
>
343
343
> The revoke action revokes the trusted status from all devices, and the user is required to perform multi-factor authentication again. You can also instruct your users to restore the original multi-factor authentication status on their own devices as noted in [Manage your settings for multi-factor authentication](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7#turn-on-two-factor-verification-prompts-on-a-trusted-device).
344
344
@@ -375,4 +375,4 @@ After you enable the **remember multi-factor authentication** feature, users can
375
375
376
376
## Next steps
377
377
378
-
To learn more about the available methods in Azure AD Multi-Factor Authentication, see [What authentication and verification methods are available in Azure Active Directory?](concept-authentication-methods.md)
378
+
To learn more, see [What authentication and verification methods are available in Azure Active Directory?](concept-authentication-methods.md)
0 commit comments