Skip to content

Commit 2586a9c

Browse files
authored
Merge pull request #220812 from Justinha/auth-groups
Auth groups
2 parents d7e0315 + a697402 commit 2586a9c

File tree

4 files changed

+11
-19
lines changed

4 files changed

+11
-19
lines changed

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 10/10/2022
8+
ms.date: 12/07/2022
99

1010
ms.author: justinha
1111
author: vimrang
@@ -135,11 +135,7 @@ To enable the certificate-based authentication in the Azure portal, complete the
135135
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
136136
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
137137
1. Under **Basics**, select **Yes** to enable CBA.
138-
1. CBA can be enabled for a targeted set of users.
139-
1. Click **All users** to enable all users.
140-
1. Click **Select users** to enable selected users or groups.
141-
1. Click **+ Add users**, select specific users and groups.
142-
1. Click **Select** to add them.
138+
1. Click **All users**, or click **Add groups** to select specific groups.
143139

144140
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::
145141

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/12/2021
9+
ms.date: 12/07/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
For enterprises that use passwords today and have a shared PC environment, security keys provide a seamless way for workers to authenticate without entering a username or password. Security keys provide improved productivity for workers, and have better security.
2121

22-
This document focuses on enabling security key based passwordless authentication. At the end of this article, you will be able to sign in to web-based applications with your Azure AD account using a FIDO2 security key.
22+
This document focuses on enabling security key based passwordless authentication. At the end of this article, you'll be able to sign in to web-based applications with your Azure AD account using a FIDO2 security key.
2323

2424
## Requirements
2525

@@ -47,9 +47,7 @@ Registration features for passwordless authentication methods rely on the combin
4747

4848
1. Sign in to the [Azure portal](https://portal.azure.com).
4949
1. Browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Authentication method policy**.
50-
1. Under the method **FIDO2 Security Key**, choose the following options:
51-
1. **Enable** - Yes or No
52-
1. **Target** - All users or Select users
50+
1. Under the method **FIDO2 Security Key**, click **All users**, or click **Add groups** to select specific groups.
5351
1. **Save** the configuration.
5452

5553
>[!NOTE]
@@ -58,13 +56,11 @@ Registration features for passwordless authentication methods rely on the combin
5856

5957
### FIDO Security Key optional settings
6058

61-
There are some optional settings for managing security keys per tenant.
59+
There are some optional settings on the **Configure** tab to help manage how security keys can be used for sign-in.
6260

6361
![Screenshot of FIDO2 security key options](media/howto-authentication-passwordless-security-key/optional-settings.png)
6462

65-
**General**
66-
67-
- **Allow self-service set up** should remain set to **Yes**. If set to no, your users will not be able to register a FIDO key through the MySecurityInfo portal, even if enabled by Authentication Methods policy.
63+
- **Allow self-service set up** should remain set to **Yes**. If set to no, your users won't be able to register a FIDO key through the MySecurityInfo portal, even if enabled by Authentication Methods policy.
6864
- **Enforce attestation** setting to **Yes** requires the FIDO security key metadata to be published and verified with the FIDO Alliance Metadata Service, and also pass Microsoft’s additional set of validation testing. For more information, see [What is a Microsoft-compatible security key?](/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key)
6965

7066
**Key Restriction Policy**
@@ -76,7 +72,7 @@ There are some optional settings for managing security keys per tenant.
7672

7773
To remove a FIDO2 key associated with a user account, delete the key from the user’s authentication method.
7874

79-
1. Login to the Azure AD portal and search for the user account from which the FIDO key is to be removed.
75+
1. Sign in to the Azure AD portal and search for the user account from which the FIDO key is to be removed.
8076
1. Select **Authentication methods** > right-click **FIDO2 security key** and click **Delete**.
8177

8278
![View Authentication Method details](media/howto-authentication-passwordless-deployment/security-key-view-details.png)
@@ -104,7 +100,7 @@ There are two ways to get your AAGUID. You can either ask your security key prov
104100
1. Choose **USB device** or **NFC device**.
105101
1. Have your key ready and choose **Next**.
106102
1. A box will appear and ask the user to create/enter a PIN for your security key, then perform the required gesture for the key, either biometric or touch.
107-
1. The user will be returned to the combined registration experience and asked to provide a meaningful name for the key so the user can identify which one if they have multiple. Click **Next**.
103+
1. The user will be returned to the combined registration experience and asked to provide a meaningful name for the key to identify it easily. Click **Next**.
108104
1. Click **Done** to complete the process.
109105

110106
## Sign in with passwordless credential
@@ -127,12 +123,12 @@ If you'd like to share feedback or encounter issues with this feature, share via
127123

128124
### Security key provisioning
129125

130-
Administrator provisioning and de-provisioning of security keys is not available.
126+
Administrator provisioning and de-provisioning of security keys isn't available.
131127

132128

133129
### UPN changes
134130

135-
If a user's UPN changes, you can no longer modify FIDO2 security keys to account for the change. The solution for a user with a FIDO2 security key is to login to MySecurityInfo, delete the old key, and add a new one.
131+
If a user's UPN changes, you can no longer modify FIDO2 security keys to account for the change. The solution for a user with a FIDO2 security key is to sign in to MySecurityInfo, delete the old key, and add a new one.
136132

137133
## Next steps
138134

-25.1 KB
Loading
-1.13 KB
Loading

0 commit comments

Comments
 (0)