Skip to content

Commit 277ff73

Browse files
committed
revised portal references
1 parent d559a1e commit 277ff73

8 files changed

+19
-19
lines changed

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ metadata:
88
ms.subservice: authentication
99
ms.custom: has-azure-ad-ps-ref
1010
ms.topic: faq
11-
ms.date: 02/21/2023
11+
ms.date: 09/23/2023
1212
ms.author: justinha
1313
author: justinha
1414
manager: amycolannino
@@ -36,9 +36,9 @@ sections:
3636
3737
- question: |
3838
How can an administrator enable Azure AD CBA?
39-
answer: |
40-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
41-
2. Select **Azure Active Directory** > **Security** > **Authentication methods** > **Policies**.
39+
answer: |
40+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
41+
2. Browse to **Protection** > **Authentication methods** > **Policies**.
4242
3. Select policy: **Certificate-based Authentication**.
4343
4. On the **Enable and Target** tab, select the **Enable** toggle to enable certificate-based authentication.
4444

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/21/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -66,7 +66,7 @@ Consistent with the guidelines outlined in [NIST SP 800-63B](https://pages.nist.
6666

6767
FIPS 140 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140 standard is maintained by the [Cryptographic Module Validation Program (CMVP)](https://csrc.nist.gov/Projects/cryptographic-module-validation-program?azure-portal=true).
6868

69-
No changes in configurations are required in Microsoft Authenticator or the Azure portal to enable FIPS 140 compliance. Beginning with Microsoft Authenticator for iOS version 6.6.8, Azure AD authentications will be FIPS 140 compliant by default.
69+
No changes in configurations are required in Microsoft Authenticator or the Microsoft Entra admin center to enable FIPS 140 compliance. Beginning with Microsoft Authenticator for iOS version 6.6.8, Azure AD authentications will be FIPS 140 compliant by default.
7070

7171
Authenticator leverages the native Apple cryptography to achieve FIPS 140, Security Level 1 compliance on Apple iOS devices beginning with Microsoft Authenticator version 6.6.8. For more information about the certifications being used, see the [Apple CoreCrypto module](https://support.apple.com/guide/sccc/security-certifications-for-ios-scccfa917cb49/web?azure-portal=true)
7272

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/16/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -27,7 +27,7 @@ For example, in response to increasing MFA fatigue attacks, Microsoft recommende
2727

2828
There are two ways for protection of a security feature to be enabled by default:
2929

30-
- After a security feature is released, customers can use the Azure portal or Graph API to test and roll out the change on their own schedule. To help defend against new attack vectors, Azure AD may enable protection of a security feature by default for all tenants on a certain date, and there won't be an option to disable protection. Microsoft schedules default protection far in advance to give customers time to prepare for the change. Customers can't opt out if Microsoft schedules protection by default.
30+
- After a security feature is released, customers can use the Microsoft Entra admin center or Graph API to test and roll out the change on their own schedule. To help defend against new attack vectors, Azure AD may enable protection of a security feature by default for all tenants on a certain date, and there won't be an option to disable protection. Microsoft schedules default protection far in advance to give customers time to prepare for the change. Customers can't opt out if Microsoft schedules protection by default.
3131
- Protection can be **Microsoft managed**, which means Azure AD can enable or disable protection based upon the current landscape of security threats. Customers can choose whether to allow Microsoft to manage the protection. They can change from **Microsoft managed** to explicitly make the protection **Enabled** or **Disabled** at any time.
3232

3333
>[!NOTE]

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The following table outlines when an authentication method can be used during a
7878

7979
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work successfully.
8080
81-
All of these authentication methods can be configured in the Azure portal, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
81+
All of these authentication methods can be configured in the Microsoft Entra admin center, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
8282

8383
To learn more about how each authentication method works, see the following separate conceptual articles:
8484

@@ -103,7 +103,7 @@ The following additional verification methods can be used in certain scenarios:
103103

104104
## Usable and non-usable methods
105105

106-
Administrators can view user authentication methods in the Azure portal. Usable methods are listed first, followed by non-usable methods.
106+
Administrators can view user authentication methods in the Microsoft Entra admin center. Usable methods are listed first, followed by non-usable methods.
107107

108108
Each authentication method can become non-usable for different reasons. For example, a Temporary Access Pass may expire, or FIDO2 security key may fail attestation. The portal will be updated to provide the reason for why the method is non-usable.
109109

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/13/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -54,7 +54,7 @@ [email protected],1234567,2234567abcdef2234567abcdef,60,Contoso,HardwareKey
5454
> [!NOTE]
5555
> Make sure you include the header row in your CSV file.
5656
57-
Once properly formatted as a CSV file, a Global Administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the resulting CSV file.
57+
Once properly formatted as a CSV file, a Global Administrator can then sign in to the Microsoft Entra admin center, navigate to **Protection** > **Multifactor authentication** > **OATH tokens**, and upload the resulting CSV file.
5858

5959
Depending on the size of the CSV file, it may take a few minutes to process. Select the **Refresh** button to get the current status. If there are any errors in the file, you can download a CSV file that lists any errors for you to resolve. The field names in the downloaded CSV file are different than the uploaded version.
6060

articles/active-directory/authentication/concept-authentication-operator-assistance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/27/2022
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: rckyplln
@@ -27,7 +27,7 @@ For example, let's say a customer in U.S has an office phone number 425-555-1234
2727

2828
If the setting is **Off**, the system will automatically dial extensions as part of the phone number. Your admin can still specify individual users who should be enabled for operator assistance by prefixing the extension with ‘@’. For example, 425-555-1234x@5678 would indicate that operator assistance should be used, even though the setting is **Off**.
2929

30-
You can check the status of this feature in your own tenant by navigating to the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade), then in the left pane, click **Security** > **MFA** > **Phone call settings**. Check **Operator required to transfer extensions** to see if the setting is **On** or **Off**.
30+
To check the status of this feature in your own tenant, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator), then click **Protection** > **Multifactor authentication** > **Phone call settings**. Check **Operator required to transfer extensions** to see if the setting is **On** or **Off**.
3131

3232
![Screenshot of operator assistance settings](./media/concept-authentication-operator-assistance/settings.png)
3333

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/23/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -32,7 +32,7 @@ For Azure AD Multi-Factor Authentication or SSPR, users can choose to receive a
3232

3333
If users don't want their mobile phone number to be visible in the directory but want to use it for password reset, administrators shouldn't populate the phone number in the directory. Instead, users should populate their **Authentication Phone** at [My Sign-Ins](https://aka.ms/setupsecurityinfo). Administrators can see this information in the user's profile, but it's not published elsewhere.
3434

35-
:::image type="content" source="media/concept-authentication-methods/user-authentication-methods.png" alt-text="Screenshot of the Azure portal that shows authentication methods with a phone number populated":::
35+
:::image type="content" source="media/concept-authentication-methods/user-authentication-methods.png" alt-text="Screenshot of the Microsoft Entra admin center that shows authentication methods with a phone number populated":::
3636

3737
> [!NOTE]
3838
> Phone extensions are supported only for office phones.
@@ -81,7 +81,7 @@ If you have problems with phone authentication for Azure AD, review the followin
8181
* Call forwarded to voicemail.
8282
* Ensure that the user has their phone turned on and that service is available in their area, or use alternate method.
8383
* User is blocked
84-
* Have an Azure AD administrator unblock the user in the Azure portal.
84+
* Have an Azure AD administrator unblock the user in the Microsoft Entra admin center.
8585
* Text messaging platforms like SMS, RCS, or WhatsApp aren't subscribed on the device.
8686
* Have the user change methods or activate a text messaging platform on the device.
8787
* Faulty telecom providers, such as when no phone input is detected, missing DTMF tones issues, blocked caller ID on multiple devices, or blocked text messages across multiple devices.

articles/active-directory/authentication/concept-authentication-security-questions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/02/2020
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -22,7 +22,7 @@ Security questions aren't used as an authentication method during a sign-in even
2222

2323
When users register for SSPR, they're prompted to choose the authentication methods to use. If they choose to use security questions, they pick from a set of questions to prompt for and then provide their own answers.
2424

25-
![Screenshot of the Azure portal that shows authentication methods and options for security questions](media/concept-authentication-methods/security-questions-authentication-method.png)
25+
![Screenshot of the Microsoft Entra admin center that shows authentication methods and options for security questions](media/concept-authentication-methods/security-questions-authentication-method.png)
2626

2727
> [!NOTE]
2828
> Security questions are stored privately and securely on a user object in the directory and can only be answered by users during registration. There's no way for an administrator to read or modify a user's questions or answers.

0 commit comments

Comments
 (0)