Skip to content

Commit 2817b57

Browse files
authored
Update howto-mfa-nps-extension.md
1 parent 87c7417 commit 2817b57

File tree

1 file changed

+19
-9
lines changed

1 file changed

+19
-9
lines changed

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 19 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -157,20 +157,17 @@ There are two factors that affect which authentication methods are available wit
157157

158158
* The password encryption algorithm used between the RADIUS client (VPN, Netscaler server, or other) and the NPS servers.
159159
- **PAP** supports all the authentication methods of Azure AD Multi-Factor Authentication in the cloud: phone call, one-way text message, mobile app notification, OATH hardware tokens, and mobile app verification code.
160-
- **CHAPV2** and **EAP** support phone call and mobile app notification.
161-
162-
> [!NOTE]
163-
> When you deploy the NPS extension, use these factors to evaluate which methods are available for your users. If your RADIUS client supports PAP, but the client UX doesn't have input fields for a verification code, then phone call and mobile app notification are the two supported options.
164-
>
165-
> Also, regardless of the authentication protocol that's used (PAP, CHAP, or EAP), if your MFA method is text-based (SMS, mobile app verification code, or OATH hardware token) and requires the user to enter a code or text in the VPN client UI input field, the authentication might succeed. *But* any RADIUS attributes that are configured in the Network Access Policy are *not* forwarded to the RADIUS client (the Network Access Device, like the VPN gateway). As a result, the VPN client might have more access than you want it to have, or less access or no access.
166-
>
167-
> As a workaround, you can run the [CrpUsernameStuffing script](https://github.com/OneMoreNate/CrpUsernameStuffing) to forward RADIUS attributes that are configured in the Network Access Policy and allow MFA when the user's authentication method requires the use of a One-Time Passcode (OTP), such as SMS, a Microsoft Authenticator passcode, or a hardware FOB.
168-
160+
- **CHAPV2** and **EAP** support phone call and mobile app notification.
169161

170162
* The input methods that the client application (VPN, Netscaler server, or other) can handle. For example, does the VPN client have some means to allow the user to type in a verification code from a text or mobile app?
171163

172164
You can [disable unsupported authentication methods](howto-mfa-mfasettings.md#verification-methods) in Azure.
173165

166+
> [!NOTE]
167+
> Regardless of the authentication protocol that's used (PAP, CHAP, or EAP), if your MFA method is text-based (SMS, mobile app verification code, or OATH hardware token) and requires the user to enter a code or text in the VPN client UI input field, the authentication might succeed. *But* any RADIUS attributes that are configured in the Network Access Policy are *not* forwarded to the RADIUS client (the Network Access Device, like the VPN gateway). As a result, the VPN client might have more access than you want it to have, or less access or no access.
168+
>
169+
> As a workaround, you can run the [CrpUsernameStuffing script](https://github.com/OneMoreNate/CrpUsernameStuffing) to forward RADIUS attributes that are configured in the Network Access Policy and allow MFA when the user's authentication method requires the use of a One-Time Passcode (OTP), such as SMS, a Microsoft Authenticator passcode, or a hardware FOB.
170+
174171
### Register users for MFA
175172

176173
Before you deploy and use the NPS extension, users that are required to perform Azure AD Multi-Factor Authentication need to be registered for MFA. To test the extension as you deploy it, you also need at least one test account that is fully registered for Azure AD Multi-Factor Authentication.
@@ -413,6 +410,19 @@ A VPN server may send repeated requests to the NPS server if the timeout value i
413410

414411
For more information on why you see discarded packets in the NPS server logs, see [RADIUS protocol behavior and the NPS extension](#radius-protocol-behavior-and-the-nps-extension) at the start of this article.
415412

413+
### How do I get Microsoft Authenticator number matching to work with NPS?
414+
Make sure you run the latest version of the NPS extension. NPS extension versions beginning with 1.0.1.40 support number matching.
415+
416+
Because the NPS extension can't show a number, a user who is enabled for number matching will still be prompted to Approve/Deny. However, you can create a registry key that overrides push notifications to ask a user to enter a One-Time Passcode (OTP). The user must have an OTP authentication method registered to see this behavior. Common OTP authentication methods include the OTP available in the Authenticator app, other software tokens, and so on.
417+
418+
If the user doesn't have an OTP method registered, they'll continue to get the Approve/Deny experience. A user with number matching disabled will always see the Approve/Deny experience.
419+
420+
To create the registry key that overrides push notifications:
421+
1. On the NPS Server, open the Registry Editor.
422+
2. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
423+
3. Set the following Key Value Pair: Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP Value = TRUE
424+
4. Restart the NPS Service.
425+
416426
## Managing the TLS/SSL Protocols and Cipher Suites
417427

418428
It's recommended that older and weaker cipher suites be disabled or removed unless required by your organization. Information on how to complete this task can be found in the article, [Managing SSL/TLS Protocols and Cipher Suites for AD FS](/windows-server/identity/ad-fs/operations/manage-ssl-protocols-in-ad-fs)

0 commit comments

Comments
 (0)