Skip to content

Commit 285620a

Browse files
Update nist-authenticator-assurance-level-1.md
1 parent eb63c34 commit 285620a

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

articles/active-directory/standards/nist-authenticator-assurance-level-1.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,16 +28,20 @@ Before you begin authenticator assurance level 1 (AAL1), you can review the foll
2828

2929
## Permitted authenticator types
3030

31-
To achieve AAL1, you can use any NIST single-factor or multifactor [permitted authenticator](nist-authenticator-types.md). Note that Password and Phone (SMS) are not covered in [AAL2](nist-authenticator-assurance-level-2.md) or [AAL3](nist-authenticator-assurance-level-2.md).
31+
To achieve AAL1, you can use any NIST single-factor or multifactor [permitted authenticator](nist-authenticator-types.md).
3232

3333
|Azure AD authentication method|NIST authenticator type |
3434
| - | - |
35-
|Password |memorized secret |
36-
|Phone (SMS)|out-of-band |
37-
|FIDO 2 security key <br> Microsoft Authenticator app for iOS (passwordless) <br> Windows Hello for Business with software TPM <br> Smartcard (Active Directory Federation Services) | Multi-factor crypto software |
35+
|Password |Memorized Secret |
36+
|Phone (SMS): Not recommended | Out-of-band |
37+
|Microsoft Authenticator App for iOS (Passwordless) <br> Microsoft Authenticator App for Android (Passwordless)|Multi-factor Out-of-band |
38+
|Single-factor certificate | Single-factor crypto software |
39+
|Multi-factor Software Certificate (PIN Protected) <br> Windows Hello for Business with software TPM <br> | Multi-factor crypto software |
40+
|Windows Hello for Business with hardware TPM <br> Hardware protected certificate (smartcard/security key/TPM) <br> FIDO 2 security key | Multi-factor crypto hardware
41+
3842

3943
> [!TIP]
40-
> We recommend you meet at least AAL2. If necessary, meet AAL3 for business reasons, industry standards, or compliance requirements.
44+
> We recommend you select at a minimum phishing resistant AAL2 authneticators. Select AAL3 authenticators as necessary for business reasons, industry standards, or compliance requirements.
4145
4246
## FIPS 140 validation
4347

0 commit comments

Comments
 (0)