You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# How to use additional context in Microsoft Authenticator app notifications (Preview) - Authentication Methods Policy
15
15
16
-
This topic covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
16
+
This article covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
70
-
|id| String | Object ID of an Azure AD user or group. |
70
+
|ID| String | Object ID of an Azure AD user or group. |
71
71
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>You can only set one group or user for additional context. |
72
72
| displayAppInformationRequiredState | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
Change the **displayAppInformationRequiredState** from **default** to **enabled**.
80
80
81
-
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you do not want to allow passwordless, use **push**.
81
+
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
82
82
83
83
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **displayAppInformationRequiredState**.
84
84
@@ -182,18 +182,24 @@ To turn off additional context, you'll need to PATCH remove **displayAppInformat
182
182
183
183
To enable additional context in the Azure AD portal, complete the following steps:
184
184
185
-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
186
-
1. Select the target users, click the three dots on the right, and click **Configure**.
185
+
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
186
+
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
187
+
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
188
+
1. From the list of available authentication methods, select **Microsoft Authenticator**.
189
+
190
+

191
+
192
+
1. Select the target users, select the three dots on the right, and choose **Configure**.
187
193
188
-

194
+

189
195
190
-
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, click**Enable**, and then click**Done**.
196
+
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, select**Enable**, and then select**Done**.
191
197
192
198

193
199
194
200
## Known issues
195
201
196
-
Additional context is not supported for Network Policy Server (NPS).
202
+
Additional context isn't supported for Network Policy Server (NPS).
# How to use number matching in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
15
15
16
-
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
16
+
This article covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
17
17
18
18
>[!NOTE]
19
19
>Number matching is a key security upgrade to traditional second factor notifications in the Authenticator app that will be enabled by default for all tenants a few months after general availability (GA).<br>
@@ -42,7 +42,7 @@ Number matching is available for the following scenarios. When enabled, all scen
42
42
43
43
### Multifactor authentication
44
44
45
-
When a user responds to an MFA push notification using the Authenticator app, they will be presented with a number. They need to type that number into the app to complete the approval.
45
+
When a user responds to an MFA push notification using the Authenticator app, they'll be presented with a number. They need to type that number into the app to complete the approval.
46
46
47
47

48
48
@@ -71,7 +71,7 @@ Make sure you run the latest version of the [NPS extension](https://www.microsof
71
71
72
72
Because the NPS extension can't show a number, a user who is enabled for number matching will still be prompted to **Approve**/**Deny**. However, you can create a registry key that overrides push notifications to ask a user to enter a One-Time Passcode (OTP). The user must have an OTP authentication method registered to see this behavior. Common OTP authentication methods include the OTP available in the Authenticator app, other software tokens, and so on.
73
73
74
-
If the user doesn't have an OTP method registered, they will continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
74
+
If the user doesn't have an OTP method registered, they'll continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
75
75
76
76
To create the registry key that overrides push notifications:
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
118
-
|id| String | Object ID of an Azure AD user or group. |
119
-
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>Please note: You will be able to only set one group or user for number matching. |
118
+
|ID| String | Object ID of an Azure AD user or group. |
119
+
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>Note: You'll be able to only set one group or user for number matching. |
120
120
| numberMatchingRequiredState | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
121
121
122
122
>[!NOTE]
123
123
>Number matching can only be enabled for a single group.
124
124
125
125
#### Example of how to enable number matching for all users
126
126
127
-
You will need to change the **numberMatchingRequiredState** from **default** to **enabled**.
127
+
You'll need to change the **numberMatchingRequiredState** from **default** to **enabled**.
128
128
129
-
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
129
+
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
130
130
131
131
>[!NOTE]
132
132
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
@@ -157,14 +157,14 @@ You might need to patch the entire includeTarget to prevent overwriting any prev
157
157
158
158
```
159
159
160
-
To confirm this has applied, please run the GET request below using the endpoint below.
160
+
To confirm this update has applied, please run the GET request below using the endpoint below.
161
161
GET - https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
162
162
163
163
164
164
#### Example of how to enable number matching for a single group
165
165
166
-
We will need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
167
-
You will need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
166
+
We'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
167
+
You'll need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
168
168
169
169
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
170
170
@@ -208,7 +208,7 @@ See the end user experience of an Authenticator MFA push notification with numbe
208
208
209
209
### Turn off number matching
210
210
211
-
To turn number matching off, you will need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
211
+
To turn number matching off, you'll need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
212
212
213
213
```json
214
214
{
@@ -235,20 +235,23 @@ To enable number matching in the Azure portal, complete the following steps:
235
235
236
236
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
237
237
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
238
-
1. Under the **Manage** menu header, select **Authentication methods**, then **Policies**.
239
-
1. From the list of policies, select **Microsoft Authenticator**.
240
-
1. Select the target users, click the three dots on the right, and choose **Configure**.
238
+
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
239
+
1. From the list of available authentication methods, select **Microsoft Authenticator**.
240
+
241
+

242
+
243
+
1. Select the target users, select the three dots on the right, and choose **Configure**.
241
244
242
-

245
+

243
246
244
-
1. Select the **Authentication mode**, and then for **Require number matching (Preview)**, click**Enable**, and then click**Done**.
247
+
1. Select the **Authentication mode**, and then for **Require number matching (Preview)**, select**Enable**, and then select**Done**.
245
248
246
-

249
+

247
250
248
251
>[!NOTE]
249
252
>[Least privileged role in Azure Active Directory - Multifactor authentication](../roles/delegate-by-task.md#multi-factor-authentication)
250
253
251
-
Number matching is not supported for Apple Watch notifications. Apple Watch need to use their phone to approve notifications when number matching is enabled.
254
+
Number matching isn't supported for Apple Watch notifications. Apple Watch need to use their phone to approve notifications when number matching is enabled.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-sms-signin.md
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 02/10/2022
9
+
ms.date: 08/08/2022
10
10
ms.author: justinha
11
11
author: justinha
12
12
manager: karenhoran
@@ -45,7 +45,7 @@ Here are some known issues:
45
45
* SMS-based authentication isn't recommended for B2B accounts.
46
46
* Federated users won't authenticate in the home tenant. They only authenticate in the cloud.
47
47
* If a user's default sign-in method is a text or call to your phone number, then the SMS code or voice call is sent automatically during multifactor authentication. As of June 2021, some apps will ask users to choose **Text** or **Call** first. This option prevents sending too many security codes for different apps. If the default sign-in method is the Microsoft Authenticator app ([which we highly recommend](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752)), then the app notification is sent automatically.
48
-
* SMS-based authentication has reached general availability, and we are working to remove the **(Preview)** label in the Azure portal.
48
+
* SMS-based authentication has reached general availability, and we're working to remove the **(Preview)** label in the Azure portal.
49
49
50
50
51
51
## Enable the SMS-based authentication method
@@ -59,14 +59,15 @@ There are three main steps to enable and use SMS-based authentication in your or
59
59
60
60
First, let's enable SMS-based authentication for your Azure AD tenant.
61
61
62
-
1. Sign in to the [Azure portal][azure-portal] as a *global administrator*.
63
-
1. Search for and select **Azure Active Directory**.
64
-
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Security > Authentication methods > Authentication method policy**.
62
+
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
63
+
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
64
+
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
65
+
1. From the list of available authentication methods, select **Text message**.
65
66
66
-
[](media/howto-authentication-sms-signin/authentication-method-policy.png#lightbox)
67
+

67
68
68
-
1. From the list of available authentication methods, select **Text message**.
69
-
1. Set **Enable** to *Yes*.
69
+
70
+
1. Set **Enable** to *Yes*. Then select the **Target users**.
70
71
71
72

72
73
@@ -78,9 +79,6 @@ With SMS-based authentication enabled in your Azure AD tenant, now select some u
78
79
79
80
1. In the text message authentication policy window, set **Target** to *Select users*.
80
81
1. Choose to **Add users or groups**, then select a test user or group, such as *Contoso User* or *Contoso SMS Users*.
81
-
82
-
[](media/howto-authentication-sms-signin/add-users-or-groups.png#lightbox)
83
-
84
82
1. When you've selected your users or groups, choose **Select**, then **Save** the updated authentication method policy.
85
83
86
84
Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Make sure you have the appropriate licenses for the users you enable in the authentication method policy, especially when you enable the feature for large groups of users.
@@ -133,7 +131,7 @@ For a list of apps that support using SMS-based sign-in, see [App support for SM
133
131
134
132
### Phone number already set for a user account
135
133
136
-
If a user has already registered for Azure AD Multi-Factor Authentication and / or self-service password reset (SSPR), they already have a phone number associated with their account. This phone number is not automatically available for use with SMS-based sign-in.
134
+
If a user has already registered for Azure AD Multi-Factor Authentication and / or self-service password reset (SSPR), they already have a phone number associated with their account. This phone number isn't automatically available for use with SMS-based sign-in.
137
135
138
136
A user that has a phone number already set for their account is displayed a button to *Enable for SMS sign-in* in their **My Profile** page. Select this button, and the account is enabled for use with SMS-based sign-in and the previous Azure AD Multi-Factor Authentication or SSPR registration.
139
137
@@ -152,7 +150,7 @@ If you receive an error when you try to set a phone number for a user account in
152
150
## Next steps
153
151
154
152
- For a list of apps that support using SMS-based sign-in, see [App support for SMS-based authentication](how-to-authentication-sms-supported-apps.md).
155
-
- For additional ways to sign in to Azure AD without a password, such as the Microsoft Authenticator App or FIDO2 security keys, see [Passwordless authentication options for Azure AD][concepts-passwordless].
153
+
- For more ways to sign in to Azure AD without a password, such as the Microsoft Authenticator App or FIDO2 security keys, see [Passwordless authentication options for Azure AD][concepts-passwordless].
156
154
- You can also use the Microsoft Graph REST API to [enable][rest-enable] or [disable][rest-disable] SMS-based sign-in.
0 commit comments