You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.custom: has-azure-ad-ps-ref
9
9
ms.topic: conceptual
10
-
ms.date: 08/31/2023
10
+
ms.date: 09/14/2023
11
11
12
12
ms.author: justinha
13
13
author: justinha
@@ -105,21 +105,21 @@ Under each sign-in log, go to the **Authentication Details** tab and explore **S
105
105
106
106
To configure or review the *Remain signed-in* option, complete the following steps:
107
107
108
-
1.In the Azure portal, search for and select *Azure Active Directory*.
109
-
1.Select**Company Branding**, then for each locale, choose **Show option to remain signed in**.
108
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
109
+
1.Browse to **Identity** >**Company Branding**, then for each locale, choose **Show option to remain signed in**.
110
110
1. Choose *Yes*, then select **Save**.
111
111
112
112
To remember multifactor authentication settings on trusted devices, complete the following steps:
113
113
114
-
1.In the Azure portal, search for and select *Azure Active Directory*.
115
-
1.Select **Security**, then **MFA**.
114
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
115
+
1.Browse to **Protection** > then **Multifactor authentication**.
116
116
1. Under **Configure**, select **Additional cloud-based MFA settings**.
117
117
1. In the *Multi-factor authentication service settings* page, scroll to **remember multi-factor authentication settings**. Disable the setting by unchecking the checkbox.
118
118
119
119
To configure Conditional Access policies for sign-in frequency and persistent browser session, complete the following steps:
120
120
121
-
1.In the Azure portal, search for and select *Azure Active Directory*.
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
122
+
1.Browse to **Protection** >**Conditional Access**.
123
123
1. Configure a policy using the recommended session management options detailed in this article.
124
124
125
125
To review token lifetimes, [use Azure AD PowerShell to query any Azure AD policies](../develop/configure-token-lifetimes.md#get-started). Disable any policies that you have in place.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/passwords-faq.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ sections:
45
45
- question: |
46
46
Can I define password reset data on behalf of my users?
47
47
answer: |
48
-
> Yes, you can do so with Azure AD Connect, PowerShell, the [Azure portal](https://portal.azure.com), or the [Microsoft 365 admin center](https://admin.microsoft.com). For more information, see [Data used by Azure AD self-service password reset](howto-sspr-authenticationdata.md).
48
+
> Yes, you can do so with Azure AD Connect, PowerShell, the [Microsoft Entra admin center](https://entra.microsoft.com), or the [Microsoft 365 admin center](https://admin.microsoft.com). For more information, see [Data used by Azure AD self-service password reset](howto-sspr-authenticationdata.md).
49
49
>
50
50
>
51
51
- question: |
@@ -81,7 +81,7 @@ sections:
81
81
- question: |
82
82
When is a user considered registered?
83
83
answer: |
84
-
> A user is considered registered for SSPR when they have registered at least the **Number of methods required to reset** a password that you have set in the [Azure portal](https://portal.azure.com).
84
+
> A user is considered registered for SSPR when they have registered at least the **Number of methods required to reset** a password that you have set in the [Microsoft Entra admin center](https://entra.microsoft.com).
85
85
>
86
86
>
87
87
@@ -155,7 +155,7 @@ sections:
155
155
- question: |
156
156
How many questions can I configure for the security questions authentication option?
157
157
answer: |
158
-
> You can configure up to 20 custom security questions in the [Azure portal](https://portal.azure.com).
158
+
> You can configure up to 20 custom security questions in the [Microsoft Entra admin center](https://entra.microsoft.com).
0 commit comments