Skip to content

Commit 2f69a26

Browse files
Merge pull request #251587 from Justinha/steps-auth-13
fixed portal steps
2 parents 72c70a3 + a80110e commit 2f69a26

File tree

4 files changed

+32
-32
lines changed

4 files changed

+32
-32
lines changed

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
10-
ms.date: 08/31/2023
10+
ms.date: 09/14/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -105,21 +105,21 @@ Under each sign-in log, go to the **Authentication Details** tab and explore **S
105105

106106
To configure or review the *Remain signed-in* option, complete the following steps:
107107

108-
1. In the Azure portal, search for and select *Azure Active Directory*.
109-
1. Select **Company Branding**, then for each locale, choose **Show option to remain signed in**.
108+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
109+
1. Browse to **Identity** > **Company Branding**, then for each locale, choose **Show option to remain signed in**.
110110
1. Choose *Yes*, then select **Save**.
111111

112112
To remember multifactor authentication settings on trusted devices, complete the following steps:
113113

114-
1. In the Azure portal, search for and select *Azure Active Directory*.
115-
1. Select **Security**, then **MFA**.
114+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
115+
1. Browse to **Protection** > then **Multifactor authentication**.
116116
1. Under **Configure**, select **Additional cloud-based MFA settings**.
117117
1. In the *Multi-factor authentication service settings* page, scroll to **remember multi-factor authentication settings**. Disable the setting by unchecking the checkbox.
118118

119119
To configure Conditional Access policies for sign-in frequency and persistent browser session, complete the following steps:
120120

121-
1. In the Azure portal, search for and select *Azure Active Directory*.
122-
1. Select **Security**, then **Conditional Access**.
121+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
122+
1. Browse to **Protection** > **Conditional Access**.
123123
1. Configure a policy using the recommended session management options detailed in this article.
124124

125125
To review token lifetimes, [use Azure AD PowerShell to query any Azure AD policies](../develop/configure-token-lifetimes.md#get-started). Disable any policies that you have in place.

articles/active-directory/authentication/multi-factor-authentication-faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: faq
10-
ms.date: 04/03/2023
10+
ms.date: 09/13/2023
1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
@@ -233,7 +233,7 @@ sections:
233233
answer: |
234234
Ask the user to complete the following procedure to remove their account from the Microsoft Authenticator, then add it again:
235235
236-
1. Go to [their Azure portal profile](https://account.activedirectory.windowsazure.com/profile/) and sign in with an organizational account.
236+
1. Go to [their account profile](https://account.activedirectory.windowsazure.com/profile/) and sign in with an organizational account.
237237
2. Select **Additional Security Verification**.
238238
3. Remove the existing account from the Microsoft Authenticator app.
239239
4. Click **Configure**, and then follow the instructions to reconfigure the Microsoft Authenticator.

articles/active-directory/authentication/passwords-faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ sections:
4545
- question: |
4646
Can I define password reset data on behalf of my users?
4747
answer: |
48-
> Yes, you can do so with Azure AD Connect, PowerShell, the [Azure portal](https://portal.azure.com), or the [Microsoft 365 admin center](https://admin.microsoft.com). For more information, see [Data used by Azure AD self-service password reset](howto-sspr-authenticationdata.md).
48+
> Yes, you can do so with Azure AD Connect, PowerShell, the [Microsoft Entra admin center](https://entra.microsoft.com), or the [Microsoft 365 admin center](https://admin.microsoft.com). For more information, see [Data used by Azure AD self-service password reset](howto-sspr-authenticationdata.md).
4949
>
5050
>
5151
- question: |
@@ -81,7 +81,7 @@ sections:
8181
- question: |
8282
When is a user considered registered?
8383
answer: |
84-
> A user is considered registered for SSPR when they have registered at least the **Number of methods required to reset** a password that you have set in the [Azure portal](https://portal.azure.com).
84+
> A user is considered registered for SSPR when they have registered at least the **Number of methods required to reset** a password that you have set in the [Microsoft Entra admin center](https://entra.microsoft.com).
8585
>
8686
>
8787
@@ -155,7 +155,7 @@ sections:
155155
- question: |
156156
How many questions can I configure for the security questions authentication option?
157157
answer: |
158-
> You can configure up to 20 custom security questions in the [Azure portal](https://portal.azure.com).
158+
> You can configure up to 20 custom security questions in the [Microsoft Entra admin center](https://entra.microsoft.com).
159159
>
160160
>
161161
- question: |

0 commit comments

Comments
 (0)