You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-temporary-access-pass.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ A Temporary Access Pass is a time-limited passcode that can be configured for si
27
27
28
28
A Temporary Access Pass also makes recovery easier when a user has lost or forgotten their strong authentication factor like a FIDO2 security key or Microsoft Authenticator app, but needs to sign in to register new strong authentication methods.
29
29
30
-
This article shows you how to enable and use a Temporary Access Pass in Azure AD using the the [Microsoft Entra admin center](https://entra.microsoft.com).
30
+
This article shows you how to enable and use a Temporary Access Pass using the the [Microsoft Entra admin center](https://entra.microsoft.com).
31
31
You can also perform these actions using the REST APIs.
32
32
33
33
## Enable the Temporary Access Pass policy
@@ -119,7 +119,7 @@ The most common use for a Temporary Access Pass is for a user to register authen
119
119
1. Open a web browser to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo).
120
120
1. Enter the UPN of the account you created the Temporary Access Pass for, such as *[email protected]*.
121
121
1. If the user is included in the Temporary Access Pass policy, they see a screen to enter their Temporary Access Pass.
122
-
1. Enter the Temporary Access Pass that was displayed in the Azure portal.
122
+
1. Enter the Temporary Access Pass that was displayed in the Microsoft Entra admin center.
123
123
124
124
:::image type="content" border="true" source="./media/how-to-authentication-temporary-access-pass/enter.png" alt-text="Screenshot of how to enter a Temporary Access Pass.":::
125
125
@@ -171,7 +171,8 @@ The token lifetime (session token, refresh token, access token, and so on) obtai
171
171
172
172
Under the **Authentication methods** for a user, the **Detail** column shows when the Temporary Access Pass expired. You can delete an expired Temporary Access Pass using the following steps:
173
173
174
-
1. In the Azure portal, browse to **Users**, select a user, such as *Tap User*, then choose **Authentication methods**.
174
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
175
+
1. Browse to **Identity** > **Users**, select a user, such as *Tap User*, then choose **Authentication methods**.
175
176
1. On the right-hand side of the **Temporary Access Pass** authentication method shown in the list, select **Delete**.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-getstarted.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,9 +74,9 @@ Azure AD Multi-Factor Authentication is enforced with Conditional Access policie
74
74
75
75

76
76
77
-
In the Azure portal, you configure Conditional Access policies under **Azure Active Directory** > **Security** > **Conditional Access**.
77
+
In the Microsoft Entra admin center, you configure Conditional Access policies under **Protection** > **Conditional Access**.
78
78
79
-
To learn more about creating Conditional Access policies, see [Conditional Access policy to prompt for Azure AD Multi-Factor Authentication when a user signs in to the Azure portal](tutorial-enable-azure-mfa.md). This helps you to:
79
+
To learn more about creating Conditional Access policies, see [Conditional Access policy to prompt for Azure AD Multi-Factor Authentication when a user signs in](tutorial-enable-azure-mfa.md). This helps you to:
80
80
81
81
- Become familiar with the user interface
82
82
- Get a first impression of how Conditional Access works
@@ -183,7 +183,7 @@ As mentioned before, ensure users are registered for more than one MFA method, s
183
183
If the user does not have a backup method available, you can:
184
184
185
185
- Provide them a Temporary Access Pass so that they can manage their own authentication methods. You can also provide a Temporary Access Pass to enable temporary access to resources.
186
-
- Update their methods as an administrator. To do so, select the user in the Azure portal, then select Authentication methods and update their methods.
186
+
- Update their methods as an administrator. To do so, select the user in the Microsoft Entra admin center, then select **Protection** > **Authentication methods** and update their methods.
@@ -32,7 +32,7 @@ The following Azure AD Multi-Factor Authentication settings are available:
32
32
|[Phone call settings](#phone-call-settings)| Configure settings related to phone calls and greetings for cloud and on-premises environments. |
33
33
| Providers | This will show any existing authentication providers that you've associated with your account. Adding new providers is disabled as of September 1, 2018. |
34
34
35
-

35
+

36
36
37
37
## Account lockout (MFA Server only)
38
38
@@ -51,11 +51,11 @@ The following settings are available:
51
51
52
52
To configure account lockout settings, complete these steps:
53
53
54
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
55
-
1.Go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Account lockout**.
54
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
55
+
1.Browse to **Protection** > **Multifactor authentication** > **Account lockout**.
56
56
1. Enter the values for your environment, and then select **Save**.
57
57
58
-

58
+

59
59
60
60
## Block and unblock users
61
61
@@ -89,7 +89,8 @@ Users who report an MFA prompt as suspicious are set to **High User Risk**. Admi
89
89
90
90
To enable **Report suspicious activity** from the Authentication methods **Settings**:
91
91
92
-
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
92
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
93
+
1. Browse to **Protection** > **Authentication Methods** > **Settings**.
93
94
1. Set **Report suspicious activity** to **Enabled**. The feature remains disabled if you choose **Microsoft managed**. For more information about Microsoft managed values, see [Protecting authentication methods in Azure Active Directory](concept-authentication-default-enablement.md).
> Be sure to include the header row in your CSV file.
155
156
156
-
An administrator can sign in to the Azure portal, go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the CSV file.
157
+
An Authentication Policy Administrator can sign in to the [Microsoft Entra admin center](https://entra.microsoft.com), go to **Protection** > **Multifactor authentication** > **OATH tokens**, and upload the CSV file.
157
158
158
159
Depending on the size of the CSV file, it might take a few minutes to process. Select **Refresh** to get the status. If there are any errors in the file, you can download a CSV file that lists them. The field names in the downloaded CSV file are different from those in the uploaded version.
159
160
@@ -280,9 +281,9 @@ To use your own custom messages, complete the following steps:
280
281
281
282
## MFA service settings
282
283
283
-
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure portal.
284
+
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal.
284
285
285
-
You can access service settings from the Azure portal by going to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**. A window or tab opens with additional service settings options.
286
+
You can access service settings from the [Microsoft Entra admin center](https://entra.microsoft.com)by going to **Protection** > **Multifactor authentication** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**. A window or tab opens with additional service settings options.
286
287
287
288
### Trusted IPs
288
289
@@ -319,7 +320,8 @@ Regardless of whether trusted IPs are defined, multi-factor authentication is re
319
320
320
321
You can use Conditional Access rules to define named locations by using the following steps:
321
322
322
-
1. In the Azure portal, search for and select **Azure Active Directory**, and then go to **Security** > **Conditional Access** > **Named locations**.
323
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
324
+
1. Browse to **Protection** > **Conditional Access** > **Named locations**.
323
325
1. Select **New location**.
324
326
1. Enter a name for the location.
325
327
1. Select **Mark as trusted location**.
@@ -330,7 +332,8 @@ You can use Conditional Access rules to define named locations by using the foll
330
332
331
333
To enable trusted IPs by using Conditional Access policies, complete the following steps:
332
334
333
-
1. In the Azure portal, search for and select **Azure Active Directory**, and then go to **Security** > **Conditional Access** > **Named locations**.
335
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
336
+
1. Browse to **Protection** > **Conditional Access** > **Named locations**.
334
337
1. Select **Configure MFA trusted IPs**.
335
338
1. On the **Service Settings** page, under **Trusted IPs**, choose one of these options:
336
339
@@ -349,10 +352,9 @@ To enable trusted IPs by using Conditional Access policies, complete the followi
349
352
350
353
If you don't want to use Conditional Access policies to enable trusted IPs, you can configure the service settings for Azure AD Multi-Factor Authentication by using the following steps:
351
354
352
-
1. In the Azure portal, search for and select **Azure Active Directory**, and then select **Users**.
353
-
1. Select **Per-user MFA**.
354
-
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
355
-
1. On the **service settings** page, under **Trusted IPs**, choose one or both of the following options:
355
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
356
+
1. Browse to **Protection** > **Multifactor authentication** > **Service settings**.
357
+
1. On the **Service settings** page, under **Trusted IPs**, choose one or both of the following options:
356
358
357
359
***For requests from federated users on my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
358
360
@@ -384,10 +386,11 @@ For more information, see [What authentication and verification methods are avai
384
386
385
387
To enable or disable verification methods, complete the following steps:
386
388
387
-
1. In the Azure portal, search for and select **Azure Active Directory**, and then select **Users**.
389
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
390
+
1. Browse to **Identity** > **Users**.
388
391
1. Select **Per-user MFA**.
389
-
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
390
-
1. On the **service settings** page, under **verification options**, select or clear the appropriate checkboxes.
392
+
1. Under **Multifactor authentication** at the top of the page, select **Service settings**.
393
+
1. On the **Service settings** page, under **Verification options**, select or clear the appropriate checkboxes.
391
394
1. Select **Save**.
392
395
393
396
### Remember multi-factor authentication
@@ -420,9 +423,10 @@ The feature reduces the number of authentications on web apps, which normally pr
420
423
421
424
To enable and configure the option to allow users to remember their MFA status and bypass prompts, complete the following steps:
422
425
423
-
1. In the Azure portal, search for and select **Azure Active Directory**, and then select **Users**.
426
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
427
+
1. Browse to **Identity** > **Users**.
424
428
1. Select **Per-user MFA**.
425
-
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
429
+
1. Under **Multifactor authentication** at the top of the page, select **service settings**.
426
430
1. On the **service settings** page, under **remember multi-factor authentication**, select **Allow users to remember multi-factor authentication on devices they trust**.
427
431
1. Set the number of days to allow trusted devices to bypass multi-factor authentications. For the optimal user experience, extend the duration to 90 or more days.
0 commit comments