You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Microsoft Authenticator can be used to sign in to any Azure AD account without using a password. Microsoft Authenticator uses key-based authentication to enable a user credential that is tied to a device, where the device uses a PIN or biometric. [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-identity-verification) uses a similar technology.
22
23
24
+
23
25
This authentication technology can be used on any device platform, including mobile. This technology can also be used with any app or website that integrates with Microsoft Authentication Libraries.
24
26
25
-
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png" alt-text="Example of a browser sign-in asking for the user to approve the sign-in.":::
27
+
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app-next.png" alt-text="Screenshot that shows an example of a browser sign-in asking for the user to approve the sign-in.":::
26
28
27
29
People who enabled phone sign-in from Microsoft Authenticator see a message that asks them to tap a number in their app. No username or password is asked for. To complete the sign-in process in the app, a user must next take the following actions:
28
30
29
31
1. Enter the number they see on the login screen into Microsoft Authenticator dialog.
30
32
1. Choose **Approve**.
31
33
1. Provide their PIN or biometric.
32
34
33
-
## Prerequisites
35
+
## Multiple accounts on iOS (preview)
34
36
35
-
To use passwordless phone signin with Microsoft Authenticator, the following prerequisites must be met:
37
+
You can enable passwordless phone sign-in for multiple accounts in Microsoft Authenticator on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device.
36
38
37
-
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help Microsoft Authenticator to prevent unauthorized access to accounts and stop fraudulent transactions. Microsoft Authenticator can either perform traditional MFA push notifications to a device that a user must approve or deny, or it can perform passwordless authentication that requires a user to type a matching number. Microsoft Authenticator automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
38
-
- Latest version of Authenticator installed on devices running iOS 8.0 or greater, or Android 6.0 or greater.
39
-
- The device on which Microsoft Authenticator is installed must be registered within the Azure AD tenant to an individual user.
39
+
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
40
40
41
-
> [!NOTE]
42
-
> If you enabled Microsoft Authenticator for passwordless sign-in using Azure AD PowerShell, it was enabled for your entire directory. If you enable using this new method, it supercedes the PowerShell policy. We recommend you enable for all users in your tenant via the new *Authentication Methods* menu, otherwise users not in the new policy are no longer be able to sign in without a password.
41
+
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-in from one device.
42
+
43
+
>[!NOTE]
44
+
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
45
+
46
+
## Prerequisites
47
+
48
+
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
43
49
44
-
## Enable passwordless authentication methods
50
+
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
51
+
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 6.0 or greater.
52
+
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
53
+
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
- For iOS, the option in Microsoft Authenticator to allow Microsoft to gather usage data must be enabled. It's not enabled by default. To enable it in Microsoft Authenticator, go to **Settings** > **Usage Data**.
57
+
58
+
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/telemetry.png" alt-text="Screenshot os Usage Data in Microsoft Authenticator.":::
45
59
46
60
To use passwordless authentication in Azure AD, first enable the combined registration experience, then enable users for the passwordless method.
Azure AD lets you choose which authentication methods can be used during the sign-in process. Users then register for the methods they'd like to use. The **Microsoft Authenticator** authentication method policy manages both the traditional push MFA method, as well as the passwordless authentication method.
51
65
66
+
> [!NOTE]
67
+
> If you enabled Microsoft Authenticator passwordless sign-in using Azure AD PowerShell, it was enabled for your entire directory. If you enable using this new method, it supersedes the PowerShell policy. We recommend you enable for all users in your tenant via the new **Authentication Methods** menu, otherwise users who aren't in the new policy can't sign in without a password.
68
+
52
69
To enable the authentication method for passwordless phone sign-in, complete the following steps:
53
70
54
-
1. Sign in to the [Azure portal](https://portal.azure.com) with an *authentication policy administrator* account.
71
+
1. Sign in to the [Azure portal](https://portal.azure.com) with an *Authentication Policy Administrator* account.
55
72
1. Search for and select *Azure Active Directory*, then browse to **Security** > **Authentication methods** > **Policies**.
56
73
1. Under **Microsoft Authenticator**, choose the following options:
57
74
1.**Enable** - Yes or No
@@ -87,6 +104,7 @@ A user can start to utilize passwordless sign-in after all the following actions
87
104
- An admin has enabled the user's tenant.
88
105
- The user has added Microsoft Authenticator as a sign-in method.
89
106
107
+
90
108
The first time a user starts the phone sign-in process, the user performs the following steps:
91
109
92
110
1. Enters their name at the sign-in page.
@@ -98,7 +116,7 @@ The user is then presented with a number. The app prompts the user to authentica
98
116
99
117
After the user has utilized passwordless phone sign-in, the app continues to guide the user through this method. However, the user will see the option to choose another method.
100
118
101
-
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/web-sign-in-microsoft-authenticator-app.png" alt-text="Example of a browser sign-in using Microsoft Authenticator.":::
119
+
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/number.png" alt-text="Screenshot that shows an example of a browser sign-in using the Microsoft Authenticator app.":::
102
120
103
121
## Known Issues
104
122
@@ -127,14 +145,6 @@ An end user can be enabled for multifactor authentication (MFA) through an on-pr
127
145
128
146
If the user attempts to upgrade multiple installations (5+) of Microsoft Authenticator with the passwordless phone sign-in credential, this change might result in an error.
129
147
130
-
### Device registration
131
-
132
-
Before you can create this new strong credential, there are prerequisites. One prerequisite is that the device on which Microsoft Authenticator is installed must be registered within the Azure AD tenant to an individual user.
133
-
134
-
Currently, a device can only be enabled for passwordless sign-in in a single tenant. This limit means that only one work or school account in Microsoft Authenticator can be enabled for phone sign-in.
135
-
136
-
> [!NOTE]
137
-
> Device registration is not the same as device management or mobile device management (MDM). Device registration only associates a device ID and a user ID together, in the Azure AD directory.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/usage-analytics-users.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,7 +108,7 @@ Filters can be applied in one, two, or all three categories depending on the typ
108
108
109
109
1. From the **Authorization System Type** dropdown, select the authorization system you want to use: **AWS**, **Azure**, or **GCP**.
110
110
1. From the **Authorization System** dropdown, select from a **List** of accounts and **Folders**.
111
-
1. From the **Identity Subtype**, select the type of user: **All**, **ED**, **Local**, or **Cross Account**.
111
+
1. From the **Identity Subtype**, select the type of user: **All**, **ED** (Enterprise Directory), **Local**, or **Cross Account**.
112
112
1. Select **Apply** to run your query and display the information you selected.
113
113
114
114
Select **Reset filter** to discard your changes.
@@ -158,4 +158,4 @@ You can filter user details by type of user, user role, app, or service used, or
158
158
- To view assigned permissions and usage of the group and the group members, see [View analytic information about groups](usage-analytics-groups.md).
159
159
- To view active resources, see [View analytic information about active resources](usage-analytics-active-resources.md).
160
160
- To view the permission usage of access keys for a given user, see [View analytic information about access keys](usage-analytics-access-keys.md).
161
-
- To view assigned permissions and usage of the serverless functions, see [View analytic information about serverless functions](usage-analytics-serverless-functions.md).
161
+
- To view assigned permissions and usage of the serverless functions, see [View analytic information about serverless functions](usage-analytics-serverless-functions.md).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-node-migration.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ ms.custom: has-adal-ref
21
21
22
22
## Prerequisites
23
23
24
-
- Node version 10, 12or 14. See the [note on version support](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node#node-version-support)
24
+
- Node version 10, 12, 14, 16 or 18. See the [note on version support](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node#node-version-support)
25
25
26
26
## Update app registration settings
27
27
@@ -373,16 +373,19 @@ const cca = new msal.ConfidentialClientApplication(config);
373
373
374
374
constrefreshTokenRequest= {
375
375
refreshToken:"", // your previous refresh token here
For more information, please refer to the [ADAL Node to MSAL Node migration sample](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/refresh-token).
388
+
386
389
> [!NOTE]
387
390
> We recommend you to destroy the older ADAL Node token cache once you utilize the still valid refresh tokens to get a new set of tokens using the MSAL Node's `acquireTokenByRefreshToken` method as shown above.
388
391
@@ -419,7 +422,7 @@ var adal = require('adal-node');
419
422
// Authentication parameters
420
423
var clientId ='Enter_the_Application_Id_Here';
421
424
var clientSecret ='Enter_the_Client_Secret_Here';
422
-
var tenant ='common';
425
+
var tenant ='Enter_the_Tenant_Info_Here';
423
426
var authorityUrl ='https://login.microsoftonline.com/'+ tenant;
424
427
var redirectUri ='http://localhost:3000/redirect';
0 commit comments