You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-authentication-methods.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,6 +107,8 @@ Administrators can view user authentication methods in the Azure portal. Usable
107
107
108
108
Each authentication method can become non-usable for different reasons. For example, a Temporary Access Pass may expire, or FIDO2 security key may fail attestation. The portal will be updated to provide the reason for why the method is non-usable.
109
109
110
+
Authentication methods that are no longer available due to "Require re-register multifactor authentication" are also displayed here.
111
+
110
112
:::image type="content" border="true" source="media/concept-authentication-methods/non-usable.png" alt-text="Screenshot of non-usable authentication methods." :::
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-mfa-licensing.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,19 +32,19 @@ The following table details the different ways to get Azure AD Multi-Factor Auth
32
32
|[Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business) and [EMS](https://www.microsoft.com/security/business/enterprise-mobility-security) or [Microsoft 365 E3 and E5](https://www.microsoft.com/microsoft-365/enterprise/compare-office-365-plans)| EMS E3, Microsoft 365 E3, and Microsoft 365 Business Premium includes Azure AD Premium P1. EMS E5 or Microsoft 365 E5 includes Azure AD Premium P2. You can use the same Conditional Access features noted in the following sections to provide multi-factor authentication to users. |
33
33
|[Azure AD Premium P1](../fundamentals/active-directory-get-started-premium.md)| You can use [Azure AD Conditional Access](../conditional-access/howto-conditional-access-policy-all-users-mfa.md) to prompt users for multi-factor authentication during certain scenarios or events to fit your business requirements. |
34
34
|[Azure AD Premium P2](../fundamentals/active-directory-get-started-premium.md)| Provides the strongest security position and improved user experience. Adds [risk-based Conditional Access](../conditional-access/howto-conditional-access-policy-risk.md) to the Azure AD Premium P1 features that adapts to user's patterns and minimizes multi-factor authentication prompts. |
35
-
|[All Microsoft 365 plans](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans)| Azure AD Multi-Factor Authentication can be enabled all users using [security defaults](../fundamentals/concept-fundamentals-security-defaults.md). Management of Azure AD Multi-Factor Authentication is through the Microsoft 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Microsoft 365 resources with multi-factor authentication](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication). |
35
+
|[All Microsoft 365 plans](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans)| Azure AD Multi-Factor Authentication can be enabled for all users using [security defaults](../fundamentals/concept-fundamentals-security-defaults.md). Management of Azure AD Multi-Factor Authentication is through the Microsoft 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Microsoft 365 resources with multi-factor authentication](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication). |
36
36
|[Office 365 free](https://www.microsoft.com/microsoft-365/enterprise/compare-office-365-plans)<br>[Azure AD free](../verifiable-credentials/how-to-create-a-free-developer-account.md)| You can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to prompt users for multi-factor authentication as needed but you don't have granular control of enabled users or scenarios, but it does provide that additional security step.<br /> Even when security defaults aren't used to enable multi-factor authentication for everyone, users assigned the *Azure AD Global Administrator* role can be configured to use multi-factor authentication. This feature of the free tier makes sure the critical administrator accounts are protected by multi-factor authentication. |
37
37
38
38
## Feature comparison based on licenses
39
39
40
-
The following table provides a list of the features that are available in the various versions of Azure AD for Multi-Factor Authentication. Plan out your needs for securing user authentication, then determine which approach meets those requirements. For example, although Azure AD Free provides security defaults that provide Azure AD Multi-Factor Authentication, only the mobile authenticator app can be used for the authentication prompt, not a phone call or SMS. This approach may be a limitation if you can't ensure the mobile authentication app is installed on a user's personal device. See [Azure AD Free tier](#azure-ad-free-tier) later in this topic for more details.
40
+
The following table provides a list of the features that are available in the various versions of Azure AD for Multi-Factor Authentication. Plan out your needs for securing user authentication, then determine which approach meets those requirements. For example, although Azure AD Free provides security defaults that provide Azure AD Multi-Factor Authentication, only the mobile authenticator app can be used for the authentication prompt, including SMS and phone calls. This approach may be a limitation if you can't ensure the mobile authentication app is installed on a user's personal device. See [Azure AD Free tier](#azure-ad-free-tier) later in this topic for more details.
41
41
42
42
| Feature | Azure AD Free - Security defaults (enabled for all users) | Azure AD Free - Global Administrators only | Office 365 | Azure AD Premium P1 | Azure AD Premium P2 |
43
43
| --- |:---:|:---:|:---:|:---:|:---:|
44
44
| Protect Azure AD tenant admin accounts with MFA | ● | ● (*Azure AD Global Administrator* accounts only) | ● | ● | ● |
45
45
| Mobile app as a second factor | ● | ● | ● | ● | ● |
46
-
| Phone call as a second factor ||| ● | ● | ● |
47
-
| SMS as a second factor || ● | ● | ● | ● |
46
+
| Phone call as a second factor |● || ● | ● | ● |
47
+
| SMS as a second factor |● | ● | ● | ● | ● |
48
48
| Admin control over verification methods || ● | ● | ● | ● |
49
49
| Fraud alert |||| ● | ● |
50
50
| MFA Reports |||| ● | ● |
@@ -70,7 +70,7 @@ Our recommended approach to enforce MFA is using [Conditional Access](../conditi
70
70
| Configuration flexibility || ● ||
71
71
|**Functionality**|
72
72
| Exempt users from the policy || ● | ● |
73
-
| Authenticate by phone call or SMS || ● | ● |
73
+
| Authenticate by phone call or SMS |● | ● | ● |
74
74
| Authenticate by Microsoft Authenticator and Software tokens | ● | ● | ● |
75
75
| Authenticate by FIDO2, Windows Hello for Business, and Hardware tokens || ● | ● |
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -138,7 +138,7 @@ Try the following operations to validate scenarios using password writeback. All
138
138
139
139
- If passwords for some user accounts aren't written back to the on-premises directory, make sure that inheritance isn't disabled for the account in the on-premises AD DS environment. Write permissions for passwords must be applied to descendant objects for the feature to work correctly.
140
140
141
-
- Password policies in the on-premises AD DS environment may prevent password resets from being correctly processed. If you are testing this feature and want to reset password for users more than once per day, the group policy for Minimum password age must be set to 0. This setting can be found under Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies within gpmc.msc.
141
+
- Password policies in the on-premises AD DS environment may prevent password resets from being correctly processed. If you are testing this feature and want to reset password for users more than once per day, the group policy for Minimum password age must be set to 0. This setting can be found under Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Password Policy within gpmc.msc.
142
142
143
143
- If you update the group policy, wait for the updated policy to replicate, or use the gpupdate /force command.
> > | `tokenRequest` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure Portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under **Expose an API** section in Azure Portal's Application Registration. |
149
149
> > | `tokenResponse` | The response contains an access token for the scopes requested. |
150
150
>
151
-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
151
+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
> > | `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
184
184
>
185
-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
185
+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
> For more information, see the [reference documentation for `AcquireTokenForClient`](/dotnet/api/microsoft.identity.client.confidentialclientapplication.acquiretokenforclient).
155
155
>
156
-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
156
+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
> For more information, please see the [reference documentation for `AcquireTokenForClient`](https://msal-python.readthedocs.io/en/latest/#msal.ConfidentialClientApplication.acquire_token_for_client).
151
151
>
152
-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
152
+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
> * `scopes` contains the scopes being requested, such as `{ "user.read" }` for Microsoft Graph or `{ "api://<Application ID>/access_as_user" }` for custom web APIs.
133
133
> * `firstAccount` specifies the first user account in the cache (MSAL supports multiple users in a single app).
134
134
>
135
-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
135
+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
0 commit comments