Skip to content

Commit 3b8be35

Browse files
committed
revised portal steps
1 parent 770ffe4 commit 3b8be35

File tree

6 files changed

+27
-35
lines changed

6 files changed

+27
-35
lines changed

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -119,10 +119,6 @@ Users who are enabled for MFA push notifications in the legacy MFA policy will a
119119

120120
:::image type="content" border="true" source="./media/how-to-mfa-number-match/notifications-through-mobile-app.png" alt-text="Screenshot of Notifications through mobile app setting.":::
121121

122-
### Why does the portal still show the control to enable number matching?
123-
124-
You might need to refresh the browser to update the portal after number matching is enabled by default beginning May 8, 2023.
125-
126122
### Is number matching supported with MFA Server?
127123

128124
No, number matching isn't enforced because it's not a supported feature for MFA Server, which is [deprecated](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454).

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ If you encounter errors with the NPS extension for Azure AD Multi-Factor Authent
5959
| **OathCodePinIncorrect** | Wrong code and pin entered. | This error is not expected in the NPS extension. If your user encounters this, [contact support](#contact-microsoft-support) for troubleshooting help. |
6060
| **ProofDataNotFound** | Proof data was not configured for the specified authentication method. | Have the user try a different verification method, or add a new verification methods according to the instructions in [Manage your settings for two-step verification](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7). If the user continues to see this error after you confirmed that their verification method is set up correctly, [contact support](#contact-microsoft-support). |
6161
| **SMSAuthFailedWrongCodePinEntered** | Wrong code and pin entered. (OneWaySMS) | This error is not expected in the NPS extension. If your user encounters this, [contact support](#contact-microsoft-support) for troubleshooting help. |
62-
| **TenantIsBlocked** | Tenant is blocked | [Contact support](#contact-microsoft-support) with the *Tenant ID* from the Azure AD properties page in the Azure portal. |
62+
| **TenantIsBlocked** | Tenant is blocked | [Contact support](#contact-microsoft-support) with the *Tenant ID* from the Azure AD properties page in the Microsoft Entra admin center. |
6363
| **UserNotFound** | The specified user was not found | The tenant is no longer visible as active in Azure AD. Check that your subscription is active and you have the required first party apps. Also make sure the tenant in the certificate subject is as expected and the cert is still valid and registered under the service principal. |
6464

6565
## Messages your users may encounter that aren't errors

articles/active-directory/authentication/howto-mfa-nps-extension-rdg.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: how-to
10-
ms.date: 01/29/2023
10+
ms.date: 09/13/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -120,17 +120,16 @@ Follow the steps in [What does Azure AD Multi-Factor Authentication mean for me?
120120

121121
This section provides instructions for configuring RDS infrastructure to use Azure AD MFA for client authentication with the Remote Desktop Gateway.
122122

123-
### Acquire Azure Active Directory tenant ID
123+
### Obtain the directory tenant ID
124124

125125
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
126126

127-
As part of the configuration of the NPS extension, you need to supply admin credentials and the Azure AD ID for your Azure AD tenant. To get the tenant ID, complete the following steps:
127+
As part of the configuration of the NPS extension, you must supply administrator credentials and the ID of your Azure AD tenant. To get the tenant ID, complete the following steps:
128128

129-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
130-
1. In the Azure portal menu, select **Azure Active Directory**, or search for and select **Azure Active Directory** from any page.
131-
1. On the **Overview** page, the *Tenant information* is shown. Next to the *Tenant ID*, select the **Copy** icon, as shown in the following example screenshot:
129+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Global Administrator](../roles/permissions-reference.md#global-administrator).
130+
1. Browse to **Identity** > **Settings**.
132131

133-
![Getting the Tenant ID from the Azure portal](./media/howto-mfa-nps-extension-rdg/azure-active-directory-tenant-id-portal.png)
132+
![Getting the Tenant ID from the Microsoft Entra admin center](./media/howto-mfa-nps-extension-vpn/tenant-id.png)
134133

135134
### Install the NPS extension
136135

@@ -366,7 +365,7 @@ On the server where you installed the NPS extension for Azure AD MFA, you can fi
366365

367366
## Troubleshoot Guide
368367

369-
If the configuration is not working as expected, the first place to start to troubleshoot is to verify that the user is configured to use Azure AD MFA. Have the user sign in to the [Azure portal](https://portal.azure.com). If users are prompted for secondary verification and can successfully authenticate, you can eliminate an incorrect configuration of Azure AD MFA.
368+
If the configuration is not working as expected, the first place to start to troubleshoot is to verify that the user is configured to use Azure AD MFA. Have the user sign in to the [Microsoft Entra admin center](https://entra.microsoft.com). If users are prompted for secondary verification and can successfully authenticate, you can eliminate an incorrect configuration of Azure AD MFA.
370369

371370
If Azure AD MFA is working for the user(s), you should review the relevant Event logs. These include the Security Event, Gateway operational, and Azure AD MFA logs that are discussed in the previous section.
372371

articles/active-directory/authentication/howto-mfa-nps-extension-vpn.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: how-to
10-
ms.date: 01/29/2023
10+
ms.date: 09/23/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -322,17 +322,16 @@ If the value is set to *TRUE* or is blank, all authentication requests are subje
322322

323323

324324

325-
### Obtain the Azure Active Directory tenant ID
325+
### Obtain the directory tenant ID
326326

327327
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
328328

329329
As part of the configuration of the NPS extension, you must supply administrator credentials and the ID of your Azure AD tenant. To get the tenant ID, complete the following steps:
330330

331-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
332-
1. In the Azure portal menu, select **Azure Active Directory**, or search for and select **Azure Active Directory** from any page.
333-
1. On the **Overview** page, the *Tenant information* is shown. Next to the *Tenant ID*, select the **Copy** icon, as shown in the following example screenshot:
331+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Global Administrator](../roles/permissions-reference.md#global-administrator).
332+
1. Browse to **Identity** > **Settings**.
334333

335-
![Getting the Tenant ID from the Azure portal](./media/howto-mfa-nps-extension-vpn/azure-active-directory-tenant-id-portal.png)
334+
![Getting the Tenant ID from the Microsoft Entra admin center](./media/howto-mfa-nps-extension-vpn/tenant-id.png)
336335

337336
### Install the NPS extension
338337

@@ -432,7 +431,7 @@ Get-WinEvent -Logname Security | where {$_.ID -eq '6272'} | FL
432431

433432
## Troubleshooting guide
434433

435-
If the configuration is not working as expected, begin troubleshooting by verifying that the user is configured to use MFA. Have the user sign in to the [Azure portal](https://portal.azure.com). If the user is prompted for secondary authentication and can successfully authenticate, you can eliminate an incorrect configuration of MFA as an issue.
434+
If the configuration is not working as expected, begin troubleshooting by verifying that the user is configured to use MFA. Have the user sign in to the [Microsoft Entra admin center](https://entra.microsoft.com). If the user is prompted for secondary authentication and can successfully authenticate, you can eliminate an incorrect configuration of MFA as an issue.
436435

437436
If MFA is working for the user, review the relevant Event Viewer logs. The logs include the security event, Gateway operational, and Azure AD Multi-Factor Authentication logs that are discussed in the previous section.
438437

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 04/10/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -93,19 +93,16 @@ The following libraries are installed automatically with the extension.
9393

9494
The Microsoft Azure Active Directory Module for Windows PowerShell is also installed through a configuration script you run as part of the setup process, if not already present. There's no need to install this module ahead of time if it's not already installed.
9595

96-
### Azure Active Directory
96+
### Obtain the directory tenant ID
9797

9898
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
9999

100-
Everyone using the NPS extension must be synced to Azure AD using Azure AD Connect, and must be registered for MFA.
100+
As part of the configuration of the NPS extension, you must supply administrator credentials and the ID of your Azure AD tenant. To get the tenant ID, complete the following steps:
101101

102-
When you install the extension, you need the *Tenant ID* and admin credentials for your Azure AD tenant. To get the tenant ID, complete the following steps:
102+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Global Administrator](../roles/permissions-reference.md#global-administrator).
103+
1. Browse to **Identity** > **Settings**.
103104

104-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
105-
1. Search for and select the **Azure Active Directory**.
106-
1. On the **Overview** page, the *Tenant information* is shown. Next to the *Tenant ID*, select the **Copy** icon, as shown in the following example screenshot:
107-
108-
![Getting the Tenant ID from the Azure portal](./media/howto-mfa-nps-extension/azure-active-directory-tenant-id-portal.png)
105+
![Getting the Tenant ID from the Microsoft Entra admin center](./media/howto-mfa-nps-extension-vpn/tenant-id.png)
109106

110107
### Network requirements
111108

@@ -154,8 +151,8 @@ Depending on which VPN solution you use, the steps to configure your RADIUS auth
154151

155152
This step may already be complete on your tenant, but it's good to double-check that Azure AD Connect has synchronized your databases recently.
156153

157-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
158-
2. Select **Azure Active Directory** > **Azure AD Connect**
154+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
155+
1. Browse to **Identity** > **Hybrid management** > **Azure AD Connect**.
159156
3. Verify that your sync status is **Enabled** and that your last sync was less than an hour ago.
160157

161158
If you need to kick off a new round of synchronization, see [Azure AD Connect sync: Scheduler](../hybrid/connect/how-to-connect-sync-feature-scheduler.md#start-the-scheduler).
@@ -185,7 +182,8 @@ If you need to create and configure a test account, use the following steps:
185182

186183
1. Sign in to [https://aka.ms/mfasetup](https://aka.ms/mfasetup) with a test account.
187184
2. Follow the prompts to set up a verification method.
188-
3. In the Azure portal as an admin user, [create a Conditional Access policy](howto-mfa-getstarted.md#plan-conditional-access-policies) to require multi-factor authentication for the test account.
185+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
186+
1. Browse to **Protection** > **Multifactor authentication** and enable for the test account.
189187

190188
> [!IMPORTANT]
191189
>
@@ -255,7 +253,7 @@ To provide load-balancing capabilities or for redundancy, repeat these steps on
255253
```
256254

257255
1. When prompted, sign in to Azure AD as a Global administrator.
258-
1. PowerShell prompts for your tenant ID. Use the *Tenant ID* GUID that you copied from the Azure portal in the prerequisites section.
256+
1. PowerShell prompts for your tenant ID. Use the *Tenant ID* GUID that you copied in the prerequisites section.
259257
1. A success message is shown when the script is finished.
260258

261259
If your previous computer certificate has expired, and a new certificate has been generated, you should delete any expired certificates. Having expired certificates can cause issues with the NPS Extension starting.
@@ -350,9 +348,9 @@ import-module MSOnline
350348
Connect-MsolService
351349
New-MsolServicePrincipal -AppPrincipalId 981f26a1-7f43-403b-a875-f8b09b8cd720 -DisplayName "Azure Multi-Factor Auth Client"
352350
```
353-
Once done, sign in to the [Azure portal](https://portal.azure.com) > **Azure Active Directory** > **Enterprise Applications** > Search for "Azure Multi-Factor Auth Client" > Check properties for this app > Confirm if the service principal is enabled or disabled > Click on the application entry > Go to Properties of the app > If the option "Enabled for users to sign-in?" is set to `No` in Properties of this app, please set it to `Yes`.
351+
Once done, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator). Browse to **Identity** > **Applications** > **Enterprise applications** > and search for "Azure Multi-Factor Auth Client". Then click **Check properties for this app**. Confirm if the service principal is enabled or disabled. Click the application entry > **Properties**. If the option **Enabled for users to sign-in?** is set to **No**, set it to **Yes**.
354352

355-
Run the `AzureMfaNpsExtnConfigSetup.ps1` script again and it should not return the `Service principal was not found` error.
353+
Run the `AzureMfaNpsExtnConfigSetup.ps1` script again and it should not return the **Service principal was not found** error.
356354

357355
### How do I verify that the client cert is installed as expected?
358356

0 commit comments

Comments
 (0)