You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-number-match.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,10 +119,6 @@ Users who are enabled for MFA push notifications in the legacy MFA policy will a
119
119
120
120
:::image type="content" border="true" source="./media/how-to-mfa-number-match/notifications-through-mobile-app.png" alt-text="Screenshot of Notifications through mobile app setting.":::
121
121
122
-
### Why does the portal still show the control to enable number matching?
123
-
124
-
You might need to refresh the browser to update the portal after number matching is enabled by default beginning May 8, 2023.
125
-
126
122
### Is number matching supported with MFA Server?
127
123
128
124
No, number matching isn't enforced because it's not a supported feature for MFA Server, which is [deprecated](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454).
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension-errors.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ If you encounter errors with the NPS extension for Azure AD Multi-Factor Authent
59
59
|**OathCodePinIncorrect**| Wrong code and pin entered. | This error is not expected in the NPS extension. If your user encounters this, [contact support](#contact-microsoft-support) for troubleshooting help. |
60
60
|**ProofDataNotFound**| Proof data was not configured for the specified authentication method. | Have the user try a different verification method, or add a new verification methods according to the instructions in [Manage your settings for two-step verification](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7). If the user continues to see this error after you confirmed that their verification method is set up correctly, [contact support](#contact-microsoft-support). |
61
61
|**SMSAuthFailedWrongCodePinEntered**| Wrong code and pin entered. (OneWaySMS) | This error is not expected in the NPS extension. If your user encounters this, [contact support](#contact-microsoft-support) for troubleshooting help. |
62
-
|**TenantIsBlocked**| Tenant is blocked |[Contact support](#contact-microsoft-support) with the *Tenant ID* from the Azure AD properties page in the Azure portal. |
62
+
|**TenantIsBlocked**| Tenant is blocked |[Contact support](#contact-microsoft-support) with the *Tenant ID* from the Azure AD properties page in the Microsoft Entra admin center. |
63
63
|**UserNotFound**| The specified user was not found | The tenant is no longer visible as active in Azure AD. Check that your subscription is active and you have the required first party apps. Also make sure the tenant in the certificate subject is as expected and the cert is still valid and registered under the service principal. |
64
64
65
65
## Messages your users may encounter that aren't errors
As part of the configuration of the NPS extension, you need to supply admin credentials and the Azure AD ID for your Azure AD tenant. To get the tenant ID, complete the following steps:
127
+
As part of the configuration of the NPS extension, you must supply administrator credentials and the ID of your Azure AD tenant. To get the tenant ID, complete the following steps:
128
128
129
-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
130
-
1. In the Azure portal menu, select **Azure Active Directory**, or search for and select **Azure Active Directory** from any page.
131
-
1. On the **Overview** page, the *Tenant information* is shown. Next to the *Tenant ID*, select the **Copy** icon, as shown in the following example screenshot:
129
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Global Administrator](../roles/permissions-reference.md#global-administrator).
130
+
1. Browse to **Identity** > **Settings**.
132
131
133
-

132
+

134
133
135
134
### Install the NPS extension
136
135
@@ -366,7 +365,7 @@ On the server where you installed the NPS extension for Azure AD MFA, you can fi
366
365
367
366
## Troubleshoot Guide
368
367
369
-
If the configuration is not working as expected, the first place to start to troubleshoot is to verify that the user is configured to use Azure AD MFA. Have the user sign in to the [Azure portal](https://portal.azure.com). If users are prompted for secondary verification and can successfully authenticate, you can eliminate an incorrect configuration of Azure AD MFA.
368
+
If the configuration is not working as expected, the first place to start to troubleshoot is to verify that the user is configured to use Azure AD MFA. Have the user sign in to the [Microsoft Entra admin center](https://entra.microsoft.com). If users are prompted for secondary verification and can successfully authenticate, you can eliminate an incorrect configuration of Azure AD MFA.
370
369
371
370
If Azure AD MFA is working for the user(s), you should review the relevant Event logs. These include the Security Event, Gateway operational, and Azure AD MFA logs that are discussed in the previous section.
As part of the configuration of the NPS extension, you must supply administrator credentials and the ID of your Azure AD tenant. To get the tenant ID, complete the following steps:
330
330
331
-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
332
-
1. In the Azure portal menu, select **Azure Active Directory**, or search for and select **Azure Active Directory** from any page.
333
-
1. On the **Overview** page, the *Tenant information* is shown. Next to the *Tenant ID*, select the **Copy** icon, as shown in the following example screenshot:
331
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Global Administrator](../roles/permissions-reference.md#global-administrator).
332
+
1. Browse to **Identity** > **Settings**.
334
333
335
-

334
+

If the configuration is not working as expected, begin troubleshooting by verifying that the user is configured to use MFA. Have the user sign in to the [Azure portal](https://portal.azure.com). If the user is prompted for secondary authentication and can successfully authenticate, you can eliminate an incorrect configuration of MFA as an issue.
434
+
If the configuration is not working as expected, begin troubleshooting by verifying that the user is configured to use MFA. Have the user sign in to the [Microsoft Entra admin center](https://entra.microsoft.com). If the user is prompted for secondary authentication and can successfully authenticate, you can eliminate an incorrect configuration of MFA as an issue.
436
435
437
436
If MFA is working for the user, review the relevant Event Viewer logs. The logs include the security event, Gateway operational, and Azure AD Multi-Factor Authentication logs that are discussed in the previous section.
@@ -93,19 +93,16 @@ The following libraries are installed automatically with the extension.
93
93
94
94
The Microsoft Azure Active Directory Module for Windows PowerShell is also installed through a configuration script you run as part of the setup process, if not already present. There's no need to install this module ahead of time if it's not already installed.
Everyone using the NPS extensionmust be synced to Azure AD using Azure AD Connect, and must be registered for MFA.
100
+
As part of the configuration of the NPS extension, you must supply administrator credentials and the ID of your Azure AD tenant. To get the tenant ID, complete the following steps:
101
101
102
-
When you install the extension, you need the *Tenant ID* and admin credentials for your Azure AD tenant. To get the tenant ID, complete the following steps:
102
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Global Administrator](../roles/permissions-reference.md#global-administrator).
103
+
1. Browse to **Identity** > **Settings**.
103
104
104
-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
105
-
1. Search for and select the **Azure Active Directory**.
106
-
1. On the **Overview** page, the *Tenant information* is shown. Next to the *Tenant ID*, select the **Copy** icon, as shown in the following example screenshot:
107
-
108
-

105
+

109
106
110
107
### Network requirements
111
108
@@ -154,8 +151,8 @@ Depending on which VPN solution you use, the steps to configure your RADIUS auth
154
151
155
152
This step may already be complete on your tenant, but it's good to double-check that Azure AD Connect has synchronized your databases recently.
156
153
157
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
158
-
2. Select **Azure Active Directory**> **Azure AD Connect**
154
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
155
+
1. Browse to **Identity** > **Hybrid management**> **Azure AD Connect**.
159
156
3. Verify that your sync status is **Enabled** and that your last sync was less than an hour ago.
160
157
161
158
If you need to kick off a new round of synchronization, see [Azure AD Connect sync: Scheduler](../hybrid/connect/how-to-connect-sync-feature-scheduler.md#start-the-scheduler).
@@ -185,7 +182,8 @@ If you need to create and configure a test account, use the following steps:
185
182
186
183
1. Sign in to [https://aka.ms/mfasetup](https://aka.ms/mfasetup) with a test account.
187
184
2. Follow the prompts to set up a verification method.
188
-
3. In the Azure portal as an admin user, [create a Conditional Access policy](howto-mfa-getstarted.md#plan-conditional-access-policies) to require multi-factor authentication for the test account.
185
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
186
+
1. Browse to **Protection** > **Multifactor authentication** and enable for the test account.
189
187
190
188
> [!IMPORTANT]
191
189
>
@@ -255,7 +253,7 @@ To provide load-balancing capabilities or for redundancy, repeat these steps on
255
253
```
256
254
257
255
1. When prompted, sign in to Azure AD as a Global administrator.
258
-
1. PowerShell prompts for your tenant ID. Use the *Tenant ID* GUID that you copied from the Azure portal in the prerequisites section.
256
+
1. PowerShell prompts for your tenant ID. Use the *Tenant ID* GUID that you copied in the prerequisites section.
259
257
1. A success message is shown when the script is finished.
260
258
261
259
If your previous computer certificate has expired, and a new certificate has been generated, you should delete any expired certificates. Having expired certificates can cause issues with the NPS Extension starting.
Once done, sign in to the [Azure portal](https://portal.azure.com)> **Azure Active Directory** > **Enterprise Applications** > Search for "Azure Multi-Factor Auth Client" > Check properties for this app > Confirm if the service principal is enabled or disabled > Click on the application entry > Go to Properties of the app > If the option "Enabled for users to sign-in?" is set to `No` in Properties of this app, please set it to `Yes`.
351
+
Once done, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as a [Global Administrator](../roles/permissions-reference.md#global-administrator). Browse to **Identity** > **Applications** > **Enterprise applications** > and search for "Azure Multi-Factor Auth Client". Then click **Check properties for this app**. Confirm if the service principal is enabled or disabled. Click the application entry > **Properties**. If the option **Enabled for users to sign-in?** is set to **No**, set it to **Yes**.
354
352
355
-
Run the `AzureMfaNpsExtnConfigSetup.ps1` script again and it should not return the `Service principal was not found` error.
353
+
Run the `AzureMfaNpsExtnConfigSetup.ps1` script again and it should not return the **Service principal was not found** error.
356
354
357
355
### How do I verify that the client cert is installed as expected?
0 commit comments