Skip to content

Commit 3d4ff4a

Browse files
Merge pull request #251381 from Justinha/steps-auth-3
Steps auth 3
2 parents 98ae44b + f5f634e commit 3d4ff4a

7 files changed

+55
-59
lines changed

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 02/09/2023
8+
ms.date: 09/13/2023
99

1010
ms.author: justinha
1111
author: justinha
@@ -53,16 +53,16 @@ Optionally, you can also configure authentication bindings to map certificates t
5353

5454
## Step 1: Configure the certification authorities
5555

56-
You can configure CAs by using the Azure portal or PowerShell.
56+
You can configure CAs by using the Microsoft Entra admin center or PowerShell.
5757

58-
### Configure certification authorities using the Azure portal
58+
### Configure certification authorities using the Microsoft Entra admin center
5959

6060
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
6161

62-
To enable the certificate-based authentication and configure user bindings in the Azure portal, complete the following steps:
62+
To enable the certificate-based authentication and configure user bindings in the Microsoft Entra admin center, complete the following steps:
6363

64-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
65-
1. Click **Azure Active Directory** > **Security**.
64+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
65+
1. Browse to **Protection** > **Authentication methods** > **Certifacte-based authentication**.
6666

6767
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/certificate-authorities.png" alt-text="Screenshot of certification authorities.":::
6868

@@ -144,11 +144,10 @@ For more information, see [Understanding the certificate revocation process](./c
144144
>[!IMPORTANT]
145145
>A user is considered capable for **MFA** when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods. If the users do not have access to certificates they will be locked out and not be able to register other methods for MFA. So the admin needs to enable users who have a valid certificate into the CBA scope. Do not use all users for CBA target and use groups of users who have valid certificates available. For more information, see [Azure AD MFA](concept-mfa-howitworks.md).
146146
147-
To enable the certificate-based authentication in the Azure portal, complete the following steps:
147+
To enable the certificate-based authentication in the Microsoft Entra admin center, complete the following steps:
148148

149-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
150-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
151-
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
149+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
150+
1. Browse to **Protection** > **Authentication methods** > **Certificate-based Authentication**.
152151
1. Under **Enable and Target**, click **Enable**.
153152
1. Click **All users**, or click **Add groups** to select specific groups.
154153

@@ -164,11 +163,10 @@ Once certificate-based authentication is enabled on the tenant, all users in the
164163

165164
The authentication binding policy helps determine the strength of authentication to either a single factor or multi factor. An admin can change the default value from single-factor to multifactor and configure custom policy rules by mapping to issuer Subject or policy OID fields in the certificate.
166165

167-
To enable Azure AD CBA and configure user bindings in the Azure portal, complete the following steps:
166+
To enable Azure AD CBA and configure user bindings in the Microsoft Entra admin center, complete the following steps:
168167

169-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
170-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
171-
1. Click **Authentication methods** > **Policies**.
168+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
169+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
172170
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
173171

174172
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/policy.png" alt-text="Screenshot of Authentication policy.":::

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 01/29/2023
7+
ms.date: 09/13/2023
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -17,7 +17,7 @@ This topic covers how to improve the security of user sign-in by adding the appl
1717

1818
## Prerequisites
1919

20-
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
20+
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Microsoft Entra admin center or Microsoft Graph API.
2121

2222
>[!NOTE]
2323
>The policy schema for Microsoft Graph APIs has been improved. The older policy schema is now deprecated. Make sure you use the new schema to help prevent errors.
@@ -165,7 +165,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
165165
#### Example of how to enable application name and geographic location for separate groups
166166

167167
In **featureSettings**, change **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** from **default** to **enabled.**
168-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
168+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
169169

170170
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
171171

@@ -222,7 +222,7 @@ GET https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationM
222222
#### Example of how to disable application name and only enable geographic location
223223

224224
In **featureSettings**, change the state of **displayAppInformationRequiredState** to **default** or **disabled** and **displayLocationInformationRequiredState** to **enabled.**
225-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
225+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
226226

227227
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
228228

@@ -273,9 +273,9 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
273273
#### Example of how to exclude a group from application name and geographic location
274274

275275
In **featureSettings**, change the states of **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** from **default** to **enabled.**
276-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
276+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
277277

278-
In addition, for each of the features, you'll change the id of the excludeTarget to the ObjectID of the group from the Azure portal. This change excludes that group from seeing application name or geographic location.
278+
In addition, for each of the features, you'll change the id of the excludeTarget to the ObjectID of the group from the Microsoft Entra admin center. This change excludes that group from seeing application name or geographic location.
279279

280280
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
281281

@@ -408,11 +408,12 @@ To turn off additional context, you'll need to PATCH **displayAppInformationRequ
408408
}
409409
```
410410

411-
## Enable additional context in the portal
411+
## Enable additional context in the Microsoft Entra admin center
412412

413-
To enable application name or geographic location in the Azure portal, complete the following steps:
413+
To enable application name or geographic location in the Microsoft Entra admin center, complete the following steps:
414414

415-
1. In the Azure portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
415+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
416+
1. Browse to **Protection** > **Authentication methods** > **Microsoft Authenticator**.
416417
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone, and change **Authentication mode** to **Any**.
417418

418419
Only users who are enabled for Microsoft Authenticator here can be included in the policy to show the application name or geographic location of the sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see application name or geographic location.

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 04/25/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: sabina-smith
@@ -26,12 +26,12 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
2626

2727
>[!NOTE]
2828
>These are important security enhancements for users authenticating via telecom transports:
29-
>- On June 26, the Microsoft managed value of this feature changed from ‘disabled’ to ‘enabled’ in the Authentication methods policy. If you no longer wish for this feature to be enabled, move the state from 'default' to ‘disabled’ or scope it to only a group of users.
30-
>- Starting September 18, Authenticator Lite will be enabled as part of the *Notification through mobile app* verification option in the per-user MFA policy. If you don't want this feature enabled, you can disable it in the Authentication methods policy following the steps below.
29+
>- On June 26, the Microsoft managed value of this feature changed from **Disabled** to **Enabled** in the Authentication methods policy. If you no longer wish for this feature to be enabled, move the state from **Default** to **Disabled** or scope it to only a group of users.
30+
>- Starting September 18, Authenticator Lite will be enabled as part of the **Notification through mobile app* verification option in the per-user MFA policy. If you don't want this feature enabled, you can disable it in the Authentication methods policy following the steps below.
3131
3232
## Prerequisites
3333

34-
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for all users or select groups. We recommend enabling Microsoft Authenticator by using the modern [Authentication methods policy](concept-authentication-methods-manage.md#authentication-methods-policy). You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API. Organizations with an active MFA server are not eligible for this feature.
34+
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for all users or select groups. We recommend enabling Microsoft Authenticator by using the modern [Authentication methods policy](concept-authentication-methods-manage.md#authentication-methods-policy). You can edit the Authentication methods policy by using the Microsoft Entra admin center or Microsoft Graph API. Organizations with an active MFA server are not eligible for this feature.
3535

3636
>[!TIP]
3737
>We recommend that you also enable [system-preferred multifactor authentication (MFA)](concept-system-preferred-multifactor-authentication.md) when you enable Authenticator Lite. With system-preferred MFA enabled, users try to sign-in with Authenticator Lite before they try less secure telephony methods like SMS or voice call.
@@ -49,26 +49,26 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
4949

5050
By default, Authenticator Lite is [Microsoft managed](concept-authentication-default-enablement.md#microsoft-managed-settings) in the Authentication methods policy. On June 26, the Microsoft managed value of this feature changed from ‘disabled’ to ‘enabled’. Authenticator Lite is also included as part of the *Notification through mobile app* verification option in the per-user MFA policy.
5151

52-
### Disabling Authenticator Lite in Azure portal UX
52+
### Disabling Authenticator Lite in the Microsoft Entra admin center
5353

54-
To disable Authenticator Lite in the Azure portal, complete the following steps:
54+
To disable Authenticator Lite in the Microsoft Entra admin center, complete the following steps:
5555

56-
1. In the Azure portal, click Azure Active Directory > Security > Authentication methods > Microsoft Authenticator.
57-
In the Entra admin center, on the sidebar select Azure Active Directory > Protect & Secure > Authentication methods > Microsoft Authenticator.
56+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
57+
1. Browse to **Protection** > **Authentication methods** > **Microsoft Authenticator**.
5858

59-
2. On the Enable and Target tab, click Enable and All users to enable the Authenticator policy for everyone or add select groups. Set the Authentication mode for these users/groups to Any or Push.
59+
2. On the **Enable and Target** tab, click **Enable** and **All users** to enable the Authenticator policy for everyone or add select groups. Set the Authentication mode for these users/groups to **Any** or **Push**.
6060

61-
Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook. Android users utilizing a personal and work profile on their device may be prompted to register if Authenticator is present on a different profile from the Outlook application.
61+
Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook. Android users utilizing a personal and work profile on their device may be prompted to register if Authenticator is present on a different profile from the Outlook application.
6262

63-
<img width="1112" alt="Microsoft Entra admin center Authenticator settings" src="https://user-images.githubusercontent.com/108090297/228603771-52c5933c-f95e-4f19-82db-eda2ba640b94.png">
63+
<img width="1112" alt="Microsoft Entra admin center Authenticator settings" src="https://user-images.githubusercontent.com/108090297/228603771-52c5933c-f95e-4f19-82db-eda2ba640b94.png">
6464

6565

66-
3. On the Configure tab, for **Microsoft Authenticator on companion applications**, change Status to Disabled, and click Save.
66+
3. On the **Configure** tab, for **Microsoft Authenticator on companion applications**, change Status to **Disabled**, and click **Save**.
6767

68-
<img width="664" alt="Authenticator Lite configuration settings" src="https://user-images.githubusercontent.com/108090297/228603364-53f2581f-a4e0-42ee-8016-79b23e5eff6c.png">
68+
<img width="664" alt="Authenticator Lite configuration settings" src="https://user-images.githubusercontent.com/108090297/228603364-53f2581f-a4e0-42ee-8016-79b23e5eff6c.png">
6969

70-
>[!NOTE]
71-
> If your organization still manages authentication methods in the per-user MFA policy, you'll need to disable *Notification through mobile app* as a verification option there in addition to the steps above. We recommend doing this only after you've enabled Microsoft Authenticator in the Authentication methods policy. You can contine to manage the remainder of your authentication methods in the per-user MFA policy while Microsoft Authenticator is managed in the modern Authentication methods policy. However, we recommend [migrating](how-to-authentication-methods-manage.md) management of all authentication methods to the modern Authentication methods policy. The ability to manage authentication methods in the per-user MFA policy will be retired September 30, 2024.
70+
>[!NOTE]
71+
> If your organization still manages authentication methods in the per-user MFA policy, you need to disable *Notification through mobile app* as a verification option there in addition to the preceding steps. We recommend doing this only after you enable Microsoft Authenticator in the Authentication methods policy. You can contine to manage the remainder of your authentication methods in the per-user MFA policy while Microsoft Authenticator is managed in the modern Authentication methods policy. However, we recommend [migrating](how-to-authentication-methods-manage.md) management of all authentication methods to the modern Authentication methods policy. The ability to manage authentication methods in the per-user MFA policy will be retired September 30, 2024.
7272
7373
### Enable Authenticator Lite via Graph APIs
7474

0 commit comments

Comments
 (0)