You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-getstarted.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.reviewer: michmcla
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Planning a cloud-based Azure Multi-Factor Authentication
18
+
# Planning a cloud-based Azure Multi-Factor Authentication deployment
19
19
20
20
People are connecting to organizational resources in increasingly complicated scenarios. People connect from organization-owned, personal, and public devices on and off the corporate network using smart phones, tablets, PCs, and laptops, often on multiple platforms. In this always-connected, multi-device and multi-platform world, the security of user accounts is more important than ever. Passwords, no matter their complexity, used across devices, networks, and platforms are no longer sufficient to ensure the security of the user account, especially when users tend to reuse passwords across accounts. Sophisticated phishing and other social engineering attacks can result in usernames and passwords being posted and sold across the dark web.
21
21
@@ -37,13 +37,13 @@ Before starting a deployment of Azure Multi-Factor Authentication, there are pre
37
37
38
38
Your MFA rollout plan should include a pilot deployment followed by deployment waves that are within your support capacity. Begin your rollout by applying your Conditional Access policies to a small group of pilot users. After evaluating the effect on the pilot users, process used, and registration behaviors, you can either add more groups to the policy or add more users to the existing groups.
39
39
40
-
### User Communications
40
+
### User communications
41
41
42
42
It is critical to inform users, in planned communications, about upcoming changes, Azure MFA registration requirements, and any necessary user actions. We recommend communications are developed in concert with representatives from within your organization, such as a Communications, Change Management, or Human Resources departments.
43
43
44
44
Microsoft provides [communication templates](https://aka.ms/mfatemplates) and [end-user documentation](../user-help/security-info-setup-signin.md) to help draft your communications. You can send users to [https://myprofile.microsoft.com](https://myprofile.microsoft.com) to register directly by selecting the **Security Info** links on that page.
45
45
46
-
## Deployment Considerations
46
+
## Deployment considerations
47
47
48
48
Azure Multi-factor Authentication is deployed by enforcing policies with Conditional Access. A [Conditional Access policy](../conditional-access/overview.md) can require users to perform multi-factor authentication when certain criteria are met such as:
49
49
@@ -58,7 +58,7 @@ Azure Multi-factor Authentication is deployed by enforcing policies with Conditi
58
58
* Hybrid Azure AD joined device
59
59
* Approved client application
60
60
61
-
Use the customizable posters and email templates in [multi-factor authentication rollout materials] to roll out multi-factor authentication to your organization. (https://www.microsoft.com/en-us/download/details.aspx?id=57600&WT.mc_id=rss_alldownloads_all)
61
+
Use the customizable posters and email templates in [multi-factor authentication rollout materials](https://www.microsoft.com/download/details.aspx?id=57600&WT.mc_id=rss_alldownloads_all) to roll out multi-factor authentication to your organization.
62
62
63
63
## Enable Multi-Factor Authentication with Conditional Access
64
64
@@ -140,7 +140,7 @@ Administrators must determine how users will register their methods. Organizatio
140
140
141
141
If your organization is using Azure Active Directory Identity Protection, [configure the MFA registration policy](../identity-protection/howto-mfa-policy.md) to prompt your users to register the next time they sign in interactively.
142
142
143
-
### Registration without identity Protection
143
+
### Registration without Identity Protection
144
144
145
145
If your organization does not have licenses that enable Identity Protection, users are prompted to register the next time that MFA is required at sign-in. Users may not be registered for MFA if they don't use applications protected with MFA. It's important to get all users registered so that bad actors cannot guess the password of a user and register for MFA on their behalf, effectively taking control of the account.
146
146
@@ -241,7 +241,7 @@ The Network Policy Server (NPS) extension for Azure MFA adds cloud-based MFA cap
241
241
242
242
The NPS extension acts as an adapter between RADIUS and cloud-based Azure MFA to provide a second factor of authentication to protect [VPN](howto-mfa-nps-extension-vpn.md), [Remote Desktop Gateway connections](howto-mfa-nps-extension-rdg.md), or other RADIUS capable applications. Users that register for Azure MFA in this environment will be challenged for all authentication attempts, the lack of Conditional Access policies mean MFA is always required.
243
243
244
-
#### Implementing Your NPS Server
244
+
#### Implementing your NPS server
245
245
246
246
If you have an NPS instance deployed and in use already, reference [Integrate your existing NPS Infrastructure with Azure Multi-Factor Authentication](howto-mfa-nps-extension.md). If you are setting up NPS for the first time, refer to [Network Policy Server (NPS)](https://docs.microsoft.com/windows-server/networking/technologies/nps/nps-top) for instructions. Troubleshooting guidance can be found in the article [Resolve error messages from the NPS extension for Azure Multi-Factor Authentication](howto-mfa-nps-extension-errors.md).
247
247
@@ -274,7 +274,7 @@ When using Azure MFA with AD FS 2016 and the target application is subject to Co
274
274
* Conditional Access is not available when the application is a relying party to AD FS 2016 and is managed or federated with AD FS 2016.
275
275
* Conditional Access is also not available when AD FS 2016 is configured to use Azure MFA as the primary authentication method.
276
276
277
-
#### AD FS Logging
277
+
#### AD FS logging
278
278
279
279
Standard AD FS 2016 logging in both the Windows Security Log and the AD FS Admin log, contains information about authentication requests and their success or failure. Event log data within these events will indicate whether Azure MFA was used. For example, an AD FS Auditing Event ID 1200 may contain:
280
280
@@ -283,15 +283,15 @@ Standard AD FS 2016 logging in both the Windows Security Log and the AD FS Admin
283
283
<MfaMethod>MFA</MfaMethod>
284
284
```
285
285
286
-
#### Renew and manage Certificates
286
+
#### Renew and manage certificates
287
287
288
288
On each AD FS server, in the local computer My Store, there will be a self-signed Azure MFA certificate titled OU=Microsoft AD FS Azure MFA, which contains the certificate expiration date. Check the validity period of this certificate on each AD FS server to determine the expiration date.
289
289
290
290
If the validity period of your certificates is nearing expiration, [generate and verify a new MFA certificate on each AD FS server](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa#configure-the-ad-fs-servers).
291
291
292
292
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for 2 years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
293
293
294
-
## Implement your Plan
294
+
## Implement your plan
295
295
296
296
Now that you have planned your solution, you can implement by following the steps below:
297
297
@@ -320,7 +320,7 @@ Azure Multi-Factor Authentication provides reports through the Azure portal:
320
320
| --- | --- | --- |
321
321
| Usage and fraud alerts | Azure AD > Sign-ins | Provides information on overall usage, user summary, and user details; as well as a history of fraud alerts submitted during the date range specified. |
322
322
323
-
## Troubleshoot MFA Issues
323
+
## Troubleshoot MFA issues
324
324
325
325
Find solutions for common issues with Azure MFA at the [Troubleshooting Azure Multi-Factor Authentication article](https://support.microsoft.com/help/2937344/troubleshooting-azure-multi-factor-authentication-issues) on the Microsoft Support Center.
0 commit comments