You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Browser support of FIDO2 passwordless authentication
19
19
20
-
Azure Active Directory allows [FIDO2 security keys](./concept-authentication-passwordless.md#fido2-security-keys) to be used as a passwordless device. The availability of FIDO2 authentication for Microsoft accounts was [announced in 2018](https://techcommunity.microsoft.com/t5/identity-standards-blog/all-about-fido2-ctap2-and-webauthn/ba-p/288910), and it became [generally available](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/passwordless-authentication-is-now-generally-available/ba-p/1994700) in March 2021. The following diagram shows which browsers and operating system combinations support passwordless authentication using FIDO2 authentication keys with Azure Active Directory. Azure AD currently supports only hardware FIDO2 keys and does not support passkeys for any platform.
20
+
Azure Active Directory allows [FIDO2 security keys](./concept-authentication-passwordless.md#fido2-security-keys) to be used as a passwordless device. The availability of FIDO2 authentication for Microsoft accounts was [announced in 2018](https://techcommunity.microsoft.com/t5/identity-standards-blog/all-about-fido2-ctap2-and-webauthn/ba-p/288910), and it became [generally available](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/passwordless-authentication-is-now-generally-available/ba-p/1994700) in March 2021. The following diagram shows which browsers and operating system combinations support passwordless authentication using FIDO2 authentication keys with Azure Active Directory. Azure AD currently supports only hardware FIDO2 keys and doesn't support passkeys for any platform.
21
21
22
22
## Supported browsers
23
23
@@ -27,21 +27,25 @@ This table shows support for authenticating Azure Active Directory (Azure AD) an
|| USB | NFC | BLE | USB | NFC | BLE | USB | NFC | BLE | USB | NFC | BLE |
29
29
|**Windows**|![Chrome supports USB on Windows for Azure AD accounts.][y]|![Chrome supports NFC on Windows for Azure AD accounts.][y]|![Chrome supports BLE on Windows for Azure AD accounts.][y]|![Edge supports USB on Windows for Azure AD accounts.][y]|![Edge supports NFC on Windows for Azure AD accounts.][y]|![Edge supports BLE on Windows for Azure AD accounts.][y]|![Firefox supports USB on Windows for Azure AD accounts.][y]|![Firefox supports NFC on Windows for Azure AD accounts.][y]|![Firefox supports BLE on Windows for Azure AD accounts.][y]|![Safari supports USB on Windows for Azure AD accounts.][n]|![Safari supports NFC on Windows for Azure AD accounts.][n]|![Safari supports BLE on Windows for Azure AD accounts.][n]|
30
-
|**macOS**|![Chrome supports USB on macOS for Azure AD accounts.][y]|![Chrome supports NFC on macOS for Azure AD accounts.][n]|![Chrome supports BLE on macOS for Azure AD accounts.][n]|![Edge supports USB on macOS for Azure AD accounts.][y]|![Edge supports NFC on macOS for Azure AD accounts.][n]|![Edge supports BLE on macOS for Azure AD accounts.][n]|![Firefox supports USB on macOS for Azure AD accounts.][n]|![Firefox supports NFC on macOS for Azure AD accounts.][n]|![Firefox supports BLE on macOS for Azure AD accounts.][n]|![Safari supports USB on macOS for Azure AD accounts.][n]|![Safari supports NFC on macOS for Azure AD accounts.][n]|![Safari supports BLE on macOS for Azure AD accounts.][n]|
31
-
|**ChromeOS**|![Chrome supports USB on ChromeOS for Azure AD accounts.][y]*|![Chrome supports NFC on ChromeOS for Azure AD accounts.][n]|![Chrome supports BLE on ChromeOS for Azure AD accounts.][n]|![Edge supports USB on ChromeOS for Azure AD accounts.][n]|![Edge supports NFC on ChromeOS for Azure AD accounts.][n]|![Edge supports BLE on ChromeOS for Azure AD accounts.][n]|![Firefox supports USB on ChromeOS for Azure AD accounts.][n]|![Firefox supports NFC on ChromeOS for Azure AD accounts.][n]|![Firefox supports BLE on ChromeOS for Azure AD accounts.][n]|![Safari supports USB on ChromeOS for Azure AD accounts.][n]|![Safari supports NFC on ChromeOS for Azure AD accounts.][n]|![Safari supports BLE on ChromeOS for Azure AD accounts.][n]|
30
+
|**macOS**|![Chrome supports USB on macOS for Azure AD accounts.][y]|![Chrome supports NFC on macOS for Azure AD accounts.][n]|![Chrome supports BLE on macOS for Azure AD accounts.][n]|![Edge supports USB on macOS for Azure AD accounts.][y]|![Edge supports NFC on macOS for Azure AD accounts.][n]|![Edge supports BLE on macOS for Azure AD accounts.][n]|![Firefox supports USB on macOS for Azure AD accounts.][n]|![Firefox supports NFC on macOS for Azure AD accounts.][n]|![Firefox supports BLE on macOS for Azure AD accounts.][n]|![Safari supports USB on macOS for Azure AD accounts.][y]|![Safari supports NFC on macOS for Azure AD accounts.][n]|![Safari supports BLE on macOS for Azure AD accounts.][n]|
31
+
|**ChromeOS**|![Chrome supports USB on ChromeOS for Azure AD accounts.][y]|![Chrome supports NFC on ChromeOS for Azure AD accounts.][n]|![Chrome supports BLE on ChromeOS for Azure AD accounts.][n]|![Edge supports USB on ChromeOS for Azure AD accounts.][n]|![Edge supports NFC on ChromeOS for Azure AD accounts.][n]|![Edge supports BLE on ChromeOS for Azure AD accounts.][n]|![Firefox supports USB on ChromeOS for Azure AD accounts.][n]|![Firefox supports NFC on ChromeOS for Azure AD accounts.][n]|![Firefox supports BLE on ChromeOS for Azure AD accounts.][n]|![Safari supports USB on ChromeOS for Azure AD accounts.][n]|![Safari supports NFC on ChromeOS for Azure AD accounts.][n]|![Safari supports BLE on ChromeOS for Azure AD accounts.][n]|
32
32
|**Linux**|![Chrome supports USB on Linux for Azure AD accounts.][y]|![Chrome supports NFC on Linux for Azure AD accounts.][n]|![Chrome supports BLE on Linux for Azure AD accounts.][n]|![Edge supports USB on Linux for Azure AD accounts.][n]|![Edge supports NFC on Linux for Azure AD accounts.][n]|![Edge supports BLE on Linux for Azure AD accounts.][n]|![Firefox supports USB on Linux for Azure AD accounts.][n]|![Firefox supports NFC on Linux for Azure AD accounts.][n]|![Firefox supports BLE on Linux for Azure AD accounts.][n]|![Safari supports USB on Linux for Azure AD accounts.][n]|![Safari supports NFC on Linux for Azure AD accounts.][n]|![Safari supports BLE on Linux for Azure AD accounts.][n]|
33
-
|**iOS**|![Chrome supports USB on iOS for Azure AD accounts.][n]|![Chrome supports NFC on iOS for Azure AD accounts.][n]|![Chrome supports BLE on iOS for Azure AD accounts.][n]|![Edge supports USB on iOS for Azure AD accounts.][n]|![Edge supports NFC on Linux for Azure AD accounts.][n]|![Edge supports BLE on Linux for Azure AD accounts.][n]|![Firefox supports USB on Linux for Azure AD accounts.][n]|![Firefox supports NFC on iOS for Azure AD accounts.][n]|![Firefox supports BLE on iOS for Azure AD accounts.][n]|![Safari supports USB on iOS for Azure AD accounts.][n]|![Safari supports NFC on iOS for Azure AD accounts.][n]|![Safari supports BLE on iOS for Azure AD accounts.][n]|
33
+
|**iOS**|![Chrome supports USB on iOS for Azure AD accounts.][y]|![Chrome supports NFC on iOS for Azure AD accounts.][y]|![Chrome supports BLE on iOS for Azure AD accounts.][n]|![Edge supports USB on iOS for Azure AD accounts.][n]|![Edge supports NFC on Linux for Azure AD accounts.][n]|![Edge supports BLE on Linux for Azure AD accounts.][n]|![Firefox supports USB on Linux for Azure AD accounts.][n]|![Firefox supports NFC on iOS for Azure AD accounts.][n]|![Firefox supports BLE on iOS for Azure AD accounts.][n]|![Safari supports USB on iOS for Azure AD accounts.][y]|![Safari supports NFC on iOS for Azure AD accounts.][y]|![Safari supports BLE on iOS for Azure AD accounts.][n]|
34
34
|**Android**|![Chrome supports USB on Android for Azure AD accounts.][n]|![Chrome supports NFC on Android for Azure AD accounts.][n]|![Chrome supports BLE on Android for Azure AD accounts.][n]|![Edge supports USB on Android for Azure AD accounts.][n]|![Edge supports NFC on Android for Azure AD accounts.][n]|![Edge supports BLE on Android for Azure AD accounts.][n]|![Firefox supports USB on Android for Azure AD accounts.][n]|![Firefox supports NFC on Android for Azure AD accounts.][n]|![Firefox supports BLE on Android for Azure AD accounts.][n]|![Safari supports USB on Android for Azure AD accounts.][n]|![Safari supports NFC on Android for Azure AD accounts.][n]|![Safari supports BLE on Android for Azure AD accounts.][n]|
35
35
36
-
*Key Registration is currently not supported with ChromeOS/Chrome Browser.
36
+
- Key registration is currently not supported with ChromeOS/Chrome Browser.
37
+
- For iOS and macOS on Safari browser, PIN requests fail if the PIN isn't already set on the security key.
38
+
- Security key PIN for user verification isn't currently supported with Android.
39
+
40
+
>[!NOTE]
41
+
>This is the view for web support. Authentication for native apps in iOS and Android are not available yet.
37
42
38
43
## Unsupported browsers
39
44
40
-
The following operating system and browser combinations are not supported, but future support and testing is being investigated. If you would like to see other operating system and browser support, please leave feedback on our [product feedback site](https://feedback.azure.com/d365community/).
45
+
The following operating system and browser combinations aren't supported, but future support and testing is being investigated. If you would like to see other operating system and browser support, please leave feedback on our [product feedback site](https://feedback.azure.com/d365community/).
# Configure Azure AD Multi-Factor Authentication settings
20
20
21
21
To customize the end-user experience for Azure AD Multi-Factor Authentication, you can configure options for settings like account lockout thresholds or fraud alerts and notifications. Some settings are available directly in the Azure portal for Azure Active Directory (Azure AD), and some are in a separate Azure AD Multi-Factor Authentication portal.
22
-
22
+
23
23
The following Azure AD Multi-Factor Authentication settings are available in the Azure portal:
24
24
25
25
| Feature | Description |
26
26
| ------- | ----------- |
27
-
|[Account lockout](#account-lockout)| Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who enter a PIN to authenticate. (MFA Server only)|
27
+
|[Account lockout (MFA Server only)](#account-lockout-mfa-server-only)| Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who use MFA Server to enter a PIN to authenticate. |
28
28
|[Block/unblock users](#block-and-unblock-users)| Block specific users from being able to receive Azure AD Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they're blocked or until they're manually unblocked. |
29
29
|[Report suspicious activity](#report-suspicious-activity)| Configure settings that allow users to report fraudulent verification requests. |
30
30
|[Notifications](#notifications)| Enable notifications of events from MFA Server. |
@@ -34,9 +34,12 @@ The following Azure AD Multi-Factor Authentication settings are available in the
34
34
35
35

36
36
37
-
## Account lockout
37
+
## Account lockout (MFA Server only)
38
+
39
+
>[!NOTE]
40
+
>Account lockout only affects users who sign in by using MFA Server on-premises.
38
41
39
-
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt.
42
+
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt by using MFA Server on-premises.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-userdevicesettings.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,7 @@ ms.reviewer: michmcla, dawoo
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
+
18
19
# Manage user authentication methods for Azure AD Multi-Factor Authentication
19
20
20
21
Users in Azure AD have two distinct sets of contact information:
@@ -89,11 +90,8 @@ If you're assigned the *Authentication Administrator* role, you can require user
89
90
1. On the left, select **Azure Active Directory** > **Users** > **All users**.
90
91
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
91
92
-**Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
92
-
-**Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
93
-
94
-
> [!NOTE]
95
-
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
96
-
93
+
-**Require Re-register MFA** deactivates the user's hardware OATH tokens and deletes the following authentication methods from this user: phone numbers, Microsoft Authenticator apps and software OATH tokens. If needed, the user is requested to set up a new MFA authentication method the next time they sign in.
94
+
97
95
-**Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
98
96
99
97
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Azure portal":::
@@ -111,7 +109,7 @@ To delete a user's app passwords, complete the following steps:
111
109
1. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
112
110
1. Select **Manage user settings**, then check the box for **Delete all existing app passwords generated by the selected users**, as shown in the following example:
113
111

Custom controls are a preview capability of the Azure Active Directory. When using custom controls, your users are redirected to a compatible service to satisfy authentication requirements outside of Azure Active Directory. To satisfy this control, a user's browser is redirected to the external service, performs any required authentication, and is then redirected back to Azure Active Directory. Azure Active Directory verifies the response and, if the user was successfully authenticated or validated, the user continues in the Conditional Access flow.
21
21
22
-
> [!NOTE]
23
-
> For more information about changes we are planning to the Custom Control capability, see the February 2020 [Archive for What's new](../fundamentals/whats-new-archive.md#upcoming-changes-to-custom-controls).
@@ -22,15 +22,15 @@ This article defines authentication and authorization. It also briefly covers Mu
22
22
23
23
## Authentication
24
24
25
-
*Authentication* is the process of proving that you are who you say you are. This is achieved by verification of the identity of a person or device. It's sometimes shortened to *AuthN*. The Microsoft identity platform uses the [OpenID Connect](https://openid.net/connect/) protocol for handling authentication.
25
+
*Authentication* is the process of proving that you're who you say you are. This is achieved by verification of the identity of a person or device. It's sometimes shortened to *AuthN*. The Microsoft identity platform uses the [OpenID Connect](https://openid.net/connect/) protocol for handling authentication.
26
26
27
27
## Authorization
28
28
29
29
*Authorization* is the act of granting an authenticated party permission to do something. It specifies what data you're allowed to access and what you can do with that data. Authorization is sometimes shortened to *AuthZ*. The Microsoft identity platform uses the [OAuth 2.0](https://oauth.net/2/) protocol for handling authorization.
30
30
31
31
## Multifactor authentication
32
32
33
-
*Multifactor authentication* is the act of providing an additional factor of authentication to an account. This is often used to protect against brute force attacks. It is sometimes shortened to *MFA* or *2FA*. The [Microsoft Authenticator](https://support.microsoft.com/account-billing/set-up-the-microsoft-authenticator-app-as-your-verification-method-33452159-6af9-438f-8f82-63ce94cf3d29) can be used as an app for handling two-factor authentication. For more information, see [multifactor authentication](../authentication/concept-mfa-howitworks.md).
33
+
*Multifactor authentication* is the act of providing another factor of authentication to an account. This is often used to protect against brute force attacks. It's sometimes shortened to *MFA* or *2FA*. The [Microsoft Authenticator](https://support.microsoft.com/account-billing/set-up-the-microsoft-authenticator-app-as-your-verification-method-33452159-6af9-438f-8f82-63ce94cf3d29) can be used as an app for handling two-factor authentication. For more information, see [multifactor authentication](../authentication/concept-mfa-howitworks.md).
34
34
35
35
## Authentication and authorization using the Microsoft identity platform
0 commit comments