You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 06/01/2023
9
+
ms.date: 09/14/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -96,7 +96,7 @@ The following core requirements apply:
96
96
97
97
> [!NOTE]
98
98
> Some endpoints, such as the CRL endpoint, are not addressed in this article. For a list of all supported endpoints, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online).
99
-
>In addition, other endpoints are required for Azure portal authentication. For more information, see [Azure portal URLs for proxy bypass](/azure/azure-portal/azure-portal-safelist-urls?tabs=public-cloud#azure-portal-urls-for-proxy-bypass).
99
+
>In addition, other endpoints are required for Microsoft Entra admin center authentication. For more information, see [Microsoft Entra admin center URLs for proxy bypass](/azure/azure-portal/azure-portal-safelist-urls?tabs=public-cloud#azure-portal-urls-for-proxy-bypass).
100
100
101
101
### Azure AD Password Protection DC agent
102
102
@@ -243,7 +243,7 @@ To install the Azure AD Password Protection proxy service, complete the followin
243
243
>
244
244
> You may also see MFA required if Azure Device Registration (which is used under the covers by Azure AD Password Protection) has been configured to globally require MFA. To workaround this requirement you may use a different account that supports MFA with one of the previous two authentication modes, or you may also temporarily relax the Azure Device Registration MFA requirement.
245
245
>
246
-
> To make this change, search for and select **Azure Active Directory** in the Azure portal, then select **Devices > Device Settings**. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
246
+
> To make this change, search for and select then select **Devices > Device Settings** in the Microsoft Entra admin center. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
247
247
>
248
248
> We recommend that MFA requirements be bypassed for test purposes only.
249
249
@@ -296,7 +296,7 @@ To install the Azure AD Password Protection proxy service, complete the followin
296
296
>
297
297
> You may also see MFA required if Azure Device Registration (which is used under the covers by Azure AD Password Protection) has been configured to globally require MFA. To workaround this requirement you may use a different account that supports MFA with one of the previous two authentication modes, or you may also temporarily relax the Azure Device Registration MFA requirement.
298
298
>
299
-
> To make this change, search for and select **Azure Active Directory** in the Azure portal, then select **Devices > Device Settings**. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
299
+
> To make this change, search for and select **Devices > Device Settings** in the Microsoft Entra admin center. Set **Require Multi-Factor Auth to join devices** to *No*. Be sure to reconfigure this setting back to *Yes* once registration is complete.
300
300
>
301
301
> We recommend that MFA requirements be bypassed for test purposes only.
302
302
@@ -400,7 +400,7 @@ The software installation, or uninstallation, requires a restart. This requireme
400
400
401
401
The installation of on-prem Azure AD Password Protection is complete after the DC agent software is installed on a domain controller, and that computer is rebooted. No other configuration is required or possible. Password change events against the on-prem DCs use the configured banned password lists from Azure AD.
402
402
403
-
To enable on-prem Azure AD Password Protection from the Azure portal or configure custom banned passwords, see [Enable on-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-operations.md).
403
+
To enable on-prem Azure AD Password Protection or configure custom banned passwords, see [Enable on-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-operations.md).
404
404
405
405
> [!TIP]
406
406
> You can install the Azure AD Password Protection DC agent on a machine that's not yet a domain controller. In this case, the service starts and runs but remain inactive until the machine is promoted to be a domain controller.
@@ -436,4 +436,4 @@ The `Get-AzureADPasswordProtectionDCAgent` cmdlet may be used to query the softw
436
436
437
437
## Next steps
438
438
439
-
Now that you've installed the services that you need for Azure AD Password Protection on your on-premises servers, [enable on-prem Azure AD Password Protection in the Azure portal](howto-password-ban-bad-on-premises-operations.md) to complete your deployment.
439
+
Now that you've installed the services that you need for Azure AD Password Protection on your on-premises servers, [enable on-prem Azure AD Password Protection](howto-password-ban-bad-on-premises-operations.md) to complete your deployment.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 06/08/2023
9
+
ms.date: 09/14/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -38,7 +38,8 @@ For more information about creating trusted locations in Conditional Access, see
38
38
39
39
Complete the following steps to create a policy that applies to all selected users that attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network:
40
40
41
-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**.
41
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
42
+
1. Browse to **Protection** > **Conditional Access**.
42
43
1. Select **+ New policy**.
43
44
1. Enter a name for this policy, such as *Combined Security Info Registration on Trusted Networks*.
44
45
1. Under **Assignments**, select **Users**. Choose the users and groups you want this policy to apply to.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-sspr-authenticationdata.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 04/26/2023
9
+
ms.date: 09/14/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -45,9 +45,9 @@ After a user verifies their mobile phone number, the *Phone* field under **Authe
45
45
46
46
## Authentication contact info
47
47
48
-
On the **Authentication methods** page for an Azure AD user in the Azure portal, a Global Administrator can manually set the authentication contact information. You can review existing methods under the *Usable authentication methods* section, or **+Add authentication methods**, as shown in the following example screenshot:
48
+
On the **Authentication methods** page for an Azure AD user in the Microsoft Entra admin center, a Global Administrator can manually set the authentication contact information. You can review existing methods under the *Usable authentication methods* section, or **+Add authentication methods**, as shown in the following example screenshot:
49
49
50
-
:::image type="content" source="media/howto-sspr-authenticationdata/user-authentication-contact-info.png" alt-text="Manage authentication methods from the Azure portal":::
50
+
:::image type="content" source="media/howto-sspr-authenticationdata/user-authentication-contact-info.png" alt-text="Screenshot of how to manage authentication methods":::
51
51
52
52
The following considerations apply for this authentication contact info:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-sspr-customization.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 02/01/2023
9
+
ms.date: 09/14/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -69,7 +69,7 @@ The graphics you choose are shown in the following circumstances:
69
69
70
70
### Directory name
71
71
72
-
To make things look more user-friendly, you can change organization name in the portal and in the automated communications. To change the directory name attribute in the Azure portal, browse to **Azure Active Directory** > **Properties**. This friendly organization name option is the most visible in automated emails, as in the following examples:
72
+
To make things look more user-friendly, you can change organization name in the portal and in the automated communications. To change the directory name attribute in the Microsoft Entra admin center, sign in as a Global Administrator and browse to **Identity** > **Overview** > **Properties**. This friendly organization name option is the most visible in automated emails, as in the following examples:
73
73
74
74
* The friendly name in the email, for example "*Microsoft on behalf of CONTOSO demo*"
75
75
* The subject line in the email, for example "*CONTOSO demo account email verification code*"
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-sspr-deployment.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -261,9 +261,7 @@ You can also refer to [Complete out an Azure AD self-service password reset pilo
261
261
262
262
### Plan support
263
263
264
-
While SSPR does not typically create user issues, it is important to prepare support staff to deal with issues that may arise. While an administrator can reset the password for end users through the Azure portal, it is better to help resolve the issue via a self-service support process.
265
-
266
-
To enable your support team's success, you can create a FAQ based on questions you receive from your users. Here are a few examples:
264
+
While SSPR does not typically create user issues, it is important to prepare support staff to deal with issues that may arise. To enable your support team's success, you can create a FAQ based on questions you receive from your users. Here are a few examples:
267
265
268
266
| Scenarios| Description |
269
267
| - | - |
@@ -319,10 +317,10 @@ Azure AD can provide additional information on your SSPR performance through aud
319
317
320
318
### Password management activity reports
321
319
322
-
You can use pre-built reports on Azure portal to measure the SSPR performance. If you're appropriately licensed, you can also create custom queries. For more information, see [Reporting options for Azure AD password management](./howto-sspr-reporting.md)
320
+
You can use pre-built reports on Microsoft Entra admin center to measure the SSPR performance. If you're appropriately licensed, you can also create custom queries. For more information, see [Reporting options for Azure AD password management](./howto-sspr-reporting.md)
323
321
324
322
> [!NOTE]
325
-
> You must be [a global administrator](../roles/permissions-reference.md), and you must opt-in for this data to be gathered for your organization. To opt in, you must visit the Reporting tab or the audit logs on the Azure portal at least once. Until then, the data doesn't collect for your organization.
323
+
> You must be [a global administrator](../roles/permissions-reference.md), and you must opt-in for this data to be gathered for your organization. To opt in, you must visit the Reporting tab or the audit logs on the Microsoft Entra admin center at least once. Until then, the data doesn't collect for your organization.
326
324
327
325
Audit logs for registration and password reset are available for 30 days. If security auditing within your corporation requires longer retention, the logs need to be exported and consumed into a SIEM tool such as [Microsoft Sentinel](../../sentinel/connect-azure-active-directory.md), Splunk, or ArcSight.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-sspr-reporting.md
+15-17Lines changed: 15 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: active-directory
5
5
ms.service: active-directory
6
6
ms.subservice: authentication
7
7
ms.topic: how-to
8
-
ms.date: 01/29/2023
8
+
ms.date: 09/14/2023
9
9
ms.author: justinha
10
10
author: justinha
11
11
manager: amycolannino
@@ -19,10 +19,10 @@ After deployment, many organizations want to know how or if self-service passwor
19
19
20
20
![Reporting on SSPR using the audit logs in Azure AD][Reporting]
21
21
22
-
The following questions can be answered by the reports that exist in the [Azure portal](https://portal.azure.com):
22
+
The following questions can be answered by the reports that exist in the [Microsoft Entra admin center](https://entra.microsoft.com):
23
23
24
24
> [!NOTE]
25
-
> You must be [a global administrator](../roles/permissions-reference.md), and you must opt-in for this data to be gathered on behalf of your organization. To opt in, you must visit the **Reporting** tab or the audit logs at least once. Until then, data is not collected for your organization.
25
+
> You must be [a Global Administrator](../roles/permissions-reference.md), and you must opt-in for this data to be gathered on behalf of your organization. To opt in, you must visit the **Reporting** tab or the audit logs at least once. Until then, data is not collected for your organization.
26
26
>
27
27
28
28
* How many people have registered for password reset?
@@ -34,16 +34,14 @@ The following questions can be answered by the reports that exist in the [Azure
34
34
* What admins are resetting their own passwords frequently?
35
35
* Is there any suspicious activity going on with password reset?
36
36
37
-
## How to view password management reports in the Azure portal
In the Azure portal experience, we have improved the way that you can view password reset and password reset registration activity. Use the following the steps to find the password reset and password reset registration events:
41
+
Use the following the steps to find the password reset and password reset registration events:
42
42
43
-
1. Sign in to the [Azure portal](https://portal.azure.com).
44
-
2. Select **All services** in the left pane.
45
-
3. Search for **Azure Active Directory** in the list of services and select it.
46
-
4. Select **Users** from the Manage section.
43
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
44
+
1. Browse to **Identity** > **Users**.
47
45
5. Select **Audit Logs** from the **Users** blade. This shows you all of the audit events that occurred against all the users in your directory. You can filter this view to see all the password-related events.
48
46
6. From the **Filter** menu at the top of the pane, select the **Service** drop-down list, and change it to the **Self-service Password Management** service type.
49
47
7. Optionally, further filter the list by choosing the specific **Activity** you're interested in.
@@ -52,18 +50,18 @@ In the Azure portal experience, we have improved the way that you can view passw
52
50
53
51
[Combined registration](./concept-registration-mfa-sspr-combined.md) security information registration and management events can be found in the audit logs under **Security** > **Authentication Methods**.
54
52
55
-
## Description of the report columns in the Azure portal
53
+
## Description of the report columns
56
54
57
-
The following list explains each of the report columns in the Azure portal in detail:
55
+
The following list explains each of the report columns in detail:
58
56
59
57
***User**: The user who attempted a password reset registration operation.
60
58
***Role**: The role of the user in the directory.
61
59
***Date and Time**: The date and time of the attempt.
62
60
***Data Registered**: The authentication data that the user provided during password reset registration.
63
61
64
-
## Description of the report values in the Azure portal
62
+
## Description of the report values
65
63
66
-
The following table describes the different values that are you can set for each column in the Azure portal:
64
+
The following table describes the different values that are you can set for each column:
67
65
68
66
| Column | Permitted values and their meanings |
69
67
| --- | --- |
@@ -75,10 +73,10 @@ The following activity types appear in the **Self-Service Password Management**
75
73
76
74
*[Blocked from self-service password reset](#activity-type-blocked-from-self-service-password-reset): Indicates that a user tried to reset a password, use a specific gate, or validate a phone number more than five total times in 24 hours.
77
75
*[Change password (self-service)](#activity-type-change-password-self-service): Indicates that a user performed a voluntary, or forced (due to expiry) password change.
78
-
*[Reset password (by admin)](#activity-type-reset-password-by-admin): Indicates that an administrator performed a password reset on behalf of a user from the Azure portal.
79
-
*[Reset password (self-service)](#activity-type-reset-password-self-service): Indicates that a user successfully reset their password from the [Azure AD password reset portal](https://passwordreset.microsoftonline.com).
76
+
*[Reset password (by admin)](#activity-type-reset-password-by-admin): Indicates that an administrator performed a password reset on behalf of a user.
77
+
*[Reset password (self-service)](#activity-type-reset-password-self-service): Indicates that a user successfully reset their password from [Azure AD password reset](https://passwordreset.microsoftonline.com).
80
78
*[Self-service password reset flow activity progress](#activity-type-self-serve-password-reset-flow-activity-progress): Indicates each specific step a user proceeds through, such as passing a specific password reset authentication gate, as part of the password reset process.
81
-
*[Unlock user account (self-service)](#activity-type-unlock-a-user-account-self-service)): Indicates that a user successfully unlocked their Active Directory account without resetting their password from the [Azure AD password reset portal](https://passwordreset.microsoftonline.com) by using the Active Directory feature of account unlock without reset.
79
+
*[Unlock user account (self-service)](#activity-type-unlock-a-user-account-self-service): Indicates that a user successfully unlocked their Active Directory account without resetting their password from the [Azure AD password reset portal](https://passwordreset.microsoftonline.com) by using the Active Directory feature of account unlock without reset.
82
80
*[User registered for self-service password reset](#activity-type-user-registered-for-self-service-password-reset): Indicates that a user has registered all the required information to be able to reset their password in accordance with the currently specified tenant password reset policy.
83
81
84
82
### Activity type: Blocked from self-service password reset
@@ -109,7 +107,7 @@ The following list explains this activity in detail:
109
107
110
108
The following list explains this activity in detail:
111
109
112
-
***Activity description**: Indicates that an administrator performed a password reset on behalf of a user from the Azure portal.
110
+
***Activity description**: Indicates that an administrator performed a password reset on behalf of a user.
113
111
***Activity actor**: The administrator who performed the password reset on behalf of another end user or administrator. Must be a password administrator, user administrator, or helpdesk administrator.
114
112
***Activity target**: The user whose password was reset. The user can be an end user or a different administrator.
0 commit comments