You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Configure Azure AD Multi-Factor Authentication settings
20
20
21
21
To customize the end-user experience for Azure AD Multi-Factor Authentication, you can configure options for settings like account lockout thresholds or fraud alerts and notifications. Some settings are available directly in the Azure portal for Azure Active Directory (Azure AD), and some are in a separate Azure AD Multi-Factor Authentication portal.
22
-
22
+
23
23
The following Azure AD Multi-Factor Authentication settings are available in the Azure portal:
24
24
25
25
| Feature | Description |
26
26
| ------- | ----------- |
27
-
|[Account lockout](#account-lockout)| Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who enter a PIN to authenticate. (MFA Server only)|
27
+
|[Account lockout (MFA Server only)](#account-lockout-mfa-server-only)| Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who use MFA Server to enter a PIN to authenticate. |
28
28
|[Block/unblock users](#block-and-unblock-users)| Block specific users from being able to receive Azure AD Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they're blocked or until they're manually unblocked. |
29
29
|[Report suspicious activity](#report-suspicious-activity)| Configure settings that allow users to report fraudulent verification requests. |
30
30
|[Notifications](#notifications)| Enable notifications of events from MFA Server. |
@@ -34,9 +34,12 @@ The following Azure AD Multi-Factor Authentication settings are available in the
34
34
35
35

36
36
37
-
## Account lockout
37
+
## Account lockout (MFA Server only)
38
+
39
+
>[!NOTE]
40
+
>Account lockout only affects users who sign in by using MFA Server on-premises.
38
41
39
-
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt.
42
+
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt by using MFA Server on-premises.
0 commit comments