Skip to content

Commit 50ddc5d

Browse files
authored
Merge pull request #219708 from MicrosoftDocs/main
11/28 PM Publish
2 parents e0a78ac + 6d54f2c commit 50ddc5d

File tree

139 files changed

+938
-534
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+938
-534
lines changed

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 28 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 11/11/2022
7+
ms.date: 11/23/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -23,9 +23,6 @@ This topic covers how to enable number matching in Microsoft Authenticator push
2323

2424
- Your organization needs to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
2525

26-
>[!NOTE]
27-
>The policy schema for Microsoft Graph APIs has been improved. The older policy schema is now deprecated. Make sure you use the new schema to help prevent errors.
28-
2926
- If your organization is using AD FS adapter or NPS extensions, upgrade to the latest versions for a consistent experience.
3027

3128
## Number matching
@@ -40,9 +37,6 @@ Number matching is available for the following scenarios. When enabled, all scen
4037
- [AD FS adapter](howto-mfaserver-adfs-windows-server.md)
4138
- [NPS extension](howto-mfa-nps-extension.md)
4239

43-
>[!NOTE]
44-
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
45-
4640
Number matching is available for sign-in for Azure Government. However, it's currently not available for Authenticator setup in combined registration. Number matching will be available for Authenticator setup in [combined registration](howto-registration-mfa-sspr-combined.md) by November 30, 2022 for Azure Government.
4741

4842
Number matching isn't supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
@@ -67,9 +61,8 @@ The AD FS adapter supports number matching after installing an update. Unpatched
6761

6862
| Version | Update |
6963
|---------|--------|
70-
| Windows Server 2022 | [October 26, 2021—KB5006745 (OS Build 20348.320) Preview](https://support.microsoft.com/topic/october-26-2021-kb5006745-os-build-20348-320-preview-8ff9319a-19e7-40c7-bbd1-cd70fcca066c) |
71-
| Windows Server 2019 | [October 19, 2021—KB5006744 (OS Build 17763.2268) Preview](https://support.microsoft.com/topic/october-19-2021-kb5006744-os-build-17763-2268-preview-e043a8a3-901b-4190-bb6b-f5a4137411c0) |
72-
| Windows Server 2016 | [October 12, 2021—KB5006669 (OS Build 14393.4704)](https://support.microsoft.com/topic/october-12-2021-kb5006669-os-build-14393-4704-bcc95546-0768-49ae-bec9-240cc59df384) |
64+
| Windows Server 2022 | [November 9, 2021—KB5007205 (OS Build 20348.350)](https://support.microsoft.com/topic/november-9-2021-kb5007205-os-build-20348-350-af102e6f-cc7c-4cd4-8dc2-8b08d73d2b31) |
65+
| Windows Server 2019 | [November 9, 2021—KB5007206 (OS Build 17763.2300)](https://support.microsoft.com/topic/november-9-2021-kb5007206-os-build-17763-2300-c63b76fa-a9b4-4685-b17c-7d866bb50e48) |
7366

7467

7568
### NPS extension
@@ -89,7 +82,22 @@ To create the registry key that overrides push notifications:
8982
Value = TRUE
9083
1. Restart the NPS Service.
9184

92-
### Policy schema changes
85+
## Enable number matching in the portal
86+
87+
To enable number matching in the Azure AD portal, complete the following steps:
88+
89+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
90+
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone or add selected users and groups. Set the **Authentication mode** for these users/groups to **Any**/**Push**.
91+
92+
Only users who are enabled for Microsoft Authenticator here can be included in the policy to require number matching for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature.
93+
94+
:::image type="content" border="true" source="./media/how-to-mfa-number-match/enable-settings-number-match.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Push authentication mode.":::
95+
96+
1. On the **Configure** tab, for **Require number matching for push notifications**, change **Status** to **Enabled**, choose who to include or exclude from number matching, and click **Save**.
97+
98+
:::image type="content" border="true" source="./media/how-to-mfa-number-match/number-match.png" alt-text="Screenshot of how to enable number matching.":::
99+
100+
## Enable number matching using Graph APIs
93101

94102
Identify your single target group for the schema configuration. Then use the following API endpoint to change the numberMatchingRequiredState property under featureSettings to **enabled**, and include or exclude groups:
95103

@@ -98,10 +106,10 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
98106
```
99107

100108
>[!NOTE]
101-
>Make sure you use the new policy schema for Microsoft Graph APIs. In Graph Explorer, you'll need to consent to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
109+
>In Graph Explorer, you'll need to consent to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
102110
103111

104-
#### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
112+
### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
105113

106114
**PROPERTIES**
107115

@@ -117,7 +125,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
117125
| includeTargets | [microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of users or groups who are enabled to use the authentication method |
118126
| featureSettings | [microsoftAuthenticatorFeatureSettings](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of Microsoft Authenticator features. |
119127

120-
#### MicrosoftAuthenticator includeTarget properties
128+
### MicrosoftAuthenticator includeTarget properties
121129

122130
**PROPERTIES**
123131

@@ -129,7 +137,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
129137

130138

131139

132-
#### MicrosoftAuthenticator featureSettings properties
140+
### MicrosoftAuthenticator featureSettings properties
133141

134142
**PROPERTIES**
135143

@@ -139,7 +147,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
139147
| displayAppInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown application name in Microsoft Authenticator notification. |
140148
| displayLocationInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown geographic location context in Microsoft Authenticator notification. |
141149

142-
#### Authentication method feature configuration properties
150+
### Authentication method feature configuration properties
143151

144152
**PROPERTIES**
145153

@@ -149,7 +157,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
149157
| includeTarget | featureTarget | A single entity that is included in this feature. <br>You can only include one group for number matching.|
150158
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
151159

152-
#### Feature target properties
160+
### Feature target properties
153161

154162
**PROPERTIES**
155163

@@ -161,7 +169,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
161169
>[!NOTE]
162170
>Number matching can be enabled only for a single group.
163171
164-
#### Example of how to enable number matching for all users
172+
### Example of how to enable number matching for all users
165173

166174
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** from **default** to **enabled**.
167175

@@ -216,7 +224,7 @@ To confirm the change is applied, run the GET request by using the following end
216224
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
217225
```
218226

219-
#### Example of how to enable number matching for a single group
227+
### Example of how to enable number matching for a single group
220228

221229
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
222230
Inside the **includeTarget**, you'll need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
@@ -262,7 +270,7 @@ To verify, run GET again and verify the ObjectID:
262270
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
263271
```
264272

265-
#### Example of removing the excluded group from number matching
273+
### Example of removing the excluded group from number matching
266274

267275
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
268276
You need to change the **id** of the **excludeTarget** to `00000000-0000-0000-0000-000000000000`.
@@ -302,58 +310,6 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
302310
}
303311
```
304312

305-
### Turn off number matching
306-
307-
To turn number matching off, you'll need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
308-
309-
```json
310-
{
311-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
312-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
313-
"id": "MicrosoftAuthenticator",
314-
"state": "enabled",
315-
"featureSettings": {
316-
"numberMatchingRequiredState": {
317-
"state": "default",
318-
"includeTarget": {
319-
"targetType": "group",
320-
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a"
321-
},
322-
"excludeTarget": {
323-
"targetType": "group",
324-
"id": " 00000000-0000-0000-0000-000000000000"
325-
}
326-
}
327-
},
328-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
329-
"includeTargets": [
330-
{
331-
"targetType": "group",
332-
"id": "all_users",
333-
"isRegistrationRequired": false,
334-
"authenticationMode": "any"
335-
}
336-
]
337-
}
338-
```
339-
340-
## Enable number matching in the portal
341-
342-
To enable number matching in the Azure AD portal, complete the following steps:
343-
344-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
345-
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone or add selected users and groups. Set the **Authentication mode** for these users/groups to **Any**/**Push**.
346-
347-
Only users who are enabled for Microsoft Authenticator here can be included in the policy to require number matching for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature.
348-
349-
:::image type="content" border="true" source="./media/how-to-mfa-number-match/enable-settings-number-match.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Push authentication mode.":::
350-
351-
1. On the **Configure** tab, for **Require number matching for push notifications**, change **Status** to **Enabled**, choose who to include or exclude from number matching, and click **Save**.
352-
353-
:::image type="content" border="true" source="./media/how-to-mfa-number-match/number-match.png" alt-text="Screenshot of how to enable number matching.":::
354-
355-
356-
357313
## FAQs
358314

359315
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?

0 commit comments

Comments
 (0)