You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**Authentication, single sign-on, and MFA**|Cloud authentication (Pass-through authentication, password hash synchronization) |✅|
30
29
|| Federated authentication (Active Directory Federation Services or federation with other identity providers) |✅|
31
30
|| Single sign-on (SSO) unlimited |✅|
32
31
|| Multifactor authentication (MFA) | Hardware OATH tokens are not available. Instead, use Conditional Access policies with named locations to establish when multifactor authentication should and should not be required based off the user's current IP address. Microsoft Authenticator only shows GUID and not UPN for compliance reasons. |
33
32
|| Passwordless (Windows Hello for Business, Microsoft Authenticator, FIDO2 security key integrations) |✅|
34
33
|| Service-level agreement |✅|
35
-
|**Applications access**|||
36
-
|| SaaS apps with modern authentication (Azure AD application gallery apps, SAML, and OAUTH 2.0) |✅|
34
+
|**Applications access**|SaaS apps with modern authentication (Azure AD application gallery apps, SAML, and OAUTH 2.0) |✅|
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-registration-campaign.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 02/28/2022
9
+
ms.date: 03/22/2022
10
10
11
11
ms.author: justinha
12
12
author: mjsantani
@@ -101,7 +101,7 @@ The following table lists **authenticationMethodsRegistrationCampaign** properti
101
101
| Name | Possible values | Description |
102
102
|------|-----------------|-------------|
103
103
| state | "enabled"<br>"disabled"<br>"default" | Allows you to enable or disable the feature.<br>Default value is used when the configuration hasn't been explicitly set and will use Azure AD default value for this setting. Currently maps to disabled.<br>Change states to either enabled or disabled as needed. |
104
-
| snoozeDurationInDays | Range: 0 – 14 | Defines after how many days the user will see the nudge again.<br>If the value is 0, the user is nudged during every MFA attempt.<br>Default: 1 day |
104
+
| snoozeDurationInDays | Range: 0 – 14 | Defines the number of days before the user is nudged again.<br>If the value is 0, the user is nudged during every MFA attempt.<br>Default: 1 day |
105
105
| includeTargets | N/A | Allows you to include different users and groups that you want the feature to target. |
106
106
| excludeTargets | N/A | Allows you to exclude different users and groups that you want omitted from the feature. If a user is in a group that is excluded and a group that is included, the user will be excluded from the feature.|
@@ -24,7 +24,7 @@ The following Azure AD Multi-Factor Authentication settings are available in the
24
24
25
25
| Feature | Description |
26
26
| ------- | ----------- |
27
-
|[Account lockout](#account-lockout)| Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who enter a PIN to authenticate. (MFA Server) |
27
+
|[Account lockout](#account-lockout)| Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who enter a PIN to authenticate. (MFA Server only) |
28
28
|[Block/unblock users](#block-and-unblock-users)| Block specific users from being able to receive Azure AD Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they're blocked or until they're manually unblocked. |
29
29
|[Fraud alert](#fraud-alert)| Configure settings that allow users to report fraudulent verification requests. |
30
30
|[Notifications](#notifications)| Enable notifications of events from MFA Server. |
0 commit comments