You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: How it works Azure MFA - Azure Active Directory
3
-
description: Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
2
+
title: Azure Multi-Factor Authentication overview
3
+
description: Learn how Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
The security of two-step verification lies in its layered approach. Compromising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user's password, it is useless without also having possession of the additional authentication method. It works by requiring two or more of the following authentication methods:
20
+
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
21
21
22
-
* Something you know (typically a password)
23
-
* Something you have (a trusted device that is not easily duplicated, like a phone)
24
-
* Something you are (biometrics)
22
+
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.
25
23
26
-
<center>
24
+

Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
29
27
30
-
Azure Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
28
+
* Something you know, typically a password.
29
+
* Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
30
+
* Something you are - biometrics like a fingerprint or face scan.
31
31
32
-
## How to get Multi-Factor Authentication?
32
+
Users can register themselves for both self-service password reset and Azure Multi-Factor Authentication in one step to simplify the on-boarding experience. Administrators can define what forms of secondary authentication can be used. Azure Multi-Factor Authentication can also be required when users perform a self-service password reset to further secure that process.
33
33
34
-
Multi-Factor Authentication comes as part of the following offerings:
34
+

35
35
36
-
***Azure Active Directory Premium** or **Microsoft 365 Business** - Full featured use of Azure Multi-Factor Authentication using Conditional Access policies to require multi-factor authentication.
36
+
Azure Multi-Factor Authentication helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
37
37
38
-
***Azure AD Free** or standalone **Office 365** licenses - Use [Security Defaults](../fundamentals/concept-fundamentals-security-defaults.md) to require multi-factor authentication for your users and administrators.
38
+
Your applications or services don't need to make any changes to use Azure Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in event, which automatically requests and processes the MFA challenge when required.
39
39
40
-
***Azure Active Directory Global Administrators** - A subset of Azure Multi-Factor Authentication capabilities are available as a means to protect global administrator accounts.
40
+
## Available verification methods
41
41
42
-
> [!NOTE]
43
-
> New customers may no longer purchase Azure Multi-Factor Authentication as a standalone offering effective September 1st, 2018. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
42
+
When a user signs in to an application or service and receive an MFA prompt, they can choose from one of their registered forms of additional verification. An administrator could require registration of these Azure Multi-Factor Authentication verification methods, or the user can access their own [My Profile](https://myprofile.microsoft.com) to edit or add verification methods.
44
43
45
-
## Supportability
44
+
The following additional forms of verification can be used with Azure Multi-Factor Authentication:
46
45
47
-
Since most users are accustomed to using only passwords to authenticate, it is important that your organization communicates to all users regarding this process. Awareness can reduce the likelihood that users call your help desk for minor issues related to MFA. However, there are some scenarios where temporarily disabling MFA is necessary. Use the following guidelines to understand how to handle those scenarios:
46
+
* Microsoft Authenticator app
47
+
* OATH Hardware token
48
+
* SMS
49
+
* Voice call
48
50
49
-
* Train your support staff to handle scenarios where the user can't sign in because they do not have access to their authentication methods or they are not working correctly.
50
-
* Using Conditional Access policies for Azure MFA Service, your support staff can add a user to a group that is excluded from a policy requiring MFA.
51
-
* Consider using Conditional Access named locations as a way to minimize two-step verification prompts. With this functionality, administrators can bypass two-step verification for users that are signing in from a secure trusted network location such as a network segment used for new user onboarding.
52
-
* Deploy [Azure AD Identity Protection](../active-directory-identityprotection.md) and trigger two-step verification based on risk detections.
51
+
## How to enable and use Azure Multi-Factor Authentication
52
+
53
+
Users and groups can be enabled for Azure Multi-Factor Authentication to prompt for additional verification during the sign-in event. [Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are available for all Azure AD tenants to quickly enable the use of the Microsoft Authenticator app for all users.
54
+
55
+
For more granular controls, [Conditional Access](../conditional-access/overview.md) policies can be used to define events or applications that require MFA. These policies can allow regular sign-in events when the user is on the corporate network or a registered device, but prompt for additional verification factors when remote or on a personal device.
56
+
57
+

Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-getstarted.md
+16-8Lines changed: 16 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Deploy Azure Multi-Factor Authentication - Azure Active Directory
3
-
description: Microsoft Azure Multi-Factor Authentication deployment planning
2
+
title: Deployment considerations for Azure Multi-Factor Authentication
3
+
description: Learn about deployment considerations and strategy for successful implementation of Azure Multi-Factor Authentication
4
4
5
5
services: multi-factor-authentication
6
6
ms.service: active-directory
@@ -15,12 +15,19 @@ ms.reviewer: michmcla
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Planning a cloud-based Azure Multi-Factor Authentication deployment
18
+
# Plan an Azure Multi-Factor Authentication deployment
19
19
20
20
People are connecting to organizational resources in increasingly complicated scenarios. People connect from organization-owned, personal, and public devices on and off the corporate network using smart phones, tablets, PCs, and laptops, often on multiple platforms. In this always-connected, multi-device and multi-platform world, the security of user accounts is more important than ever. Passwords, no matter their complexity, used across devices, networks, and platforms are no longer sufficient to ensure the security of the user account, especially when users tend to reuse passwords across accounts. Sophisticated phishing and other social engineering attacks can result in usernames and passwords being posted and sold across the dark web.
21
21
22
22
[Azure Multi-Factor Authentication (MFA)](concept-mfa-howitworks.md) helps safeguard access to data and applications. It provides an additional layer of security using a second form of authentication. Organizations can use [Conditional Access](../conditional-access/overview.md) to make the solution fit their specific needs.
23
23
24
+
This deployment guide shows you how to plan and then test an Azure Multi-Factor Authentication roll-out.
25
+
26
+
To quickly see Azure Multi-Factor Authentication in action and then come back to understand additional deployment considerations:
If your users were enabled using per-user enabled and enforced Azure Multi-Factor Authentication the following PowerShell can assist you in making the conversion to Conditional Access based Azure Multi-Factor Authentication.
172
179
173
-
Run this PowerShell in an ISE window or save as a .PS1 file to run locally.
180
+
Run this PowerShell in an ISE window or save as a `.PS1` file to run locally.
174
181
175
182
```PowerShell
176
183
# Sets the MFA requirement state
@@ -314,7 +321,7 @@ On each AD FS server, in the local computer My Store, there will be a self-signe
314
321
315
322
If the validity period of your certificates is nearing expiration, [generate and verify a new MFA certificate on each AD FS server](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa#configure-the-ad-fs-servers).
316
323
317
-
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for 2 years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
324
+
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for two years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
318
325
319
326
## Implement your plan
320
327
@@ -354,6 +361,7 @@ Find solutions for common issues with Azure MFA at the [Troubleshooting Azure Mu
354
361
355
362
## Next steps
356
363
357
-
*[What are authentication methods?](concept-authentication-methods.md)
358
-
*[Enable converged registration for Azure Multi-Factor Authentication and Azure AD self-service password reset](concept-registration-mfa-sspr-converged.md)
359
-
* Why was a user prompted or not prompted to perform MFA? See the section [Azure AD sign-ins report in the Reports in Azure Multi-Factor Authentication document](howto-mfa-reporting.md#azure-ad-sign-ins-report).
364
+
To see Azure Multi-Factor Authentication in action, complete the following tutorial:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-sspr-deployment.md
+20-13Lines changed: 20 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Self-service password reset deployment - Azure Active Directory
3
-
description: Strategy for successful implementation of Azure AD self-service password reset
2
+
title: Deployment considerations for Azure Active Directory self-service password reset
3
+
description: Learn about deployment considerations and strategy for successful implementation of Azure AD self-service password reset
4
4
5
5
services: active-directory
6
6
ms.service: active-directory
@@ -15,21 +15,28 @@ ms.reviewer: sahenry
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Plan an Azure Active Directory self-service password reset
18
+
# Plan an Azure Active Directory self-service password reset deployment
19
19
20
-
> [!NOTE]
21
-
> This deployment plan offers planning guidance and best practices for deploying Azure AD self-service password reset (SSPR). <br>**If you are looking for the SSPR tool to get back into your account, go to [https://aka.ms/sspr](https://aka.ms/sspr)**.
20
+
> [!IMPORTANT]
21
+
> This deployment plan offers guidance and best practices for deploying Azure AD self-service password reset (SSPR).
22
+
>
23
+
> **If you're and end user and need to get back into your account, go to [https://aka.ms/sspr](https://aka.ms/sspr)**.
22
24
23
-
[Self-Service Password Reset (SSPR)](https://www.youtube.com/watch?v=tnb2Qf4hTP8) is an Azure Active Directory (AD) feature that enables users to reset their passwords without contacting IT staff for help. The users can quickly unblock themselves and continue working no matter where they are or time of day. By allowing the employees to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.
25
+
[Self-Service Password Reset (SSPR)](https://www.youtube.com/watch?v=tnb2Qf4hTP8) is an Azure Active Directory (AD) feature that enables users to reset their passwords without contacting IT staff for help. The users can quickly unblock themselves and continue working no matter where they are or time of day. By allowing the employees to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.
24
26
25
27
SSPR has the following key capabilities:
26
28
27
29
* Self-service allows end users to reset their expired or non-expired passwords without contacting an administrator or helpdesk for support.
28
-
29
30
*[Password Writeback](https://docs.microsoft.com/azure/active-directory/authentication/concept-sspr-writeback) allows management of on-premises passwords and resolution of account lockout though the cloud.
30
-
31
31
* Password management activity reports give administrators insight into password reset and registration activity occurring in their organization.
32
32
33
+
This deployment guide shows you how to plan and then test an SSPR roll-out.
34
+
35
+
To quickly see SSPR in action and then come back to understand additional deployment considerations:
Learn more about SSPR. See [How it works: Azure AD self-service password reset](https://docs.microsoft.com/azure/active-directory/authentication/concept-sspr-howitworks).
@@ -131,7 +138,7 @@ Communication is critical to the success of any new service. You should proactiv
131
138
132
139
### Plan a pilot
133
140
134
-
We recommend that the initial configuration of SSPR be in a test environment. Start with a pilot group by enabling SSPR for a subset of users in your organization. See [Best practices for a pilot](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-deployment-plans).
141
+
We recommend that the initial configuration of SSPR is in a test environment. Start with a pilot group by enabling SSPR for a subset of users in your organization. See [Best practices for a pilot](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-deployment-plans).
135
142
136
143
To create a group, see how to [create a group and add members in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-groups-create-azure-portal).
137
144
@@ -210,7 +217,7 @@ We recommend that you don't sync your on-prem Active Directory admin accounts wi
210
217
211
218
### Environments with multiple identity management systems
212
219
213
-
Some environments have multiple identity management systems. On-premesis identity managers like Oracle AM and SiteMinder, require synchronization with AD for passwords. You can do this using a tool like the Password Change Notification Service (PCNS) with Microsoft Identity Manager (MIM). To find information on this more complex scenario, see the article [Deploy the MIM Password Change Notification Service on a domain controller](https://docs.microsoft.com/microsoft-identity-manager/deploying-mim-password-change-notification-service-on-domain-controller).
220
+
Some environments have multiple identity management systems. On-premises identity managers like Oracle AM and SiteMinder, require synchronization with AD for passwords. You can do this using a tool like the Password Change Notification Service (PCNS) with Microsoft Identity Manager (MIM). To find information on this more complex scenario, see the article [Deploy the MIM Password Change Notification Service on a domain controller](https://docs.microsoft.com/microsoft-identity-manager/deploying-mim-password-change-notification-service-on-domain-controller).
214
221
215
222
## Plan Testing and Support
216
223
@@ -252,7 +259,7 @@ To enable your support team's success, you can create a FAQ based on questions y
252
259
| User can't set a new password| A user completes verification during the password reset flow but can't set a new password. |
253
260
| User doesn't see a Reset Password link on a Windows 10 device| A user is trying to reset password from the Windows 10 lock screen, but the device is either not joined to Azure AD, or the Intune device policy isn't enabled |
254
261
255
-
### Plan roll back
262
+
### Plan rollback
256
263
257
264
To roll back the deployment:
258
265
@@ -292,7 +299,7 @@ See [Enable self-service password reset](https://docs.microsoft.com/azure/active
For machines running Windows 7, 8, 8.1, and 10 you can [enable users to reset their password at the Windows login screen](https://docs.microsoft.com/azure/active-directory/authentication/howto-sspr-windows)
302
+
For machines running Windows 7, 8, 8.1, and 10 you can [enable users to reset their password at the Windows sign in screen](https://docs.microsoft.com/azure/active-directory/authentication/howto-sspr-windows)
296
303
297
304
## Manage SSPR
298
305
@@ -333,7 +340,7 @@ Audit logs for registration and password reset are available for 30 days. If sec
333
340
334
341
## Next steps
335
342
336
-
* To get started deploying SSPR, see [Complete an Azure AD self-service password reset pilot roll out](https://docs.microsoft.com/azure/active-directory/authentication/tutorial-sspr-pilot)
343
+
* To get started deploying SSPR, see [Enable Azure AD self-service password reset](https://docs.microsoft.com/azure/active-directory/authentication/tutorial-enable-sspr.md)
337
344
338
345
*[Consider implementing Azure AD password protection](https://docs.microsoft.com/azure/active-directory/authentication/concept-password-ban-bad)
0 commit comments