Skip to content

Commit 556287d

Browse files
authored
Merge pull request #110249 from iainfoulds/azuread-authentication-freshness04032020
[AzureAD] Updates and edits
2 parents ae9a62b + ffb4e74 commit 556287d

File tree

3 files changed

+70
-45
lines changed

3 files changed

+70
-45
lines changed
Lines changed: 34 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: How it works Azure MFA - Azure Active Directory
3-
description: Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
2+
title: Azure Multi-Factor Authentication overview
3+
description: Learn how Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/21/2019
9+
ms.date: 04/03/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -17,40 +17,50 @@ ms.collection: M365-identity-device-management
1717
---
1818
# How it works: Azure Multi-Factor Authentication
1919

20-
The security of two-step verification lies in its layered approach. Compromising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user's password, it is useless without also having possession of the additional authentication method. It works by requiring two or more of the following authentication methods:
20+
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
2121

22-
* Something you know (typically a password)
23-
* Something you have (a trusted device that is not easily duplicated, like a phone)
24-
* Something you are (biometrics)
22+
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.
2523

26-
<center>
24+
![Conceptual image of the different forms of multi-factor authentication](./media/concept-mfa-howitworks/methods.png)
2725

28-
![Conceptual authentication methods image](./media/concept-mfa-howitworks/methods.png)</center>
26+
Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
2927

30-
Azure Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
28+
* Something you know, typically a password.
29+
* Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
30+
* Something you are - biometrics like a fingerprint or face scan.
3131

32-
## How to get Multi-Factor Authentication?
32+
Users can register themselves for both self-service password reset and Azure Multi-Factor Authentication in one step to simplify the on-boarding experience. Administrators can define what forms of secondary authentication can be used. Azure Multi-Factor Authentication can also be required when users perform a self-service password reset to further secure that process.
3333

34-
Multi-Factor Authentication comes as part of the following offerings:
34+
![Authentication methods in use at the sign-in screen](media/concept-authentication-methods/overview-login.png)
3535

36-
* **Azure Active Directory Premium** or **Microsoft 365 Business** - Full featured use of Azure Multi-Factor Authentication using Conditional Access policies to require multi-factor authentication.
36+
Azure Multi-Factor Authentication helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
3737

38-
* **Azure AD Free** or standalone **Office 365** licenses - Use [Security Defaults](../fundamentals/concept-fundamentals-security-defaults.md) to require multi-factor authentication for your users and administrators.
38+
Your applications or services don't need to make any changes to use Azure Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in event, which automatically requests and processes the MFA challenge when required.
3939

40-
* **Azure Active Directory Global Administrators** - A subset of Azure Multi-Factor Authentication capabilities are available as a means to protect global administrator accounts.
40+
## Available verification methods
4141

42-
> [!NOTE]
43-
> New customers may no longer purchase Azure Multi-Factor Authentication as a standalone offering effective September 1st, 2018. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
42+
When a user signs in to an application or service and receive an MFA prompt, they can choose from one of their registered forms of additional verification. An administrator could require registration of these Azure Multi-Factor Authentication verification methods, or the user can access their own [My Profile](https://myprofile.microsoft.com) to edit or add verification methods.
4443

45-
## Supportability
44+
The following additional forms of verification can be used with Azure Multi-Factor Authentication:
4645

47-
Since most users are accustomed to using only passwords to authenticate, it is important that your organization communicates to all users regarding this process. Awareness can reduce the likelihood that users call your help desk for minor issues related to MFA. However, there are some scenarios where temporarily disabling MFA is necessary. Use the following guidelines to understand how to handle those scenarios:
46+
* Microsoft Authenticator app
47+
* OATH Hardware token
48+
* SMS
49+
* Voice call
4850

49-
* Train your support staff to handle scenarios where the user can't sign in because they do not have access to their authentication methods or they are not working correctly.
50-
* Using Conditional Access policies for Azure MFA Service, your support staff can add a user to a group that is excluded from a policy requiring MFA.
51-
* Consider using Conditional Access named locations as a way to minimize two-step verification prompts. With this functionality, administrators can bypass two-step verification for users that are signing in from a secure trusted network location such as a network segment used for new user onboarding.
52-
* Deploy [Azure AD Identity Protection](../active-directory-identityprotection.md) and trigger two-step verification based on risk detections.
51+
## How to enable and use Azure Multi-Factor Authentication
52+
53+
Users and groups can be enabled for Azure Multi-Factor Authentication to prompt for additional verification during the sign-in event. [Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are available for all Azure AD tenants to quickly enable the use of the Microsoft Authenticator app for all users.
54+
55+
For more granular controls, [Conditional Access](../conditional-access/overview.md) policies can be used to define events or applications that require MFA. These policies can allow regular sign-in events when the user is on the corporate network or a registered device, but prompt for additional verification factors when remote or on a personal device.
56+
57+
![Overview diagram of how Conditional Access works to secure the sign-in process](media/tutorial-enable-azure-mfa/conditional-access-overview.png)
5358

5459
## Next steps
5560

56-
- [Step-by-step Azure Multi-Factor Authentication deployment](howto-mfa-getstarted.md)
61+
To learn about licensing, see [Features and licenses for Azure Multi-Factor Authentication](concept-mfa-licensing.md).
62+
63+
To see MFA in action, enable Azure Multi-Factor Authentication for a set of test users in the following tutorial:
64+
65+
> [!div class="nextstepaction"]
66+
> [Enable Azure Multi-Factor Authentication](tutorial-mfa-applications.md)

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Deploy Azure Multi-Factor Authentication - Azure Active Directory
3-
description: Microsoft Azure Multi-Factor Authentication deployment planning
2+
title: Deployment considerations for Azure Multi-Factor Authentication
3+
description: Learn about deployment considerations and strategy for successful implementation of Azure Multi-Factor Authentication
44

55
services: multi-factor-authentication
66
ms.service: active-directory
@@ -15,12 +15,19 @@ ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Planning a cloud-based Azure Multi-Factor Authentication deployment
18+
# Plan an Azure Multi-Factor Authentication deployment
1919

2020
People are connecting to organizational resources in increasingly complicated scenarios. People connect from organization-owned, personal, and public devices on and off the corporate network using smart phones, tablets, PCs, and laptops, often on multiple platforms. In this always-connected, multi-device and multi-platform world, the security of user accounts is more important than ever. Passwords, no matter their complexity, used across devices, networks, and platforms are no longer sufficient to ensure the security of the user account, especially when users tend to reuse passwords across accounts. Sophisticated phishing and other social engineering attacks can result in usernames and passwords being posted and sold across the dark web.
2121

2222
[Azure Multi-Factor Authentication (MFA)](concept-mfa-howitworks.md) helps safeguard access to data and applications. It provides an additional layer of security using a second form of authentication. Organizations can use [Conditional Access](../conditional-access/overview.md) to make the solution fit their specific needs.
2323

24+
This deployment guide shows you how to plan and then test an Azure Multi-Factor Authentication roll-out.
25+
26+
To quickly see Azure Multi-Factor Authentication in action and then come back to understand additional deployment considerations:
27+
28+
> [!div class="nextstepaction"]
29+
> [Enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md)
30+
2431
## Prerequisites
2532

2633
Before starting a deployment of Azure Multi-Factor Authentication, there are prerequisite items that should be considered.
@@ -170,7 +177,7 @@ Get-MsolUser -All | where {$_.StrongAuthenticationMethods.Count -eq 0} | Select-
170177

171178
If your users were enabled using per-user enabled and enforced Azure Multi-Factor Authentication the following PowerShell can assist you in making the conversion to Conditional Access based Azure Multi-Factor Authentication.
172179

173-
Run this PowerShell in an ISE window or save as a .PS1 file to run locally.
180+
Run this PowerShell in an ISE window or save as a `.PS1` file to run locally.
174181

175182
```PowerShell
176183
# Sets the MFA requirement state
@@ -314,7 +321,7 @@ On each AD FS server, in the local computer My Store, there will be a self-signe
314321

315322
If the validity period of your certificates is nearing expiration, [generate and verify a new MFA certificate on each AD FS server](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa#configure-the-ad-fs-servers).
316323

317-
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for 2 years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
324+
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for two years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
318325

319326
## Implement your plan
320327

@@ -354,6 +361,7 @@ Find solutions for common issues with Azure MFA at the [Troubleshooting Azure Mu
354361

355362
## Next steps
356363

357-
* [What are authentication methods?](concept-authentication-methods.md)
358-
* [Enable converged registration for Azure Multi-Factor Authentication and Azure AD self-service password reset](concept-registration-mfa-sspr-converged.md)
359-
* Why was a user prompted or not prompted to perform MFA? See the section [Azure AD sign-ins report in the Reports in Azure Multi-Factor Authentication document](howto-mfa-reporting.md#azure-ad-sign-ins-report).
364+
To see Azure Multi-Factor Authentication in action, complete the following tutorial:
365+
366+
> [!div class="nextstepaction"]
367+
> [Enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md)

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 20 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Self-service password reset deployment - Azure Active Directory
3-
description: Strategy for successful implementation of Azure AD self-service password reset
2+
title: Deployment considerations for Azure Active Directory self-service password reset
3+
description: Learn about deployment considerations and strategy for successful implementation of Azure AD self-service password reset
44

55
services: active-directory
66
ms.service: active-directory
@@ -15,21 +15,28 @@ ms.reviewer: sahenry
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Plan an Azure Active Directory self-service password reset
18+
# Plan an Azure Active Directory self-service password reset deployment
1919

20-
> [!NOTE]
21-
> This deployment plan offers planning guidance and best practices for deploying Azure AD self-service password reset (SSPR). <br>**If you are looking for the SSPR tool to get back into your account, go to [https://aka.ms/sspr](https://aka.ms/sspr)**.
20+
> [!IMPORTANT]
21+
> This deployment plan offers guidance and best practices for deploying Azure AD self-service password reset (SSPR).
22+
>
23+
> **If you're and end user and need to get back into your account, go to [https://aka.ms/sspr](https://aka.ms/sspr)**.
2224
23-
[Self-Service Password Reset (SSPR)](https://www.youtube.com/watch?v=tnb2Qf4hTP8) is an Azure Active Directory (AD) feature that enables users to reset their passwords without contacting IT staff for help. The users can quickly unblock themselves and continue working no matter where they are or time of day. By allowing the employees to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.
25+
[Self-Service Password Reset (SSPR)](https://www.youtube.com/watch?v=tnb2Qf4hTP8) is an Azure Active Directory (AD) feature that enables users to reset their passwords without contacting IT staff for help. The users can quickly unblock themselves and continue working no matter where they are or time of day. By allowing the employees to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.
2426

2527
SSPR has the following key capabilities:
2628

2729
* Self-service allows end users to reset their expired or non-expired passwords without contacting an administrator or helpdesk for support.
28-
2930
* [Password Writeback](https://docs.microsoft.com/azure/active-directory/authentication/concept-sspr-writeback) allows management of on-premises passwords and resolution of account lockout though the cloud.
30-
3131
* Password management activity reports give administrators insight into password reset and registration activity occurring in their organization.
3232

33+
This deployment guide shows you how to plan and then test an SSPR roll-out.
34+
35+
To quickly see SSPR in action and then come back to understand additional deployment considerations:
36+
37+
> [!div class="nextstepaction"]
38+
> [Enable self-service password reset (SSPR)](tutorial-enable-sspr.md)
39+
3340
## Learn about SSPR
3441

3542
Learn more about SSPR. See [How it works: Azure AD self-service password reset](https://docs.microsoft.com/azure/active-directory/authentication/concept-sspr-howitworks).
@@ -131,7 +138,7 @@ Communication is critical to the success of any new service. You should proactiv
131138

132139
### Plan a pilot
133140

134-
We recommend that the initial configuration of SSPR be in a test environment. Start with a pilot group by enabling SSPR for a subset of users in your organization. See [Best practices for a pilot](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-deployment-plans).
141+
We recommend that the initial configuration of SSPR is in a test environment. Start with a pilot group by enabling SSPR for a subset of users in your organization. See [Best practices for a pilot](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-deployment-plans).
135142

136143
To create a group, see how to [create a group and add members in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-groups-create-azure-portal).
137144

@@ -210,7 +217,7 @@ We recommend that you don't sync your on-prem Active Directory admin accounts wi
210217

211218
### Environments with multiple identity management systems
212219

213-
Some environments have multiple identity management systems. On-premesis identity managers like Oracle AM and SiteMinder, require synchronization with AD for passwords. You can do this using a tool like the Password Change Notification Service (PCNS) with Microsoft Identity Manager (MIM). To find information on this more complex scenario, see the article [Deploy the MIM Password Change Notification Service on a domain controller](https://docs.microsoft.com/microsoft-identity-manager/deploying-mim-password-change-notification-service-on-domain-controller).
220+
Some environments have multiple identity management systems. On-premises identity managers like Oracle AM and SiteMinder, require synchronization with AD for passwords. You can do this using a tool like the Password Change Notification Service (PCNS) with Microsoft Identity Manager (MIM). To find information on this more complex scenario, see the article [Deploy the MIM Password Change Notification Service on a domain controller](https://docs.microsoft.com/microsoft-identity-manager/deploying-mim-password-change-notification-service-on-domain-controller).
214221

215222
## Plan Testing and Support
216223

@@ -252,7 +259,7 @@ To enable your support team's success, you can create a FAQ based on questions y
252259
| User can't set a new password| A user completes verification during the password reset flow but can't set a new password. |
253260
| User doesn't see a Reset Password link on a Windows 10 device| A user is trying to reset password from the Windows 10 lock screen, but the device is either not joined to Azure AD, or the Intune device policy isn't enabled |
254261

255-
### Plan roll back
262+
### Plan rollback
256263

257264
To roll back the deployment:
258265

@@ -292,7 +299,7 @@ See [Enable self-service password reset](https://docs.microsoft.com/azure/active
292299
1. [On-premises integration](https://docs.microsoft.com/azure/active-directory/authentication/tutorial-enable-writeback)
293300

294301
### Enable SSPR in Windows
295-
For machines running Windows 7, 8, 8.1, and 10 you can [enable users to reset their password at the Windows login screen](https://docs.microsoft.com/azure/active-directory/authentication/howto-sspr-windows)
302+
For machines running Windows 7, 8, 8.1, and 10 you can [enable users to reset their password at the Windows sign in screen](https://docs.microsoft.com/azure/active-directory/authentication/howto-sspr-windows)
296303

297304
## Manage SSPR
298305

@@ -333,7 +340,7 @@ Audit logs for registration and password reset are available for 30 days. If sec
333340

334341
## Next steps
335342

336-
* To get started deploying SSPR, see [Complete an Azure AD self-service password reset pilot roll out](https://docs.microsoft.com/azure/active-directory/authentication/tutorial-sspr-pilot)
343+
* To get started deploying SSPR, see [Enable Azure AD self-service password reset](https://docs.microsoft.com/azure/active-directory/authentication/tutorial-enable-sspr.md)
337344

338345
* [Consider implementing Azure AD password protection](https://docs.microsoft.com/azure/active-directory/authentication/concept-password-ban-bad)
339346

0 commit comments

Comments
 (0)