You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update phone-based-mfa.md to add steps to mitigate fraudulent SMS via custom policy
The article has been updated with tested steps to mitigate fraudulent SMS activity using custom policy. Additionally, the importance of override in user flow and its correct usage has been emphasized
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/phone-based-mfa.md
+49-2Lines changed: 49 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ You can use the workbook to understand phone-based MFA events and identify poten
82
82
3. Mitigate fraudulent sign-ups by following the steps in the next section.
83
83
84
84
85
-
## Mitigate fraudulent sign-ups
85
+
## Mitigate fraudulent sign-ups for user flow
86
86
87
87
Take the following actions to help mitigate fraudulent sign-ups.
88
88
@@ -97,12 +97,15 @@ Take the following actions to help mitigate fraudulent sign-ups.
97
97
1. Sign in to the [Azure portal](https://portal.azure.com) as the [External ID User Flow Administrator](/entra/identity/role-based-access-control/permissions-reference#external-id-user-flow-administrator) of your Azure AD B2C tenant.
98
98
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
99
99
1. Choose **All services** in the top-left corner of the Azure portal, search for and select **Azure AD B2C**.
100
-
1. Select the user flow, and then select **Languages**. Select the language for your organization's geographic location to open the language details panel. (For this example, we'll select **English en** for the United States). Select **Multifactor authentication page**, and then select **Download defaults (en)**.
100
+
1. Select the user flow, and then select **Languages**. Select the language for your organization's primary geographic location to open the language details panel. (For this example, we'll select **English en** for the United States). Select **Multifactor authentication page**, and then select **Download defaults (en)**.
101
101
102
102

103
103
104
104
1. Open the JSON file that was downloaded in the previous step. In the file, search for `DEFAULT`, and replace the line with `"Value": "{\"DEFAULT\":\"Country/Region\",\"US\":\"United States\"}"`. Be sure to set `Overrides` to `true`.
105
105
106
+
> [!IMPORTANT]
107
+
> To implement SMS blocking effectively, please ensure that the Overrides setting is enabled (true) only for the primary or default language used in your business. Avoid enabling overrides for any non-primary languages, as doing so may lead to unintended SMS blocking behavior. Since the countryList in the JSON file functions as an allow list, please include all countries permitted to send SMS within this list for the primary language configuration when Overrides is set to true.
108
+
106
109
> [!NOTE]
107
110
> You can customize the list of allowed country codes in the `countryList` element (see the [Phone factor authentication page example](localization-string-ids.md#phone-factor-authentication-page-example)).
108
111
@@ -111,6 +114,50 @@ Take the following actions to help mitigate fraudulent sign-ups.
Take the following actions to help mitigate fraudulent sign-ups:
120
+
121
+
1. Identify the policy file where RelyingParty is defined. In the sample [Starter Pack](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack) this is the SignUpOrSignin.xml file
122
+
2. Add the following code within the "BuildingBlocks" section:
> The countryList functions as an allow list; therefore, only the countries specified within it (e.g., Japan, Bulgaria, and the United States) will be permitted to use MFA, while all other countries will be blocked.
160
+
114
161
## Related content
115
162
116
163
- Learn about [Identity Protection and Conditional Access for Azure AD B2C](conditional-access-identity-protection-overview.md)
0 commit comments