Skip to content

Commit 561233e

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-sf-7.1
2 parents 61dd3ca + 4f971df commit 561233e

File tree

218 files changed

+2139
-1543
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

218 files changed

+2139
-1543
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
"redirect_url": "/previous-versions/azure/virtual-network/virtual-networks-create-vnet-classic-cli",
2121
"redirect_document_id": false
2222
},
23+
2324
{
2425
"source_path": "articles/virtual-network/virtual-networks-specifying-a-dns-settings-in-a-virtual-network-configuration-file.md",
2526
"redirect_url": "/previous-versions/azure/virtual-network/virtual-networks-specifying-a-dns-settings-in-a-virtual-network-configuration-file",
@@ -475,6 +476,11 @@
475476
"source_path": "articles/azure-arc/servers/quickstart-onboard-portal.md",
476477
"redirect_url": "/azure/azure-arc/servers/onboard-portal",
477478
"redirect_document_id": false
479+
},
480+
{
481+
"source_path": "articles/active-directory/saas-apps/123contactform-tutorial.md",
482+
"redirect_url": "/azure/active-directory/saas-apps/123formbuilder-tutorial",
483+
"redirect_document_id": true
478484
},
479485
{
480486
"source_path": "articles/azure-arc/servers/quickstart-onboard-powershell.md",
@@ -38330,6 +38336,11 @@
3833038336
"redirect_url": "/azure/active-directory/authentication/howto-password-ban-bad-configure",
3833138337
"redirect_document_id": false
3833238338
},
38339+
{
38340+
"source_path": "articles/active-directory/authentication/multi-factor-authentication-security-best-practices.md",
38341+
"redirect_url": "/azure/active-directory/authentication/howto-mfa-getstarted",
38342+
"redirect_document_id": false
38343+
},
3833338344
{
3833438345
"source_path": "articles/active-directory/active-directory-passwords-reset-register.md",
3833538346
"redirect_url": "/azure/active-directory/user-help/active-directory-passwords-reset-register",

articles/active-directory/authentication/TOC.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -42,17 +42,13 @@
4242
items:
4343
- name: How MFA works
4444
href: concept-mfa-howitworks.md
45-
- name: License your users
46-
href: concept-mfa-licensing.md
47-
- name: Manage an Auth Provider
48-
href: concept-mfa-authprovider.md
49-
- name: Security guidance
50-
href: multi-factor-authentication-security-best-practices.md
5145
- name: Data residency
5246
href: concept-mfa-data-residency.md
47+
- name: Licenses
48+
href: concept-mfa-licensing.md
5349
- name: MFA for Office 365
5450
href: https://docs.microsoft.com/office365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide
55-
- name: MFA FAQ
51+
- name: FAQ
5652
href: multi-factor-authentication-faq.md
5753
- name: Azure AD password protection
5854
items:
@@ -72,16 +68,18 @@
7268
href: howto-sspr-authenticationdata.md
7369
- name: SSPR for Windows clients
7470
href: howto-sspr-windows.md
75-
- name: Cloud-based MFA
71+
- name: Azure Multi-Factor Authentication
7672
items:
7773
- name: Deployment guide
7874
href: howto-mfa-getstarted.md
79-
- name: Per user MFA
80-
href: howto-mfa-userstates.md
81-
- name: User and device settings
82-
href: howto-mfa-userdevicesettings.md
8375
- name: Configure settings
8476
href: howto-mfa-mfasettings.md
77+
- name: Configure users
78+
href: howto-mfa-userdevicesettings.md
79+
- name: Enable per-user MFA
80+
href: howto-mfa-userstates.md
81+
- name: Configure authentication providers
82+
href: concept-mfa-authprovider.md
8583
- name: Directory Federation
8684
items:
8785
- name: Windows Server 2016 AD FS Adapter
@@ -140,6 +138,8 @@
140138
href: howto-authentication-passwordless-phone.md
141139
- name: Windows Hello for Business
142140
href: https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification
141+
- name: Use SMS-based authentication (preview)
142+
href: howto-authentication-sms-signin.md
143143
- name: Certificate-based authentication
144144
items:
145145
- name: Get started with certificate auth

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ ms.collection: M365-identity-device-management
1717
---
1818
# When to use an Azure Multi-Factor Authentication Provider
1919

20+
> [!IMPORTANT]
21+
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
22+
2023
Two-step verification is available by default for global administrators who have Azure Active Directory, and Office 365 users. However, if you wish to take advantage of [advanced features](howto-mfa-mfasettings.md) then you should purchase the full version of Azure Multi-Factor Authentication (MFA).
2124

2225
An Azure Multi-Factor Auth Provider is used to take advantage of features provided by Azure Multi-Factor Authentication for users who **do not have licenses**.
2326

24-
> [!NOTE]
25-
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
26-
2727
## Caveats related to the Azure MFA SDK
2828

2929
Note the SDK has been deprecated and will only continue to work until November 14, 2018. After that time, calls to the SDK will fail.

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 12/16/2019
9+
ms.date: 04/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ A user who has previously set up at least one method that can be used for Multi-
136136

137137
## Next steps
138138

139-
[Force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-authentication-methods)
139+
[Force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options)
140140

141141
[Enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md)
142142

Lines changed: 161 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,161 @@
1+
---
2+
title: SMS-based user sign in for Azure Active Directory
3+
description: Learn how to configure and enable users to sign in to Azure Active Directory using SMS (preview)
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: conceptual
9+
ms.date: 04/13/2020
10+
11+
ms.author: iainfou
12+
author: iainfoulds
13+
manager: daveba
14+
ms.reviewer: rateller
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
19+
# Configure and enable users for SMS-based authentication using Azure Active Directory (preview)
20+
21+
To reduce the complexity and security risks for users to sign in to applications and services, Azure Active Directory (Azure AD) provides multiple authentication options. SMS-based authentication, currently in preview, lets users sign in without needing to provide, or even know, their username and password. After their account is created by an identity administrator, they can enter their phone number at the sign-in prompt, and provide an authentication code that's sent to them via text message. This authentication method simplifies access to applications and services, especially for front line workers.
22+
23+
This article shows you how to enable SMS-based authentication for select users or groups in Azure AD.
24+
25+
| |
26+
| --- |
27+
| SMS-based authentication for users is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)|
28+
| |
29+
30+
## Before you begin
31+
32+
To complete this article, you need the following resources and privileges:
33+
34+
* An active Azure subscription.
35+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
36+
* An Azure Active Directory tenant associated with your subscription.
37+
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
38+
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
39+
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
40+
* [Azure AD Premium P1 or P2][azuread-licensing]
41+
* [Microsoft 365 F1 or F3][m365-firstline-workers-licensing]
42+
43+
## Limitations
44+
45+
During the public preview of SMS-based authentication, the following limitations apply:
46+
47+
* SMS-based authentication isn't currently compatible with Azure Multi-Factor Authentication.
48+
* With the exception of Teams, SMS-based authentication isn't currently compatible with native Office applications.
49+
* SMS-based authentication isn't recommended for B2B accounts.
50+
* Federated users won't authenticate in the home tenant. They only authenticate in the cloud.
51+
52+
## Enable the SMS-based authentication method
53+
54+
There are three main steps to enable and use SMS-based authentication in your organization:
55+
56+
* Enable the authentication method policy.
57+
* Select users or groups that can use the SMS-based authentication method.
58+
* Assign a phone number for each user account.
59+
* This phone number can be assigned in the Azure portal (which is shown in this article), and in *My Staff* or *My Profile*.
60+
61+
First, let's enable SMS-based authentication for your Azure AD tenant.
62+
63+
1. Sign in to the [Azure portal][azure-portal] as a *global administrator*.
64+
1. Search for and select **Azure Active Directory**.
65+
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Security > Authentication methods > Authentication method policy (preview)**.
66+
67+
[![](media/howto-authentication-sms-signin/authentication-method-policy-cropped.png "Browse to and select the Authentication method policy (preview) window in the Azure portal")](media/howto-authentication-sms-signin/authentication-method-policy.png#lightbox)
68+
69+
1. From the list of available authentication methods, select **Text message**.
70+
1. Set **Enable** to *Yes*.
71+
72+
![Enable text authentication in the authentication method policy window](./media/howto-authentication-sms-signin/enable-text-authentication-method.png)
73+
74+
You can choose to enable SMS-based authentication for *All users* or *Select users* and groups. In the next section, you enable SMS-based authentication for a test user.
75+
76+
## Assign the authentication method to users and groups
77+
78+
With SMS-based authentication enabled in your Azure AD tenant, now select some users or groups to be allowed to use this authentication method.
79+
80+
1. In the text message authentication policy window, set **Target** to *Select users*.
81+
1. Choose to **Add users or groups**, then select a test user or group, such as *Contoso User* or *Contoso SMS Users*.
82+
83+
[![](media/howto-authentication-sms-signin/add-users-or-groups-cropped.png "Choose users or groups to enable for SMS-based authentication in the Azure portal")](media/howto-authentication-sms-signin/add-users-or-groups.png#lightbox)
84+
85+
1. When you've selected your users or groups, choose **Select**, then **Save** the updated authentication method policy.
86+
87+
Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Make sure you have the appropriate licenses for the users you enable in the authentication method policy, especially when you enable the feature for large groups of users.
88+
89+
## Set a phone number for user accounts
90+
91+
Users are now enabled for SMS-based authentication, but their phone number must be associated with the user profile in Azure AD before they can sign in. The user can [set this phone number themselves](../user-help/sms-sign-in-explainer.md) in *My Profile*, or you can assign the phone number using the Azure portal. Phone numbers can be set by *global admins*, *authentication admins*, or *privileged authentication admins*.
92+
93+
When a phone number is set for SMS-sign, it's also then available for use with [Azure Multi-Factor Authentication][tutorial-azure-mfa] and [self-service password reset][tutorial-sspr].
94+
95+
1. Search for and select **Azure Active Directory**.
96+
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Users**.
97+
1. Select the user you enabled for SMS-based authentication in the previous section, such as *Contoso User*, then select **Authentication methods**.
98+
1. Enter the user's phone number, including the country code, such as *+1 xxxxxxxxx*. The Azure portal validates the phone number is in the correct format.
99+
100+
![Set a phone number for a user in the Azure portal to use with SMS-based authentication](./media/howto-authentication-sms-signin/set-user-phone-number.png)
101+
102+
The phone number must be unique in your tenant. If you try to use the same phone number for multiple users, an error message is shown.
103+
104+
1. To apply the phone number to a user's account, select **Save**.
105+
106+
When successfully provisioned, a check mark appears for *SMS Sign-in enabled*.
107+
108+
## Test SMS-based sign-in
109+
110+
To test the user account that's now enabled for SMS-based sign-in, complete the following steps:
111+
112+
1. Open a new InPrivate or Incognito web browser window to [https://www.office.com][office]
113+
1. In the top right-hand corner, select **Sign in**.
114+
1. At the sign-in prompt, enter the phone number associated with the user in the previous section, then select **Next**.
115+
116+
![Enter a phone number at the sign-in prompt for the test user](./media/howto-authentication-sms-signin/sign-in-with-phone-number.png)
117+
118+
1. A text message is sent to the phone number provided. To complete the sign-in process, enter the 6-digit code provided in the text message at the sign-in prompt.
119+
120+
![Enter the confirmation code sent via text message to the user's phone number](./media/howto-authentication-sms-signin/sign-in-with-phone-number-confirmation-code.png)
121+
122+
1. The user is now signed in without the need to provide a username or password.
123+
124+
## Troubleshoot SMS-based sign-in
125+
126+
The following scenarios and troubleshooting steps can used if you have problems with enabling and using SMS-based sign in.
127+
128+
### Phone number already set for a user account
129+
130+
If a user has already registered for Azure Multi-Factor Authentication and / or self-service password reset (SSPR), they already have a phone number associated with their account. This phone number is not automatically available for use with SMS-based sign-in.
131+
132+
A user that has a phone number already set for their account is displayed a button to *Enable for SMS sign-in* in their **My Profile** page. Select this button, and the account is enabled for use with SMS-based sign-in and the previous Azure Multi-Factor Authentication or SSPR registration.
133+
134+
For more information on the end-user experience, see [SMS sign-in user experience for phone number (preview)](../user-help/sms-sign-in-explainer.md).
135+
136+
### Error when trying to set a phone number on a user's account
137+
138+
If you receive an error when you try to set a phone number for a user account in the Azure portal, review the following troubleshooting steps:
139+
140+
1. Make sure that you're enabled for the SMS-based sign-in preview.
141+
1. Confirm that the user account is enabled in the *Text message* authentication method policy.
142+
1. Make sure you set the phone number with the proper formatting, as validated in the Azure portal (such as *+1 4251234567*).
143+
1. Make sure that the phone number isn't used elsewhere in your tenant.
144+
1. Check there's no voice number set on the account. If a voice number is set, delete and try to the phone number again.
145+
146+
## Next steps
147+
148+
For additional ways to sign in to Azure AD without a password, such as the Microsoft Authenticator App or FIDO2 security keys, see [Passwordless authentication options for Azure AD][concepts-passwordless].
149+
150+
<!-- INTERNAL LINKS -->
151+
[create-azure-ad-tenant]: ../fundamentals/sign-up-organization.md
152+
[associate-azure-ad-tenant]: ../fundamentals/active-directory-how-subscriptions-associated-directory.md
153+
[concepts-passwordless]: concept-authentication-passwordless.md
154+
[tutorial-azure-mfa]: tutorial-enable-azure-mfa.md
155+
[tutorial-sspr]: tutorial-enable-sspr.md
156+
157+
<!-- EXTERNAL LINKS -->
158+
[azure-portal]: https://portal.azure.com
159+
[office]: https://www.office.com
160+
[m365-firstline-workers-licensing]: https://www.microsoft.com/licensing/news/m365-firstline-workers
161+
[azuread-licensing]: https://azure.microsoft.com/pricing/details/active-directory/

0 commit comments

Comments
 (0)