You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,7 +183,7 @@ You might get an error message when you install the cloud provisioning agent.
183
183
184
184
This problem is typically caused by the agent being unable to execute the PowerShell registration scripts because of local PowerShell execution policies.
185
185
186
-
To resolve this problem, change the PowerShell execution policies on the server. You need to have Machine and User policies set as *Undefined* or *RemoteSigned*. If they're set as *Unrestricted*, you'll see this error. For more information, see [PowerShell execution policies](/powershell/module/microsoft.powershell.core/about/about_execution_policies?view=powershell-6).
186
+
To resolve this problem, change the PowerShell execution policies on the server. You need to have Machine and User policies set as *Undefined* or *RemoteSigned*. If they're set as *Unrestricted*, you'll see this error. For more information, see [PowerShell execution policies](/powershell/module/microsoft.powershell.core/about/about_execution_policies).
187
187
188
188
### Log files
189
189
@@ -215,7 +215,7 @@ By using Azure AD, you can monitor the provisioning service in the cloud and col
215
215
```
216
216
217
217
### I am getting an Invalid LDAP style DN error when trying to configure the ECMA Connector Host with SQL
218
-
By default, the genericSQL connector expects the DN to be populated using the LDAP style (when the ‘DN is anchor’ attribute is left unchecked in the first connectivity page). In the error message above, you can see that the DN is a UPN, rather than an LDAP style DN that the connector expects.
218
+
By default, the genericSQL connector expects the DN to be populated using the LDAP style (when the 'DN is anchor' attribute is left unchecked in the first connectivity page). In the error message above, you can see that the DN is a UPN, rather than an LDAP style DN that the connector expects.
219
219
220
220
To resolve this, ensure that **Autogenerated** is selected on the object types page when you configure the connector.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md
+17-21Lines changed: 17 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,14 @@
1
1
---
2
2
title: Migrate to Azure AD MFA with federations - Azure Active Directory
3
3
description: Step-by-step guidance to move from Azure MFA Server on-premises to Azure AD MFA with federation
4
-
5
-
services: multi-factor-authentication
6
4
ms.service: active-directory
7
5
ms.subservice: authentication
8
6
ms.topic: how-to
9
7
ms.date: 06/22/2021
10
-
11
8
ms.author: BaSelden
12
9
author: BarbaraSelden
13
10
manager: daveba
14
11
ms.reviewer: michmcla
15
-
16
12
ms.collection: M365-identity-device-management
17
13
---
18
14
# Migrate to Azure AD MFA with federation
@@ -31,7 +27,7 @@ To create new conditional access policies, you'll need to assign those policies
31
27
32
28
You'll also need an Azure AD security group for iteratively migrating users to Azure AD MFA. These groups are used in your claims rules.
33
29
34
-
Don’t reuse groups that are used for security. If you are using a security group to secure a group of high-value apps via a Conditional Access policy, that should be the only use of that group.
30
+
Don't reuse groups that are used for security. If you are using a security group to secure a group of high-value apps via a Conditional Access policy, that should be the only use of that group.
> Access control policies can’t be configured so that a specific authentication provider is invoked based on group membership.
67
+
> Access control policies can't be configured so that a specific authentication provider is invoked based on group membership.
72
68
73
69
74
70
To transition from access control policies to additional authentication rules, run the following command for each of your Relying Party Trusts using the MFA Server authentication provider:
@@ -89,13 +85,13 @@ You'll need to have a specific group in which you place users for whom you want
89
85
90
86
To find the group SID, use the following command, with your group name
91
87
92
-
`Get-ADGroup “GroupName”`
88
+
`Get-ADGroup "GroupName"`
93
89
94
90

95
91
96
92
#### Setting the claims rules to call Azure MFA
97
93
98
-
The following PowerShell cmdlets invoke Azure AD MFA for users in the group when not on the corporate network. Replace "YourGroupSid” with the SID found by running the above cmdlet.
94
+
The following PowerShell cmdlets invoke Azure AD MFA for users in the group when not on the corporate network. Replace "YourGroupSid" with the SID found by running the above cmdlet.
99
95
100
96
Make sure you review the [How to Choose Additional Auth Providers in 2019](/windows-server/identity/ad-fs/overview/whats-new-active-directory-federation-services-windows-server).
101
97
@@ -109,7 +105,7 @@ Make sure you review the [How to Choose Additional Auth Providers in 2019](/wind
@@ -123,7 +119,7 @@ Value = "AzureMfaAuthentication");
123
119
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
124
120
Value=="YourGroupSid"]) => issue(Type =
125
121
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
126
-
"AzureMfaServerAuthentication");’
122
+
"AzureMfaServerAuthentication");'
127
123
```
128
124
129
125
The following example assumes your current claim rules are configured to prompt for MFA when users connect from outside your network. This example includes the additional rules that you need to append.
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
159
-
Value==“YourGroupSid"]) => issue(Type =
155
+
Value=="YourGroupSid"]) => issue(Type =
160
156
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
161
-
"AzureMfaServerAuthentication");’
157
+
"AzureMfaServerAuthentication");'
162
158
```
163
159
164
160
@@ -180,7 +176,7 @@ For federated domains, MFA may be enforced by Azure AD Conditional Access or by
180
176
181
177
If the SupportsMFA flag is set to False, you're likely not using Azure MFA; you're probably using claims rules on AD FS relying parties to invoke MFA.
182
178
183
-
You can check the status of your SupportsMFA flag with the following [Windows PowerShell cmdlet](/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0):
179
+
You can check the status of your SupportsMFA flag with the following [Windows PowerShell cmdlet](/powershell/module/msonline/get-msoldomainfederationsettings):
@@ -276,7 +272,7 @@ You'll need to interpret, clean, and format the data.
276
272
277
273
Users may have already registered phone numbers in Azure AD. When you import the phone numbers using the Authentication Methods API, you must decide whether to overwrite the existing phone number or to add the imported number as an alternate phone number.
278
274
279
-
The following PowerShell cmdlets takes the CSV file you supply and adds the exported phone numbers as a phone number for each UPN using the Authentication Methods API. Replace "myPhones” with the name of your CSV file.
275
+
The following PowerShell cmdlets takes the CSV file you supply and adds the exported phone numbers as a phone number for each UPN using the Authentication Methods API. Replace "myPhones" with the name of your CSV file.
280
276
281
277
```powershell
282
278
@@ -325,12 +321,12 @@ For example, remove the following from the rule(s):
325
321
326
322
```console
327
323
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-getstarted.md
+12-16Lines changed: 12 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,14 @@
1
1
---
2
2
title: Deployment considerations for Azure AD Multi-Factor Authentication
3
3
description: Learn about deployment considerations and strategy for successful implementation of Azure AD Multi-Factor Authentication
4
-
5
-
services: multi-factor-authentication
6
4
ms.service: active-directory
7
5
ms.subservice: authentication
8
6
ms.topic: how-to
9
7
ms.date: 07/22/2021
10
-
11
8
ms.author: BaSelden
12
9
author: BarbaraSelden
13
10
manager: daveba
14
11
ms.reviewer: michmcla
15
-
16
12
ms.collection: M365-identity-device-management
17
13
---
18
14
# Plan an Azure Active Directory Multi-Factor Authentication deployment
@@ -56,25 +52,25 @@ To learn more about the strength and security of these methods and how they work
56
52
-[What authentication and verification methods are available in Azure Active Directory?](concept-authentication-methods.md)
57
53
-[Video: Choose the right authentication methods to keep your organization safe](https://youtu.be/LB2yj4HSptc)
58
54
59
-
You can use this [PowerShell script](/samples/azure-samples/azure-mfa-authentication-method-analysis/azure-mfa-authentication-method-analysis/) to analyze users’ MFA configurations and suggest the appropriate MFA authentication method.
55
+
You can use this [PowerShell script](/samples/azure-samples/azure-mfa-authentication-method-analysis/azure-mfa-authentication-method-analysis/) to analyze users' MFA configurations and suggest the appropriate MFA authentication method.
60
56
61
57
For the best flexibility and usability, use the Microsoft Authenticator app. This authentication method provides the best user experience and multiple modes, such as passwordless, MFA push notifications, and OATH codes. The Microsoft Authenticator app also meets the National Institute of Standards and Technology (NIST) [Authenticator Assurance Level 2 requirements](../standards/nist-authenticator-assurance-level-2.md).
62
58
63
59
You can control the authentication methods available in your tenant. For example, you may want to block some of the least secure methods, such as SMS.
64
60
65
-
| Authentication method| Manage from | Scoping |
61
+
| Authentication method| Manage from | Scoping |
66
62
|-----------------------|-------------|---------|
67
-
| Microsoft Authenticator (Push notification and passwordless phone sign-in)| MFA settings or
63
+
| Microsoft Authenticator (Push notification and passwordless phone sign-in)| MFA settings or
68
64
Authentication methods policy | Authenticator passwordless phone sign-in can be scoped to users and groups |
69
65
| FIDO2 security key | Authentication methods policy | Can be scoped to users and groups |
70
66
| Software or Hardware OATH tokens | MFA settings ||
71
-
| SMS verification | MFA settings | Manage SMS sign-in for primary authentication in authentication policy.SMS sign-in can be scoped to users and groups. |
67
+
| SMS verification | MFA settings | Manage SMS sign-in for primary authentication in authentication policy.SMS sign-in can be scoped to users and groups. |
72
68
| Voice calls | Authentication methods policy ||
73
69
74
70
75
71
## Plan Conditional Access policies
76
72
77
-
Azure AD MFA is enforced with Conditional Access policies. These policies allow you to prompt users for multifactor authentication when needed for security and stay out of users’ way when not needed.
73
+
Azure AD MFA is enforced with Conditional Access policies. These policies allow you to prompt users for multifactor authentication when needed for security and stay out of users' way when not needed.
78
74
79
75

80
76
@@ -115,7 +111,7 @@ Risk policies include:
115
111
116
112
If your users were enabled using per-user enabled and enforced Azure AD Multi-Factor Authentication the following PowerShell can assist you in making the conversion to Conditional Access based Azure AD Multi-Factor Authentication.
117
113
118
-
Run this PowerShell in an ISE window or save as a `.PS1` file to run locally. The operation can only be done by using the [MSOnline module](/powershell/module/msonline/?view=azureadps-1.0#msonline).
114
+
Run this PowerShell in an ISE window or save as a `.PS1` file to run locally. The operation can only be done by using the [MSOnline module](/powershell/module/msonline#msonline).
When planning your MFA deployment, it’s important to think about how frequently you would like to prompt your users. Asking users for credentials often seems like a sensible thing to do, but it can backfire. If users are trained to enter their credentials without thinking, they can unintentionally supply them to a malicious credential prompt.
148
+
When planning your MFA deployment, it's important to think about how frequently you would like to prompt your users. Asking users for credentials often seems like a sensible thing to do, but it can backfire. If users are trained to enter their credentials without thinking, they can unintentionally supply them to a malicious credential prompt.
153
149
Azure AD has multiple settings that determine how often you need to reauthenticate. Understand the needs of your business and users and configure settings that provide the best balance for your environment.
154
150
155
151
We recommend using devices with Primary Refresh Tokens (PRT) for improved end user experience and reduce the session lifetime with sign-in frequency policy only on specific business use cases.
@@ -168,9 +164,9 @@ Azure AD Identity Protection contributes both a registration policy for and auto
168
164
If you use Azure AD Identity Protection, [configure the Azure AD MFA registration policy](../identity-protection/howto-identity-protection-configure-mfa-policy.md) to prompt your users to register the next time they sign in interactively.
169
165
170
166
### Registration without Identity Protection
171
-
If you don’t have licenses that enable Azure AD Identity Protection, users are prompted to register the next time that MFA is required at sign-in.
167
+
If you don't have licenses that enable Azure AD Identity Protection, users are prompted to register the next time that MFA is required at sign-in.
172
168
To require users to use MFA, you can use Conditional Access policies and target frequently used applications like HR systems.
173
-
If a user’s password is compromised, it could be used to register for MFA, taking control of their account. We therefore recommend [securing the security registration process with conditional access policies](../conditional-access/howto-conditional-access-policy-registration.md) requiring trusted devices and locations.
169
+
If a user's password is compromised, it could be used to register for MFA, taking control of their account. We therefore recommend [securing the security registration process with conditional access policies](../conditional-access/howto-conditional-access-policy-registration.md) requiring trusted devices and locations.
174
170
You can further secure the process by also requiring a [Temporary Access Pass](howto-authentication-temporary-access-pass.md). A time-limited passcode issued by an admin that satisfies strong authentication requirements and can be used to onboard other authentication methods, including Passwordless ones.
175
171
176
172
### Increase the security of registered users
@@ -184,7 +180,7 @@ If the user does not have a backup method available, you can:
184
180
- Update their methods as an administrator. To do so, select the user in the Azure portal, then select Authentication methods and update their methods.
185
181
User communications
186
182
187
-
It’s critical to inform users about upcoming changes, Azure AD MFA registration requirements, and any necessary user actions.
183
+
It's critical to inform users about upcoming changes, Azure AD MFA registration requirements, and any necessary user actions.
188
184
We provide [communication templates](https://aka.ms/mfatemplates) and [end-user documentation](https://support.microsoft.com/account-billing/set-up-your-security-info-from-a-sign-in-prompt-28180870-c256-4ebf-8bd7-5335571bf9a8) to help draft your communications. Send users to [https://myprofile.microsoft.com](https://myprofile.microsoft.com/) to register by selecting the **Security Info** link on that page.
189
185
190
186
## Plan integration with on-premises systems
@@ -203,7 +199,7 @@ For applications that are using RADIUS authentication, we recommend moving clien
203
199
204
200
#### Common integrations
205
201
206
-
Many vendors now support SAML authentication for their applications. When possible, we recommend federating these applications with Azure AD and enforcing MFA through Conditional Access. If your vendor doesn’t support modern authentication – you can use the NPS extension.
202
+
Many vendors now support SAML authentication for their applications. When possible, we recommend federating these applications with Azure AD and enforcing MFA through Conditional Access. If your vendor doesn't support modern authentication – you can use the NPS extension.
207
203
Common RADIUS client integrations include applications such as [Remote Desktop Gateways](howto-mfa-nps-extension-rdg.md) and [VPN servers](howto-mfa-nps-extension-vpn.md).
208
204
209
205
Others might include:
@@ -235,7 +231,7 @@ This section provides reporting and troubleshooting information for Azure AD MFA
235
231
236
232
### Reporting and Monitoring
237
233
238
-
Azure AD has reports that provide technical and business insights, follow the progress of your deployment and check if your users are successful at sign-in with MFA. Have your business and technical application owners assume ownership of and consume these reports based on your organization’s requirements.
234
+
Azure AD has reports that provide technical and business insights, follow the progress of your deployment and check if your users are successful at sign-in with MFA. Have your business and technical application owners assume ownership of and consume these reports based on your organization's requirements.
239
235
240
236
You can monitor authentication method registration and usage across your organization using the [Authentication Methods Activity dashboard](howto-authentication-methods-activity.md). This helps you understand what methods are being registered and how they're being used.
0 commit comments