Skip to content

Commit 5d7f8c5

Browse files
authored
Merge pull request #202677 from Justinha/entra-rename-5
Entra rename 5
2 parents 614433f + 6bfe0d5 commit 5d7f8c5

File tree

2 files changed

+13
-13
lines changed

2 files changed

+13
-13
lines changed

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 06/09/2022
7+
ms.date: 06/23/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -13,7 +13,7 @@ ms.collection: M365-identity-device-management
1313
---
1414
# How to use number matching in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
1515

16-
This topic covers how to enable number matching in Microsoft Entra Authenticator push notifications to improve user sign-in security.
16+
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
1717

1818
>[!NOTE]
1919
>Number matching is a key security upgrade to traditional second factor notifications in the Authenticator app that will be enabled by default for all tenants a few months after general availability (GA).<br>
@@ -233,7 +233,7 @@ To turn number matching off, you will need to PATCH remove **numberMatchingRequi
233233

234234
To enable number matching in the Azure AD portal, complete the following steps:
235235

236-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Entra Authenticator**.
236+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
237237
1. Select the target users, click the three dots on the right, and click **Configure**.
238238

239239
![Screenshot of configuring number match.](media/howto-authentication-passwordless-phone/configure.png)

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
title: Nudge users to set up Microsoft Entra Authenticator app - Azure Active Directory
3-
description: Learn how to move your organization away from less secure authentication methods to the Microsoft Entra Authenticator app
2+
title: Nudge users to set up Microsoft Authenticator - Azure Active Directory
3+
description: Learn how to move your organization away from less secure authentication methods to Microsoft Authenticator
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/09/2022
9+
ms.date: 06/23/2022
1010

1111
ms.author: justinha
1212
author: mjsantani
1313
manager: karenhoran
1414

1515
ms.collection: M365-identity-device-management
1616

17-
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Entra Authenticator app in Azure AD to improve and secure user sign-in events.
17+
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1818
---
19-
# How to run a registration campaign to set up Microsoft Entra Authenticator - Microsoft Entra Authenticator app
19+
# How to run a registration campaign to set up Microsoft Authenticator - Microsoft Authenticator
2020

21-
You can nudge users to set up the Microsoft Entra Authenticator app during sign-in. Users will go through their regular sign-in, perform multifactor authentication as usual, and then be prompted to set up the Microsoft Entra Authenticator app. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to the Authenticator app.
21+
You can nudge users to set up Microsoft Authenticator during sign-in. Users will go through their regular sign-in, perform multifactor authentication as usual, and then be prompted to set up Microsoft Authenticator. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to the Authenticator app.
2222

2323
In addition to choosing who can be nudged, you can define how many days a user can postpone, or "snooze", the nudge. If a user taps **Not now** to snooze the app setup, they'll be nudged again on the next MFA attempt after the snooze duration has elapsed.
2424

@@ -28,7 +28,7 @@ In addition to choosing who can be nudged, you can define how many days a user c
2828
- Users can't have already set up the Authenticator app for push notifications on their account.
2929
- Admins need to enable users for the Authenticator app using one of these policies:
3030
- MFA Registration Policy: Users will need to be enabled for **Notification through mobile app**.
31-
- Authentication Methods Policy: Users will need to be enabled for the Authenticator app and the Authentication mode set to **Any** or **Push**. If the policy is set to **Passwordless**, the user won't be eligible for the nudge. For more information about how to set the Authentication mode, see [Enable passwordless sign-in with the Microsoft Entra Authenticator app](howto-authentication-passwordless-phone.md).
31+
- Authentication Methods Policy: Users will need to be enabled for the Authenticator app and the Authentication mode set to **Any** or **Push**. If the policy is set to **Passwordless**, the user won't be eligible for the nudge. For more information about how to set the Authentication mode, see [Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md).
3232

3333
## User experience
3434

@@ -41,11 +41,11 @@ In addition to choosing who can be nudged, you can define how many days a user c
4141
1. User taps **Next** and steps through the Authenticator app setup.
4242
1. First download the app.
4343

44-
![User downloads the Microsoft Entra Authenticator app](./media/how-to-nudge-authenticator-app/download.png)
44+
![User downloads Microsoft Authenticator](./media/how-to-nudge-authenticator-app/download.png)
4545

4646
1. See how to set up the Authenticator app.
4747

48-
![User sets up the Microsoft Entra Authenticator app](./media/how-to-nudge-authenticator-app/setup.png)
48+
![User sets up Microsoft Authenticator](./media/how-to-nudge-authenticator-app/setup.png)
4949

5050
1. Scan the QR Code.
5151

@@ -308,4 +308,4 @@ It's the same as snoozing.
308308

309309
## Next steps
310310

311-
[Enable passwordless sign-in with the Microsoft Entra Authenticator app](howto-authentication-passwordless-phone.md)
311+
[Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md)

0 commit comments

Comments
 (0)