Skip to content

Commit 633eae2

Browse files
Merge pull request #230669 from tilarso/patch-43
Update howto-registration-mfa-sspr-combined.md
2 parents 4a5d4bb + 3eb529a commit 633eae2

File tree

1 file changed

+4
-29
lines changed

1 file changed

+4
-29
lines changed

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 4 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -17,40 +17,15 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable combined security information registration in Azure Active Directory
1919

20-
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Azure AD Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure AD Multi-Factor Authentication and SSPR.
20+
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. Users were confused that similar methods were used for Azure AD Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure AD Multi-Factor Authentication and SSPR.
2121

2222
> [!NOTE]
23-
> Effective Oct. 1st, 2022, we will begin to enable combined registration for all users in Azure AD tenants created before August 15th, 2020. Tenants created after this date are enabled with combined registration.
23+
> Effective Mar. 14th, 2023 combined registration is now the default MFA and SSPR registration experience for all organizations.
2424
25-
To make sure you understand the functionality and effects before you enable the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
25+
To help you understand the functionality and effects of the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
2626

2727
![Combined security information registration enhanced experience](media/howto-registration-mfa-sspr-combined/combined-security-info-more-required.png)
2828

29-
## Enable combined registration
30-
31-
To enable combined registration, complete these steps:
32-
33-
1. Sign in to the Azure portal as a user administrator or global administrator.
34-
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature settings**.
35-
3. Under **Users can use the combined security information registration experience**, choose to enable for a **Selected** group of users or for **All** users.
36-
37-
![Enable the combined security info experience for users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info.png)
38-
39-
> [!IMPORTANT]
40-
> If your Azure tenant has already been enabled for combined registration, you might not see the configuration option for **Users can use the combined security information registration experience** or even see it grayed out.
41-
42-
> [!NOTE]
43-
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Azure AD Multi-Factor Authentication and SSPR, if those methods are enabled in the Azure AD Multi-Factor Authentication and SSPR policies.
44-
>
45-
> If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` are required to perform multi-factor authentication before they can access the page.
46-
47-
If you have configured the *Site to Zone Assignment List* in Internet Explorer, the following sites have to be in the same zone:
48-
49-
* *[https://login.microsoftonline.com](https://login.microsoftonline.com)*
50-
* *[https://Login.windows.net](https://login.windows.net)*
51-
* *[https://mysignins.microsoft.com](https://mysignins.microsoft.com)*
52-
* *[https://account.activedirectory.windowsazure.com](https://account.activedirectory.windowsazure.com)*
53-
5429
## Conditional Access policies for combined registration
5530

5631
To secure when and how users register for Azure AD Multi-Factor Authentication and self-service password reset, you can use user actions in Conditional Access policy. This functionality may be enabled in organizations that want users to register for Azure AD Multi-Factor Authentication and SSPR from a central location, such as a trusted network location during HR onboarding.
@@ -91,6 +66,6 @@ Complete the following steps to create a policy that applies to all selected use
9166

9267
If you need help, see [troubleshoot combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md) or learn [What is the location condition in Azure AD Conditional Access?](../conditional-access/location-condition.md)
9368

94-
Once users are enabled for combined registration, you can then [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
69+
Review how you can [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md) in your tenant.
9570

9671
If needed, learn how to [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).

0 commit comments

Comments
 (0)