Skip to content

Commit 63a3056

Browse files
authored
Merge pull request #192178 from Justinha/match
revisions
2 parents 6da19bf + e6048aa commit 63a3056

File tree

2 files changed

+9
-6
lines changed

2 files changed

+9
-6
lines changed

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Use additional context in multifactor authentication (MFA) notifications (Preview) - Azure Active Directory
2+
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
33
description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 02/11/2022
7+
ms.date: 03/18/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
14+
# How to use additional context in Microsoft Authenticator notifications (Preview) - Authentication Methods Policy
1515

1616
This topic covers how to improve the security of user sign-in by adding application location based on IP address in Microsoft Authenticator push notifications.
1717

@@ -34,6 +34,9 @@ The additional context can be combined with [number matching](how-to-mfa-number-
3434

3535
### Policy schema changes
3636

37+
>[!NOTE]
38+
>In Graph Explorer, ensure you've consented to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
39+
3740
Identify a single target group for the schema configuration. Then use the following API endpoint to change the displayAppInformationRequiredState property to **enabled**:
3841

3942
https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 02/28/2022
7+
ms.date: 03/18/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -38,7 +38,7 @@ Number matching is available for the following scenarios. When enabled, all scen
3838
- [NPS extension](howto-mfa-nps-extension.md)
3939

4040
>[!NOTE]
41-
>For passwordless users, enabling number matching has no impact because it's already part of the passwordless experience.
41+
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
4242
4343
### Multifactor authentication
4444

@@ -126,7 +126,7 @@ You will need to change the **numberMatchingRequiredState** from **default** to
126126
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
127127

128128
>[!NOTE]
129-
>For passwordless users, enabling number matching has no impact because it's already part of the passwordless experience.
129+
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
130130
131131
You might need to patch the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **numberMatchingRequiredState**.
132132

0 commit comments

Comments
 (0)