Skip to content

Commit 65f502e

Browse files
committed
[AzureAD] TOC restructure, update per-user enablement
1 parent 320209c commit 65f502e

File tree

2 files changed

+78
-85
lines changed

2 files changed

+78
-85
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -68,16 +68,16 @@
6868
href: howto-sspr-authenticationdata.md
6969
- name: SSPR for Windows clients
7070
href: howto-sspr-windows.md
71-
- name: Cloud-based MFA
71+
- name: Azure Multi-Factor Authentication
7272
items:
7373
- name: Deployment guide
7474
href: howto-mfa-getstarted.md
75-
- name: Per user MFA
76-
href: howto-mfa-userstates.md
77-
- name: User and device settings
78-
href: howto-mfa-userdevicesettings.md
7975
- name: Configure settings
8076
href: howto-mfa-mfasettings.md
77+
- name: Configure users
78+
href: howto-mfa-userdevicesettings.md
79+
- name: Enable per-user MFA
80+
href: howto-mfa-userstates.md
8181
- name: Configure authentication providers
8282
href: concept-mfa-authprovider.md
8383
- name: Directory Federation
Lines changed: 73 additions & 80 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Per-user Multi-Factor Authentication - Azure Active Directory
3-
description: Enable MFA by changing user states in Azure Multi-Factor Authentication.
2+
title: Enable per-user Multi-Factor Authentication - Azure Active Directory
3+
description: Learn how to enable per-user Azure Multi-Factor Authentication by changing the user state
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/21/2019
9+
ms.date: 04/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -15,111 +15,106 @@ ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# How to require two-step verification for a user
18+
# Enable per-user Azure Multi-Factor Authentication to secure sign-in events
1919

20-
You can take one of two approaches for requiring two-step verification, both of which require using a global administrator account. The first option is to enable each user for Azure Multi-Factor Authentication (MFA). When users are enabled individually, they perform two-step verification each time they sign in (with some exceptions, such as when they sign in from trusted IP addresses or when the _remembered devices_ feature is turned on). The second option is to set up a Conditional Access policy that requires two-step verification under certain conditions.
20+
There are two ways to secure user sign-in events by requiring multi-factor authentication in Azure AD. The first, and preferred, option is to set up a Conditional Access policy that requires multi-factor authentication under certain conditions. The second option is to enable each user for Azure Multi-Factor Authentication. When users are enabled individually, they perform multi-factor authentication each time they sign in (with some exceptions, such as when they sign in from trusted IP addresses or when the _remembered devices_ feature is turned on).
2121

22-
> [!TIP]
23-
> Enabling Azure Multi-Factor Authentication using Conditional Access policies is the recommended approach. Changing user states is no longer recommended unless your licenses do not include Conditional Access as it will require users to perform MFA every time they sign in.
24-
25-
## Choose how to enable
26-
27-
**Enabled by changing user state** - This is the traditional method for requiring two-step verification and is discussed in this article. It works with both Azure MFA in the cloud and Azure MFA Server. Using this method requires users to perform two-step verification **every time** they sign in and overrides Conditional Access policies.
28-
29-
**Enabled by Conditional Access policy** - This is the most flexible means to enable two-step verification for your users. Enabling using Conditional Access policy only works for Azure MFA in the cloud and is a premium feature of Azure AD. More information on this method can be found in [Deploy cloud-based Azure Multi-Factor Authentication](howto-mfa-getstarted.md).
30-
31-
**Enabled by Azure AD Identity Protection** - This method uses the Azure AD Identity Protection risk policy to require two-step verification based only on sign-in risk for all cloud applications. This method requires Azure Active Directory P2 licensing. More information on this method can be found in [Azure Active Directory Identity Protection](../identity-protection/howto-sign-in-risk-policy.md)
32-
33-
> [!Note]
34-
> More information about licenses and pricing can be found on the [Azure AD](https://azure.microsoft.com/pricing/details/active-directory/
35-
) and [Multi-Factor Authentication](https://azure.microsoft.com/pricing/details/multi-factor-authentication/) pricing pages.
22+
> [!NOTE]
23+
> Enabling Azure Multi-Factor Authentication using Conditional Access policies is the recommended approach. Changing user states is no longer recommended unless your licenses don't include Conditional Access as it requires users to perform MFA every time they sign in.
24+
>
25+
> To get started using Conditional Access, see [Tutorial: Secure user sign-in events with Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
3626
37-
## Enable Azure MFA by changing user state
27+
## Azure Multi-Factor Authentication user states
3828

3929
User accounts in Azure Multi-Factor Authentication have the following three distinct states:
4030

4131
> [!IMPORTANT]
42-
> Enabling Azure MFA through a Conditional Access policy will not change the state of the user. Do not be alarmed users appear disabled. Conditional Access does not change the state. **Organizations should not enable or enforce users if they are utilizing Conditional Access policies.**
32+
> Enabling Azure Multi-Factor Authentication through a Conditional Access policy doesn't change the state of the user. Don't be alarmed if users appear disabled. Conditional Access doesn't change the state.
33+
>
34+
> **You shouldn't enable or enforce users if you're using Conditional Access policies.**
4335
4436
| Status | Description | Non-browser apps affected | Browser apps affected | Modern authentication affected |
4537
|:---:| --- |:---:|:--:|:--:|
46-
| Disabled | The default state for a new user not enrolled in Azure MFA. | No | No | No |
47-
| Enabled | The user has been enrolled in Azure MFA, but has not registered. They receive a prompt to register the next time they sign in. | No. They continue to work until the registration process is completed. | Yes. After the session expires, Azure MFA registration is required.| Yes. After the access token expires, Azure MFA registration is required. |
48-
| Enforced | The user has been enrolled and has completed the registration process for Azure MFA. | Yes. Apps require app passwords. | Yes. Azure MFA is required at login. | Yes. Azure MFA is required at login. |
38+
| Disabled | The default state for a new user not enrolled in Azure Multi-Factor Authentication. | No | No | No |
39+
| Enabled | The user has been enrolled in Azure Multi-Factor Authentication, but hasn't registered. They receive a prompt to register the next time they sign in. | No. They continue to work until the registration process is completed. | Yes. After the session expires, Azure Multi-Factor Authentication registration is required.| Yes. After the access token expires, Azure Multi-Factor Authentication registration is required. |
40+
| Enforced | The user has been enrolled and has completed the registration process for Azure Multi-Factor Authentication. | Yes. Apps require app passwords. | Yes. Azure Multi-Factor Authentication is required at login. | Yes. Azure Multi-Factor Authentication is required at login. |
4941

50-
A user's state reflects whether an admin has enrolled them in Azure MFA, and whether they completed the registration process.
42+
A user's state reflects whether an admin has enrolled them in Azure Multi-Factor Authentication, and whether they completed the registration process.
5143

52-
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
44+
All users start out *Disabled*. When you enroll users in Azure Multi-Factor Authentication, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
5345

5446
> [!NOTE]
5547
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
5648
57-
### View the status for a user
49+
## View the status for a user
5850

59-
Use the following steps to access the page where you can view and manage user states:
51+
Use the following steps to access the Azure portal page where you can view and manage user states:
6052

6153
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
62-
2. Search for and select *Azure Active Directory*. Select **Users** > **All users**.
63-
3. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
54+
1. Search for and select *Azure Active Directory*, then select **Users** > **All users**.
55+
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
6456
[![](media/howto-mfa-userstates/selectmfa-cropped.png "Select Multi-Factor Authentication from the Users window in Azure AD")](media/howto-mfa-userstates/selectmfa.png#lightbox)
65-
4. A new page that displays the user states opens.
66-
![multi-factor authentication user status - screenshot](./media/howto-mfa-userstates/userstate1.png)
57+
1. A new page opens that displays the user state, as shown in the following example.
58+
![Screenshot that shows example user state information for Azure Multi-Factor Authentication](./media/howto-mfa-userstates/userstate1.png)
59+
60+
## Change the status for a user
6761

68-
### Change the status for a user
62+
To change the Azure Multi-Factor Authentication state for a user, complete the following steps:
6963

7064
1. Use the preceding steps to get to the Azure Multi-Factor Authentication **users** page.
71-
2. Find the user you want to enable for Azure MFA. You might need to change the view at the top.
65+
1. Find the user you want to enable for Azure Multi-Factor Authentication. You might need to change the view at the top to **users**.
7266
![Select the user to change status for from the users tab](./media/howto-mfa-userstates/enable1.png)
73-
3. Check the box next to their name.
74-
4. On the right, under **quick steps**, choose **Enable** or **Disable**.
67+
1. Check the box next to the name(s) of the user(s) to change the state for.
68+
1. On the right-hand side, under **quick steps**, choose **Enable** or **Disable**. In the following example, the user *John Smith* has a check next to their name and is being enabled for use:
7569
![Enable selected user by clicking Enable on the quick steps menu](./media/howto-mfa-userstates/user1.png)
7670

7771
> [!TIP]
78-
> *Enabled* users are automatically switched to *Enforced* when they register for Azure MFA. Do not manually change the user state to *Enforced*.
72+
> *Enabled* users are automatically switched to *Enforced* when they register for Azure Multi-Factor Authentication. Don't manually change the user state to *Enforced*.
7973
80-
5. Confirm your selection in the pop-up window that opens.
74+
1. Confirm your selection in the pop-up window that opens.
8175

82-
After you enable users, notify them via email. Tell them that they'll be asked to register the next time they sign in. Also, if your organization uses non-browser apps that don't support modern authentication, they need to create app passwords. You can also include a link to the [Azure MFA end-user guide](../user-help/multi-factor-authentication-end-user.md) to help them get started.
76+
After you enable users, notify them via email. Tell the users that a prompt is displayed to ask them to register the next time they sign in. Also, if your organization uses non-browser apps that don't support modern authentication, they need to create app passwords. For more information, see the [Azure Multi-Factor Authentication end-user guide](../user-help/multi-factor-authentication-end-user.md) to help them get started.
8377

84-
### Use PowerShell
78+
## Change state using PowerShell
8579

86-
To change the user state by using [Azure AD PowerShell](/powershell/azure/overview), change `$st.State`. There are three possible states:
80+
To change the user state by using [Azure AD PowerShell](/powershell/azure/overview), you change the `$st.State` parameter for a user account. There are three possible states for a user account:
8781

88-
* Enabled
89-
* Enforced
90-
* Disabled
82+
* *Enabled*
83+
* *Enforced*
84+
* *Disabled*
9185

92-
Don't move users directly to the *Enforced* state. If you do, non-browser-based apps stop working because the user has not gone through Azure MFA registration and obtained an [app password](howto-mfa-mfasettings.md#app-passwords).
86+
Don't move users directly to the *Enforced* state. If you do so, non-browser-based apps stop working because the user hasn't gone through Azure Multi-Factor Authentication registration and obtained an [app password](howto-mfa-mfasettings.md#app-passwords).
9387

94-
Install the Module first, using:
88+
To get started, install the *MSOnline* module using [Install-Module](/powershell/module/powershellget/install-module) as follows:
9589

96-
```PowerShell
97-
Install-Module MSOnline
98-
```
90+
```PowerShell
91+
Install-Module MSOnline
92+
```
9993

100-
> [!TIP]
101-
> Don't forget to connect first using **Connect-MsolService**
94+
Next, connect using [Connect-MsolService](/powershell/module/msonline/connect-msolservice):
10295

103-
```PowerShell
104-
Connect-MsolService
105-
```
96+
```PowerShell
97+
Connect-MsolService
98+
```
10699

107-
This example PowerShell script enables MFA for an individual user:
100+
The following example PowerShell script enables MFA for an individual user named *[email protected]*:
108101

109-
```PowerShell
110-
Import-Module MSOnline
111-
Connect-MsolService
112-
$st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
113-
$st.RelyingParty = "*"
114-
$st.State = "Enabled"
115-
$sta = @($st)
116-
Set-MsolUser -UserPrincipalName [email protected] -StrongAuthenticationRequirements $sta
117-
```
102+
```PowerShell
103+
$st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
104+
$st.RelyingParty = "*"
105+
$st.State = "Enabled"
106+
$sta = @($st)
107+
108+
# Change the following UserPrincipalName to the user you wish to change state
109+
Set-MsolUser -UserPrincipalName [email protected] -StrongAuthenticationRequirements $sta
110+
```
118111

119-
Using PowerShell is a good option when you need to bulk enable users. As an example, the following script loops through a list of users and enables MFA on their accounts:
112+
Using PowerShell is a good option when you need to bulk enable users. The following script loops through a list of users and enables MFA on their accounts. Define the user accounts set it in the first line for `$users` as follows:
120113

121114
```PowerShell
115+
# Define your list of users to update state in bulk
122116
117+
123118
foreach ($user in $users)
124119
{
125120
$st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
@@ -130,24 +125,22 @@ Using PowerShell is a good option when you need to bulk enable users. As an exam
130125
}
131126
```
132127

133-
To disable MFA, use this script:
128+
To disable MFA, the following example gets a user with [Get-MsolUser](/powershell/module/msonline/get-msoluser), then removes any *StrongAuthenticationRequirements* set for the defined user using [Set-MsolUser](/powershell/module/msonline/set-msoluser):
134129

135-
```PowerShell
136-
Get-MsolUser -UserPrincipalName user@domain.com | Set-MsolUser -StrongAuthenticationRequirements @()
137-
```
130+
```PowerShell
131+
Get-MsolUser -UserPrincipalName bsimon@contoso.com | Set-MsolUser -StrongAuthenticationRequirements @()
132+
```
138133

139-
which can also be shortened to:
134+
You could also directly disable MFA for a user using [Set-MsolUser](/powershell/module/msonline/set-msoluser) as follows:
140135

141-
```PowerShell
142-
Set-MsolUser -UserPrincipalName user@domain.com -StrongAuthenticationRequirements @()
143-
```
136+
```PowerShell
137+
Set-MsolUser -UserPrincipalName bsimon@contoso.com -StrongAuthenticationRequirements @()
138+
```
144139

145-
### Convert users from per-user MFA to Conditional Access based MFA
140+
## Convert users from per-user MFA to Conditional Access based MFA
146141

147142
The following PowerShell can assist you in making the conversion to Conditional Access based Azure Multi-Factor Authentication.
148143

149-
Run this PowerShell in an ISE window or save as a .PS1 file to run locally.
150-
151144
```PowerShell
152145
# Sets the MFA requirement state
153146
function Set-MfaState {
@@ -183,12 +176,12 @@ Get-MsolUser -All | Set-MfaState -State Disabled
183176
```
184177

185178
> [!NOTE]
186-
> We recently changed the behavior and PowerShell script above accordingly. Previously, the script saved off the MFA methods, disabled MFA, and restored the methods. This is no longer necessary now that the default behavior for disable doesn't clear the methods.
179+
> We recently changed the behavior and this PowerShell script. Previously, the script saved off the MFA methods, disabled MFA, and restored the methods. This is no longer necessary now that the default behavior for disable doesn't clear the methods.
187180
>
188181
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
189182
190183
## Next steps
191184

192-
* Why was a user prompted or not prompted to perform MFA? See the section [Azure AD sign-ins report in the Reports in Azure Multi-Factor Authentication document](howto-mfa-reporting.md#azure-ad-sign-ins-report).
193-
* To configure additional settings like trusted IPs, custom voice messages, and fraud alerts, see the article [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md)
194-
* Information about managing user settings for Azure Multi-Factor Authentication can be found in the article [Manage user settings with Azure Multi-Factor Authentication in the cloud](howto-mfa-userdevicesettings.md)
185+
To configure Azure Multi-Factor Authentication settings like trusted IPs, custom voice messages, and fraud alerts, see [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md). To manage user settings for Azure Multi-Factor Authentication, see [Manage user settings with Azure Multi-Factor Authentication](howto-mfa-userdevicesettings.md).
186+
187+
To understand why a user was prompted or not prompted to perform MFA, see [Azure Multi-Factor Authentication reports](howto-mfa-reporting.md#azure-ad-sign-ins-report).

0 commit comments

Comments
 (0)