You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/customize-ui-overview.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 03/19/2020
12
+
ms.date: 04/04/2020
13
13
ms.author: mimart
14
14
ms.subservice: B2C
15
15
---
@@ -87,7 +87,10 @@ Review the following guidance before using your own HTML and CSS files to custom
87
87
88
88
When using your own HTML and CSS files to customize the UI, you can host your UI content on any publicly available HTTPS endpoint that supports CORS. For example, [Azure Blob storage](../storage/blobs/storage-blobs-introduction.md), web servers, CDNs, AWS S3, or file sharing systems.
89
89
90
-
The important point is that you host the content on a publicly available HTTPS endpoint with CORS enabled. You must use an absolute URL when you specify it in your content.
90
+
The important point is that you host the content on a publicly available HTTPS endpoint with [CORS enabled](https://enable-cors.org/server.html). You must use an absolute URL when you specify it in your content.
91
+
92
+
> [!NOTE]
93
+
> For details about creating HTML content, uploading content to Azure Blob storage, and configuring CORS, see the [Custom page content walkthrough](custom-policy-ui-customization.md#custom-page-content-walkthrough) section in the UI customization article.
title: How it works Azure MFA - Azure Active Directory
3
-
description: Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
2
+
title: Azure Multi-Factor Authentication overview
3
+
description: Learn how Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
The security of two-step verification lies in its layered approach. Compromising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user's password, it is useless without also having possession of the additional authentication method. It works by requiring two or more of the following authentication methods:
20
+
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
21
21
22
-
* Something you know (typically a password)
23
-
* Something you have (a trusted device that is not easily duplicated, like a phone)
24
-
* Something you are (biometrics)
22
+
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.
25
23
26
-
<center>
24
+

Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
29
27
30
-
Azure Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
28
+
* Something you know, typically a password.
29
+
* Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
30
+
* Something you are - biometrics like a fingerprint or face scan.
31
31
32
-
## How to get Multi-Factor Authentication?
32
+
Users can register themselves for both self-service password reset and Azure Multi-Factor Authentication in one step to simplify the on-boarding experience. Administrators can define what forms of secondary authentication can be used. Azure Multi-Factor Authentication can also be required when users perform a self-service password reset to further secure that process.
33
33
34
-
Multi-Factor Authentication comes as part of the following offerings:
34
+

35
35
36
-
***Azure Active Directory Premium** or **Microsoft 365 Business** - Full featured use of Azure Multi-Factor Authentication using Conditional Access policies to require multi-factor authentication.
36
+
Azure Multi-Factor Authentication helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
37
37
38
-
***Azure AD Free** or standalone **Office 365** licenses - Use [Security Defaults](../fundamentals/concept-fundamentals-security-defaults.md) to require multi-factor authentication for your users and administrators.
38
+
Your applications or services don't need to make any changes to use Azure Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in event, which automatically requests and processes the MFA challenge when required.
39
39
40
-
***Azure Active Directory Global Administrators** - A subset of Azure Multi-Factor Authentication capabilities are available as a means to protect global administrator accounts.
40
+
## Available verification methods
41
41
42
-
> [!NOTE]
43
-
> New customers may no longer purchase Azure Multi-Factor Authentication as a standalone offering effective September 1st, 2018. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
42
+
When a user signs in to an application or service and receive an MFA prompt, they can choose from one of their registered forms of additional verification. An administrator could require registration of these Azure Multi-Factor Authentication verification methods, or the user can access their own [My Profile](https://myprofile.microsoft.com) to edit or add verification methods.
44
43
45
-
## Supportability
44
+
The following additional forms of verification can be used with Azure Multi-Factor Authentication:
46
45
47
-
Since most users are accustomed to using only passwords to authenticate, it is important that your organization communicates to all users regarding this process. Awareness can reduce the likelihood that users call your help desk for minor issues related to MFA. However, there are some scenarios where temporarily disabling MFA is necessary. Use the following guidelines to understand how to handle those scenarios:
46
+
* Microsoft Authenticator app
47
+
* OATH Hardware token
48
+
* SMS
49
+
* Voice call
48
50
49
-
* Train your support staff to handle scenarios where the user can't sign in because they do not have access to their authentication methods or they are not working correctly.
50
-
* Using Conditional Access policies for Azure MFA Service, your support staff can add a user to a group that is excluded from a policy requiring MFA.
51
-
* Consider using Conditional Access named locations as a way to minimize two-step verification prompts. With this functionality, administrators can bypass two-step verification for users that are signing in from a secure trusted network location such as a network segment used for new user onboarding.
52
-
* Deploy [Azure AD Identity Protection](../active-directory-identityprotection.md) and trigger two-step verification based on risk detections.
51
+
## How to enable and use Azure Multi-Factor Authentication
52
+
53
+
Users and groups can be enabled for Azure Multi-Factor Authentication to prompt for additional verification during the sign-in event. [Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are available for all Azure AD tenants to quickly enable the use of the Microsoft Authenticator app for all users.
54
+
55
+
For more granular controls, [Conditional Access](../conditional-access/overview.md) policies can be used to define events or applications that require MFA. These policies can allow regular sign-in events when the user is on the corporate network or a registered device, but prompt for additional verification factors when remote or on a personal device.
56
+
57
+

Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-getstarted.md
+16-8Lines changed: 16 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Deploy Azure Multi-Factor Authentication - Azure Active Directory
3
-
description: Microsoft Azure Multi-Factor Authentication deployment planning
2
+
title: Deployment considerations for Azure Multi-Factor Authentication
3
+
description: Learn about deployment considerations and strategy for successful implementation of Azure Multi-Factor Authentication
4
4
5
5
services: multi-factor-authentication
6
6
ms.service: active-directory
@@ -15,12 +15,19 @@ ms.reviewer: michmcla
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Planning a cloud-based Azure Multi-Factor Authentication deployment
18
+
# Plan an Azure Multi-Factor Authentication deployment
19
19
20
20
People are connecting to organizational resources in increasingly complicated scenarios. People connect from organization-owned, personal, and public devices on and off the corporate network using smart phones, tablets, PCs, and laptops, often on multiple platforms. In this always-connected, multi-device and multi-platform world, the security of user accounts is more important than ever. Passwords, no matter their complexity, used across devices, networks, and platforms are no longer sufficient to ensure the security of the user account, especially when users tend to reuse passwords across accounts. Sophisticated phishing and other social engineering attacks can result in usernames and passwords being posted and sold across the dark web.
21
21
22
22
[Azure Multi-Factor Authentication (MFA)](concept-mfa-howitworks.md) helps safeguard access to data and applications. It provides an additional layer of security using a second form of authentication. Organizations can use [Conditional Access](../conditional-access/overview.md) to make the solution fit their specific needs.
23
23
24
+
This deployment guide shows you how to plan and then test an Azure Multi-Factor Authentication roll-out.
25
+
26
+
To quickly see Azure Multi-Factor Authentication in action and then come back to understand additional deployment considerations:
If your users were enabled using per-user enabled and enforced Azure Multi-Factor Authentication the following PowerShell can assist you in making the conversion to Conditional Access based Azure Multi-Factor Authentication.
172
179
173
-
Run this PowerShell in an ISE window or save as a .PS1 file to run locally.
180
+
Run this PowerShell in an ISE window or save as a `.PS1` file to run locally.
174
181
175
182
```PowerShell
176
183
# Sets the MFA requirement state
@@ -314,7 +321,7 @@ On each AD FS server, in the local computer My Store, there will be a self-signe
314
321
315
322
If the validity period of your certificates is nearing expiration, [generate and verify a new MFA certificate on each AD FS server](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa#configure-the-ad-fs-servers).
316
323
317
-
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for 2 years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
324
+
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for two years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
318
325
319
326
## Implement your plan
320
327
@@ -354,6 +361,7 @@ Find solutions for common issues with Azure MFA at the [Troubleshooting Azure Mu
354
361
355
362
## Next steps
356
363
357
-
*[What are authentication methods?](concept-authentication-methods.md)
358
-
*[Enable converged registration for Azure Multi-Factor Authentication and Azure AD self-service password reset](concept-registration-mfa-sspr-converged.md)
359
-
* Why was a user prompted or not prompted to perform MFA? See the section [Azure AD sign-ins report in the Reports in Azure Multi-Factor Authentication document](howto-mfa-reporting.md#azure-ad-sign-ins-report).
364
+
To see Azure Multi-Factor Authentication in action, complete the following tutorial:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,6 +75,7 @@ The NPS server needs to be able to communicate with the following URLs over port
75
75
76
76
- https:\//adnotifications.windowsazure.com
77
77
- https:\//login.microsoftonline.com
78
+
- https:\//credentials.azure.com
78
79
79
80
Additionally, connectivity to the following URLs is required to complete the [setup of the adapter using the provided PowerShell script](#run-the-powershell-script)
0 commit comments