Skip to content

Commit 67addb7

Browse files
Merge pull request #110302 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 62c5557 + 31ec895 commit 67addb7

File tree

150 files changed

+1837
-734
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

150 files changed

+1837
-734
lines changed

articles/active-directory-b2c/customize-ui-overview.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/19/2020
12+
ms.date: 04/04/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -87,7 +87,10 @@ Review the following guidance before using your own HTML and CSS files to custom
8787

8888
When using your own HTML and CSS files to customize the UI, you can host your UI content on any publicly available HTTPS endpoint that supports CORS. For example, [Azure Blob storage](../storage/blobs/storage-blobs-introduction.md), web servers, CDNs, AWS S3, or file sharing systems.
8989

90-
The important point is that you host the content on a publicly available HTTPS endpoint with CORS enabled. You must use an absolute URL when you specify it in your content.
90+
The important point is that you host the content on a publicly available HTTPS endpoint with [CORS enabled](https://enable-cors.org/server.html). You must use an absolute URL when you specify it in your content.
91+
92+
> [!NOTE]
93+
> For details about creating HTML content, uploading content to Azure Blob storage, and configuring CORS, see the [Custom page content walkthrough](custom-policy-ui-customization.md#custom-page-content-walkthrough) section in the UI customization article.
9194
9295
## Get started with custom HTML and CSS
9396

Lines changed: 34 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: How it works Azure MFA - Azure Active Directory
3-
description: Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
2+
title: Azure Multi-Factor Authentication overview
3+
description: Learn how Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/21/2019
9+
ms.date: 04/03/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -17,40 +17,50 @@ ms.collection: M365-identity-device-management
1717
---
1818
# How it works: Azure Multi-Factor Authentication
1919

20-
The security of two-step verification lies in its layered approach. Compromising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user's password, it is useless without also having possession of the additional authentication method. It works by requiring two or more of the following authentication methods:
20+
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
2121

22-
* Something you know (typically a password)
23-
* Something you have (a trusted device that is not easily duplicated, like a phone)
24-
* Something you are (biometrics)
22+
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.
2523

26-
<center>
24+
![Conceptual image of the different forms of multi-factor authentication](./media/concept-mfa-howitworks/methods.png)
2725

28-
![Conceptual authentication methods image](./media/concept-mfa-howitworks/methods.png)</center>
26+
Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
2927

30-
Azure Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
28+
* Something you know, typically a password.
29+
* Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
30+
* Something you are - biometrics like a fingerprint or face scan.
3131

32-
## How to get Multi-Factor Authentication?
32+
Users can register themselves for both self-service password reset and Azure Multi-Factor Authentication in one step to simplify the on-boarding experience. Administrators can define what forms of secondary authentication can be used. Azure Multi-Factor Authentication can also be required when users perform a self-service password reset to further secure that process.
3333

34-
Multi-Factor Authentication comes as part of the following offerings:
34+
![Authentication methods in use at the sign-in screen](media/concept-authentication-methods/overview-login.png)
3535

36-
* **Azure Active Directory Premium** or **Microsoft 365 Business** - Full featured use of Azure Multi-Factor Authentication using Conditional Access policies to require multi-factor authentication.
36+
Azure Multi-Factor Authentication helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
3737

38-
* **Azure AD Free** or standalone **Office 365** licenses - Use [Security Defaults](../fundamentals/concept-fundamentals-security-defaults.md) to require multi-factor authentication for your users and administrators.
38+
Your applications or services don't need to make any changes to use Azure Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in event, which automatically requests and processes the MFA challenge when required.
3939

40-
* **Azure Active Directory Global Administrators** - A subset of Azure Multi-Factor Authentication capabilities are available as a means to protect global administrator accounts.
40+
## Available verification methods
4141

42-
> [!NOTE]
43-
> New customers may no longer purchase Azure Multi-Factor Authentication as a standalone offering effective September 1st, 2018. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
42+
When a user signs in to an application or service and receive an MFA prompt, they can choose from one of their registered forms of additional verification. An administrator could require registration of these Azure Multi-Factor Authentication verification methods, or the user can access their own [My Profile](https://myprofile.microsoft.com) to edit or add verification methods.
4443

45-
## Supportability
44+
The following additional forms of verification can be used with Azure Multi-Factor Authentication:
4645

47-
Since most users are accustomed to using only passwords to authenticate, it is important that your organization communicates to all users regarding this process. Awareness can reduce the likelihood that users call your help desk for minor issues related to MFA. However, there are some scenarios where temporarily disabling MFA is necessary. Use the following guidelines to understand how to handle those scenarios:
46+
* Microsoft Authenticator app
47+
* OATH Hardware token
48+
* SMS
49+
* Voice call
4850

49-
* Train your support staff to handle scenarios where the user can't sign in because they do not have access to their authentication methods or they are not working correctly.
50-
* Using Conditional Access policies for Azure MFA Service, your support staff can add a user to a group that is excluded from a policy requiring MFA.
51-
* Consider using Conditional Access named locations as a way to minimize two-step verification prompts. With this functionality, administrators can bypass two-step verification for users that are signing in from a secure trusted network location such as a network segment used for new user onboarding.
52-
* Deploy [Azure AD Identity Protection](../active-directory-identityprotection.md) and trigger two-step verification based on risk detections.
51+
## How to enable and use Azure Multi-Factor Authentication
52+
53+
Users and groups can be enabled for Azure Multi-Factor Authentication to prompt for additional verification during the sign-in event. [Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are available for all Azure AD tenants to quickly enable the use of the Microsoft Authenticator app for all users.
54+
55+
For more granular controls, [Conditional Access](../conditional-access/overview.md) policies can be used to define events or applications that require MFA. These policies can allow regular sign-in events when the user is on the corporate network or a registered device, but prompt for additional verification factors when remote or on a personal device.
56+
57+
![Overview diagram of how Conditional Access works to secure the sign-in process](media/tutorial-enable-azure-mfa/conditional-access-overview.png)
5358

5459
## Next steps
5560

56-
- [Step-by-step Azure Multi-Factor Authentication deployment](howto-mfa-getstarted.md)
61+
To learn about licensing, see [Features and licenses for Azure Multi-Factor Authentication](concept-mfa-licensing.md).
62+
63+
To see MFA in action, enable Azure Multi-Factor Authentication for a set of test users in the following tutorial:
64+
65+
> [!div class="nextstepaction"]
66+
> [Enable Azure Multi-Factor Authentication](tutorial-mfa-applications.md)

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Deploy Azure Multi-Factor Authentication - Azure Active Directory
3-
description: Microsoft Azure Multi-Factor Authentication deployment planning
2+
title: Deployment considerations for Azure Multi-Factor Authentication
3+
description: Learn about deployment considerations and strategy for successful implementation of Azure Multi-Factor Authentication
44

55
services: multi-factor-authentication
66
ms.service: active-directory
@@ -15,12 +15,19 @@ ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Planning a cloud-based Azure Multi-Factor Authentication deployment
18+
# Plan an Azure Multi-Factor Authentication deployment
1919

2020
People are connecting to organizational resources in increasingly complicated scenarios. People connect from organization-owned, personal, and public devices on and off the corporate network using smart phones, tablets, PCs, and laptops, often on multiple platforms. In this always-connected, multi-device and multi-platform world, the security of user accounts is more important than ever. Passwords, no matter their complexity, used across devices, networks, and platforms are no longer sufficient to ensure the security of the user account, especially when users tend to reuse passwords across accounts. Sophisticated phishing and other social engineering attacks can result in usernames and passwords being posted and sold across the dark web.
2121

2222
[Azure Multi-Factor Authentication (MFA)](concept-mfa-howitworks.md) helps safeguard access to data and applications. It provides an additional layer of security using a second form of authentication. Organizations can use [Conditional Access](../conditional-access/overview.md) to make the solution fit their specific needs.
2323

24+
This deployment guide shows you how to plan and then test an Azure Multi-Factor Authentication roll-out.
25+
26+
To quickly see Azure Multi-Factor Authentication in action and then come back to understand additional deployment considerations:
27+
28+
> [!div class="nextstepaction"]
29+
> [Enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md)
30+
2431
## Prerequisites
2532

2633
Before starting a deployment of Azure Multi-Factor Authentication, there are prerequisite items that should be considered.
@@ -170,7 +177,7 @@ Get-MsolUser -All | where {$_.StrongAuthenticationMethods.Count -eq 0} | Select-
170177

171178
If your users were enabled using per-user enabled and enforced Azure Multi-Factor Authentication the following PowerShell can assist you in making the conversion to Conditional Access based Azure Multi-Factor Authentication.
172179

173-
Run this PowerShell in an ISE window or save as a .PS1 file to run locally.
180+
Run this PowerShell in an ISE window or save as a `.PS1` file to run locally.
174181

175182
```PowerShell
176183
# Sets the MFA requirement state
@@ -314,7 +321,7 @@ On each AD FS server, in the local computer My Store, there will be a self-signe
314321

315322
If the validity period of your certificates is nearing expiration, [generate and verify a new MFA certificate on each AD FS server](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa#configure-the-ad-fs-servers).
316323

317-
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for 2 years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
324+
The following guidance details how to manage the Azure MFA certificates on your AD FS servers. When you configure AD FS with Azure MFA, the certificates generated via the `New-AdfsAzureMfaTenantCertificate` PowerShell cmdlet are valid for two years. Renew and install the renewed certificates prior to expiration to ovoid disruptions in MFA service.
318325

319326
## Implement your plan
320327

@@ -354,6 +361,7 @@ Find solutions for common issues with Azure MFA at the [Troubleshooting Azure Mu
354361

355362
## Next steps
356363

357-
* [What are authentication methods?](concept-authentication-methods.md)
358-
* [Enable converged registration for Azure Multi-Factor Authentication and Azure AD self-service password reset](concept-registration-mfa-sspr-converged.md)
359-
* Why was a user prompted or not prompted to perform MFA? See the section [Azure AD sign-ins report in the Reports in Azure Multi-Factor Authentication document](howto-mfa-reporting.md#azure-ad-sign-ins-report).
364+
To see Azure Multi-Factor Authentication in action, complete the following tutorial:
365+
366+
> [!div class="nextstepaction"]
367+
> [Enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md)

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ The NPS server needs to be able to communicate with the following URLs over port
7575

7676
- https:\//adnotifications.windowsazure.com
7777
- https:\//login.microsoftonline.com
78+
- https:\//credentials.azure.com
7879

7980
Additionally, connectivity to the following URLs is required to complete the [setup of the adapter using the provided PowerShell script](#run-the-powershell-script)
8081

0 commit comments

Comments
 (0)