You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -191,7 +191,7 @@ The MFA Server Migration utility targets a single Azure AD group for all migrati
191
191
192
192
To begin the migration process, enter the name or GUID of the Azure AD group you want to migrate. Once complete, press Tab or click outside the window and the utility will begin searching for the appropriate group. The window will populate all users in the group. A large group can take several minutes to finish.
193
193
194
-
To view user attribute data for a user, highlight the user, and select **View**:
194
+
To view attribute data for a user, highlight the user, and select **View**:
195
195
196
196
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/view-user.png" alt-text="Screenshot of how to view use settings.":::
197
197
@@ -202,7 +202,10 @@ The settings option allows you to change the settings for the migration process:
202
202
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/settings.png" alt-text="Screenshot of settings.":::
203
203
204
204
- Migrate – This setting allows you to specify which method(s) should be migrated for the selection of users
205
-
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName
205
+
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName:
206
+
- The migration utility tries direct matching to UPN before using the on-premises Active Directory attribute.
207
+
- If no match is found, it calls a Windows API to find the Azure AD UPN and get the SID, which it uses to search the MFA Server user list.
208
+
- If the Windows API doesn’t find the user or the SID isn’t found in the MFA Server, then it will use the configured Active Directory attribute to find the user in the on-premises Active Directory, and then use the SID to search the MFA Server user list.
206
209
- Automatic synchronization – Starts a background service that will continually monitor any authentication method changes to users in the on-premises MFA Server, and write them to Azure AD at the specified time interval defined
207
210
208
211
The migration process can be an automatic process, or a manual process.
Set the **Staged Rollout for Azure MFA** to **Off**. Users will once again be redirected to your on-premises federation server for MFA.
373
+
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
371
374
372
375
>[!NOTE]
373
376
>The update of the domain federation setting can take up to 24 hours to take effect.
@@ -443,7 +446,8 @@ If the upgrade had issues, follow these steps to roll back:
443
446
}
444
447
```
445
448
446
-
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
449
+
450
+
Set the **Staged Rollout for Azure MFA** to **Off**. Users will once again be redirected to your on-premises federation server for MFA.
0 commit comments