Skip to content

Commit 75f81e5

Browse files
authored
Update migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md
1 parent 6d52439 commit 75f81e5

File tree

1 file changed

+73
-68
lines changed

1 file changed

+73
-68
lines changed

articles/active-directory/manage-apps/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access.md

Lines changed: 73 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: martinco
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 01/12/2023
10+
ms.date: 01/13/2023
1111
ms.author: gasinh
1212
ms.subservice: app-mgmt
1313
---
@@ -98,126 +98,131 @@ To enable hybrid Azure AD join on your Azure AD Connect server, run the configur
9898

9999
Hybrid Azure AD join replaces Okta device trust on Windows. Conditional Access policies can include compliance for devices enrolled in Endpoint Manager:
100100

101-
* **Compliance overview**: Refer to [device compliance policies in Intune](/mem/intune/protect/device-compliance-get-started#:~:text=Reference%20for%20non-compliance%20and%20Conditional%20Access%20on%20the,applicable%20%20...%20%203%20more%20rows)
102-
* **Device compliance**: Create [policies in Intune](/mem/intune/protect/create-compliance-policy)
103-
* **Windows enrollment**: If you've opted to deploy hybrid Azure AD join, you can deploy another group policy to complete the [auto-enrollment process of these devices in Intune](/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy)
104-
* **iOS/iPadOS enrollment**: Before you enroll an iOS device, you must make [more configurations](/mem/intune/enrollment/ios-enroll) in the Endpoint Management console
105-
* **Android enrollment**: Before you enroll an Android device, you must make [more configurations](/mem/intune/enrollment/android-enroll) in the Endpoint Management console.
101+
#### Device compliance policy
106102

107-
## Configure Azure AD Multi-Factor Authentication tenant settings
108-
109-
Before you convert to Conditional Access, confirm the base Azure AD Multi-Factor Authentication tenant settings for your organization.
110-
111-
1. Go to the [Azure portal](https://portal.azure.com) and sign in with a global administrator account.
103+
* [Use compliance policies to set rules for devices you manage with Intune](/mem/intune/protect/device-compliance-get-started)
104+
* [Create a compliance policy in Microsoft Intune](/mem/intune/protect/create-compliance-policy)
112105

113-
1. Select **Azure Active Directory** > **Users** > **Multi-Factor Authentication** to go to the legacy Azure AD Multi-Factor Authentication portal.
106+
#### Windows 10/11, iOS, iPadOS, and Android enrollment
114107

115-
![Screenshot that shows the legacy Azure AD Multi-Factor Authentication portal.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/legacy-azure-ad-portal.png)
108+
If you deployed hybrid Azure AD join, you can deploy another group policy to complete auto-enrollment of these devices in Intune.
116109

117-
You can also use the legacy link to the [Azure AD Multi-Factor Authentication portal](https://aka.ms/mfaportal).
110+
* [What is device enrollment in Intune?](mem/intune/enrollment/device-enrollment)
111+
* [Quickstart: Set up automatic enrollment for Windows 10/11 devices](/mem/intune/enrollment/quickstart-setup-auto-enrollment)
112+
* [Enroll Android devices](/mem/intune/enrollment/android-enroll)
113+
* [Enroll iOS/iPadOS devices in Intune](/mem/intune/enrollment/ios-enroll)
118114

119-
1. On the legacy **multi-factor authentication** menu, change the status menu through **Enabled** and **Enforced** to confirm you have no users enabled for legacy MFA. If your tenant has users in the following views, you must disable them in the legacy menu. Only then will Conditional Access policies take effect on their account.
115+
## Configure Azure AD Multi-Factor Authentication tenant settings
120116

121-
![Screenshot that shows disabling a user in the legacy Azure AD Multi-Factor Authentication portal.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/disable-user-legacy-azure-ad-portal.png)
117+
Before you convert to Conditional Access, confirm the base MFA tenant settings for your organization.
122118

123-
The **Enforced** field should also be empty.
119+
1. Go to the [Azure portal](https://portal.azure.com).
120+
2. Sign in as a Global Administrator.
121+
3. Select **Azure Active Directory** > **Users** > **Multi-Factor Authentication**.
122+
4. The legacy Azure AD Multi-Factor Authentication portal appears. Or select [Azure AD MFA portal](https://aka.ms/mfaportal).
124123

125-
1. Select the **Service settings** option. Change the **App passwords** selection to **Do not allow users to create app passwords to sign in to non-browser apps**.
124+
![Screenshot of the multi-factor authentication screen.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/legacy-azure-ad-portal.png)
126125

127-
![Screenshot that shows the application password settings not allowing users to create app passwords.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/app-password-selection.png)
126+
5. Confirm there are no users enabled for legacy MFA: On the **multi-factor authentication** menu, on **Multi-Factor Auth status**, select **Enabled** and **Enforced**. If the tenant has users in the following views, disable them in the legacy menu.
128127

129-
1. Ensure the **Skip multi-factor authentication for requests from federated users on my intranet** and **Allow users to remember multi-factor authentication on devices they trust (between one to 365 days)** checkboxes are cleared, and then select **Save**.
128+
![Screenshot of the multi-factor authentication screen with the search feature highlighted.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/disable-user-legacy-azure-ad-portal.png)
130129

131-
>[!NOTE]
132-
>See [best practices for configuring the MFA prompt settings](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
130+
6. Esure the **Enforced** field is empty.
131+
7. Select the **Service settings** option.
132+
8. Change the **App passwords** selection to **Do not allow users to create app passwords to sign in to non-browser apps**.
133133

134-
![Screenshot that shows cleared checkboxes in the legacy Azure AD Multi-Factor Authentication portal.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/uncheck-fields-legacy-azure-ad-portal.png)
134+
![Screenshot of the multi-factor authentication screen with service settings highlighted.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/app-password-selection.png)
135135

136-
## Configure Conditional Access policies
136+
9. Clear the checkboxes for **Skip multi-factor authentication for requests from federated users on my intranet** and **Allow users to remember multi-factor authentication on devices they trust (between one to 365 days)**.
137+
10. Select **Save**.
137138

138-
After you've configured the prerequisites and established the base settings, it's time to build the first Conditional Access policy.
139+
![Screenshot of cleared checkboxes on the Require Trusted Devices for Access screen.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/uncheck-fields-legacy-azure-ad-portal.png)
139140

140-
1. To configure Conditional Access policies in Azure AD, go to the [Azure portal](https://portal.azure.com). On **Manage Azure Active Directory**, select **View**.
141+
>[!NOTE]
142+
>See [Optimize reauthentication prompts and understand session lifetime for Azure AD MFA](../authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md).
141143
142-
Configure Conditional Access policies by following [best
143-
practices for deploying and designing Conditional Access](../conditional-access/plan-conditional-access.md#understand-conditional-access-policy-components).
144+
## Build a Conditional Access policy
144145

145-
1. To mimic the global sign-on MFA policy from Okta, [create a policy](../conditional-access/howto-conditional-access-policy-all-users-mfa.md).
146+
After you configure the prerequisites and established base settings, you can build Conditional Access policy. Policy can be targeted to an application, a test group of users, or both.
146147

147-
1. Create a [device trust-based Conditional Access rule](../conditional-access/require-managed-devices.md).
148+
Before you get started:
148149

149-
This policy as any other in this tutorial can be targeted to a specific application, a test group of users, or both.
150+
* [Understand Conditional Access policy components](/articles/active-directory/conditional-access/plan-conditional-access.md#understand-conditional-access-policy-components)
151+
* [Building a Conditional Access policy](/azure/active-directory/conditional-access/concept-conditional-access-policies)
150152

151-
![Screenshot that shows testing a user.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/test-user.png)
153+
1. Go to the [Azure portal](https://portal.azure.com).
154+
2. On **Manage Azure Active Directory**, select **View**.
155+
3. Create a policy. See, [Common Conditional Access policy: Require MFA for all users](/articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md).
156+
4. Create a device trust-based Conditional Access rule.
152157

153-
![Screenshot that shows success in testing a user.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/success-test-user.png)
158+
![Screenshot of entries for Require Trusted Devices for Access, under Conditional Access.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/test-user.png)
154159

155-
1. After you've configured the location-based policy and device trust policy, it's time to configure the equivalent [block legacy authentication](../conditional-access/howto-conditional-access-policy-block-legacy.md) policy.
160+
![Screenshot of the Keep you account secure dialog with the success message.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/success-test-user.png)
156161

157-
With these three Conditional Access policies, the original Okta sign-on policies experience has been replicated in Azure AD. Next steps involve enrolling the user via Azure AD Multi-Factor Authentication and testing the policies.
162+
5. After you configure the location-based policy and device trust policy, [Block legacy authentication with Azure AD with Conditional Access](/azure/active-directory/conditional-access/block-legacy-authentication).
158163

159-
## Enroll pilot members in Azure AD Multi-Factor Authentication
164+
With these three Conditional Access policies, the original Okta sign-on policies experience is replicated in Azure AD.
160165

161-
After you configure the Conditional Access policies, users must register for Azure AD Multi-Factor Authentication methods. Users can be required to register through several different methods.
166+
## Enroll pilot members in MFA
162167

163-
1. For individual registration, direct users to the [Microsoft Sign-in pane](https://aka.ms/mfasetup) to manually enter the registration information.
168+
Users register for MFA methods.
164169

165-
1. Users can go to the [Microsoft Security info page](https://aka.ms/mysecurityinfo) to enter information or manage the form of MFA registration.
170+
For individual registration, users go to [Microsoft Sign-in pane](https://aka.ms/mfasetup).
166171

167-
See [this guide](../authentication/howto-registration-mfa-sspr-combined.md) to fully understand the MFA registration process.
172+
To manage registration, users go to [Microsoft My Sign-Ins | Security Info](https://aka.ms/mysecurityinfo).
168173

169-
Go to the [Microsoft Sign-in pane](https://aka.ms/mfasetup). After you sign in with Okta MFA, you're instructed to register for MFA with Azure AD.
174+
Learn more: [Enable combined security information registration in Azure Active Directory](/articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md).
170175

171176
>[!NOTE]
172-
>If registration already happened in the past for a user, they're taken to the **My Security** information page after they satisfy the MFA prompt.
173-
See the [user documentation for MFA enrollment](../user-help/security-info-setup-signin.md).
177+
>If users registered, they're redirected to the **My Security** page, after they satisfy MFA.
174178
175179
## Enable Conditional Access policies
176180

177-
1. To roll out testing, change the policies created in the earlier examples to **Enabled test user login**.
181+
1. To test, change the created policies to **Enabled test user login**.
178182

179-
![Screenshot that shows enabling a test user.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/enable-test-user.png)
183+
![Screenshot of policies on the Conditinal Access, Policies screen.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/enable-test-user.png)
180184

181-
1. On the next Office 365 **Sign-In** pane, the test user John Smith is prompted to sign in with Okta MFA and Azure AD Multi-Factor Authentication.
185+
2. On the Office 365 **Sign-In** pane, the test user John Smith is prompted to sign in with Okta MFA and Azure AD MFA.
182186

183-
![Screenshot that shows the Azure Sign-In pane.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/sign-in-through-okta.png)
187+
![Screenshot of the Azure Sign-In pane.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/sign-in-through-okta.png)
184188

185-
1. Complete the MFA verification through Okta.
189+
3. Complete the MFA verification through Okta.
186190

187-
![Screenshot that shows MFA verification through Okta.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/mfa-verification-through-okta.png)
191+
![Screenshot of MFA verification through Okta.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/mfa-verification-through-okta.png)
188192

189-
1. After the user completes the Okta MFA prompt, the user is prompted for Conditional Access. Ensure that the policies were configured appropriately and are within conditions to be triggered for MFA.
193+
4. The user is prompted for Conditional Access.
194+
5. Ensure the policies were configured to be triggered for MFA.
190195

191-
![Screenshot that shows MFA verification through Okta prompted for Conditional Access.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/mfa-verification-through-okta-prompted-ca.png)
196+
![Screenshot of MFA verification through Okta prompted for Conditional Access.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/mfa-verification-through-okta-prompted-ca.png)
192197

193-
## Cut over from sign-on to Conditional Access policies
198+
## Add organization members to Conditional Access policies
194199

195-
After you conduct thorough testing on the pilot members to ensure that Conditional Access is in effect as expected, the remaining organization members can be added to Conditional Access policies after registration has been completed.
200+
After you conduct testing on pilot members, add the remaining organization members to Conditional Access policies, after registration.
196201

197-
To avoid double-prompting between Azure AD Multi-Factor Authentication and Okta MFA, opt out from Okta MFA by modifying sign-on policies.
202+
To avoid double-prompting between Azure AD MFA and Okta MFA, opt out from Okta MFA: modify sign-on policies.
198203

199-
The final migration step to Conditional Access can be done in a staged or cut-over fashion.
200204

201-
1. Go to the Okta admin console, select **Security** > **Authentication**, and then go to **Sign-on Policy**.
205+
1. Go to the Okta admin console
206+
2. Select **Security** > **Authentication**
207+
3. Go to **Sign-on Policy**.
202208

203209
>[!NOTE]
204-
> Set global policies to **Inactive** only if all applications from Okta are protected by their own application sign-on policies.
205-
1. Set the **Enforce MFA** policy to **Inactive**. You can also assign the policy to a new group that doesn't include the Azure AD users.
210+
> Set global policies to **Inactive** if all applications from Okta are protected by application sign-on policies.
206211
207-
![Screenshot that shows Global MFA Sign On Policy as Inactive.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/mfa-policy-inactive.png)
212+
4. Set the **Enforce MFA** policy to **Inactive**. You can assign the policy to a new group that doesn't include the Azure AD users.
208213

209-
1. On the application-level sign-on policy pane, update the policies to **Inactive** by selecting the **Disable Rule** option. You can also assign the policy to a new group that doesn't include the Azure AD users.
214+
![Screenshot of Global MFA Sign On Policy as Inactive.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/mfa-policy-inactive.png)
210215

211-
1. Ensure there's at least one application-level sign-on policy that's enabled for the application that allows access without MFA.
216+
5. On the application-level sign-on policy pane, select the **Disable Rule** option.
217+
6. Select **Inactive**. You can assign the policy to a new group that doesn't include the Azure AD users.
218+
7. Ensure there's at least one application-level sign-on policy enabled for the application that allows access without MFA.
212219

213-
![Screenshot that shows application access without MFA.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/application-access-without-mfa.png)
220+
![Screenshot of application access without MFA.](media/migrate-okta-sign-on-policies-to-azure-active-directory-conditional-access/application-access-without-mfa.png)
214221

215-
1. After you disable the Okta sign-on policies or exclude the migrated Azure AD users from the enforcement groups, users are prompted *only* for Conditional Access the next time they sign in.
222+
8. Users are prompted for Conditional Access the next time they sign in.
216223

217224
## Next steps
218225

219-
For more information about migrating from Okta to Azure AD, see:
220-
221-
- [Migrate applications from Okta to Azure AD](migrate-applications-from-okta-to-azure-active-directory.md)
222-
- [Migrate Okta federation to Azure AD](migrate-okta-federation-to-azure-active-directory.md)
223-
- [Migrate Okta sync provisioning to Azure AD Connect-based synchronization](migrate-okta-sync-provisioning-to-azure-active-directory.md)
226+
- [Tutorial: Migrate your applications from Okta to Azure Active Directory](migrate-applications-from-okta-to-azure-active-directory.md)
227+
- [Tutorial: Migrate Okta federation to Azure Active Directory-managed authentication](migrate-okta-federation-to-azure-active-directory.md)
228+
- [Tutorial: Migrate Okta sync provisioning to Azure AD Connect-based synchronization](migrate-okta-sync-provisioning-to-azure-active-directory.md)

0 commit comments

Comments
 (0)