Skip to content

Commit 76a2d4f

Browse files
authored
Merge pull request #209765 from MicrosoftDocs/main
Publish to Live, Wednesday 4AM PST, 8/31
2 parents edeeacc + 93ea3bb commit 76a2d4f

File tree

67 files changed

+1728
-267
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+1728
-267
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,8 @@
230230
href: how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md
231231
- name: Migrate to Azure MFA with Federation
232232
href: how-to-migrate-mfa-server-to-azure-mfa-with-federation.md
233+
- name: Migration Utility
234+
href: how-to-mfa-server-migration-utility.md
233235
- name: Deploy MFA on-premises
234236
href: howto-mfaserver-deploy.md
235237
- name: Install the user portal

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 458 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md

Lines changed: 78 additions & 69 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa.md

Lines changed: 18 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/23/2022
9+
ms.date: 08/18/2022
1010

11-
ms.author: gasinh
11+
ms.author: justinha
1212
author: Gargi-Sinha
1313
manager: martinco
1414
ms.reviewer: michmcla
@@ -32,7 +32,7 @@ There are multiple possible end states to your migration, depending on your goal
3232
| <br> | Goal: Decommission MFA Server ONLY | Goal: Decommission MFA Server and move to Azure AD Authentication | Goal: Decommission MFA Server and AD FS |
3333
|------|------------------------------------|-------------------------------------------------------------------|-----------------------------------------|
3434
|MFA provider | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. |
35-
|User authentication |Continue to use federation for Azure AD authentication. | Move to Azure AD with Password Hash Synchronization (preferred) or Passthrough Authentication **and** Seamless Single Sign-On (SSO).| Move to Azure AD with Password Hash Synchronization (preferred) or Passthrough Authentication **and** SSO. |
35+
|User authentication |Continue to use federation for Azure AD authentication. | Move to Azure AD with Password Hash Synchronization (preferred) or Passthrough Authentication **and** Seamless single sign-on (SSO).| Move to Azure AD with Password Hash Synchronization (preferred) or Passthrough Authentication **and** SSO. |
3636
|Application authentication | Continue to use AD FS authentication for your applications. | Continue to use AD FS authentication for your applications. | Move apps to Azure AD before migrating to Azure AD Multi-Factor Authentication. |
3737

3838
If you can, move both your multifactor authentication and your user authentication to Azure. For step-by-step guidance, see [Moving to Azure AD Multi-Factor Authentication and Azure AD user authentication](how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md).
@@ -55,34 +55,31 @@ Microsoft’s MFA server can be integrated with many systems, and you must evalu
5555

5656
### Migrating MFA user information
5757

58-
Common ways to think about moving users in batches include moving them by regions, departments, or roles such as administrators.
59-
Whichever strategy you choose, ensure that you move users iteratively, starting with test and pilot groups, and that you have a rollback plan in place.
58+
Common ways to think about moving users in batches include moving them by regions, departments, or roles such as administrators. You should move user accounts iteratively, starting with test and pilot groups, and make sure you have a rollback plan in place.
6059

61-
While you can migrate users’ registered multifactor authentication phone numbers and hardware tokens, you can't migrate device registrations such as their Microsoft Authenticator app settings.
62-
Users will need to register and add a new account on the Authenticator app and remove the old account.
60+
You can use the [MFA Server Migration Utility](how-to-mfa-server-migration-utility.md) to synchronize MFA data stored in the on-premises Azure MFA Server to Azure AD MFA and use [Staged Rollout](../hybrid/how-to-connect-staged-rollout.md) to reroute users to Azure MFA. Staged Rollout helps you test without making any changes to your domain federation settings.
6361

6462
To help users to differentiate the newly added account from the old account linked to the MFA Server, make sure the Account name for the Mobile App on the MFA Server is named in a way to distinguish the two accounts.
65-
For example, the Account name that appears under Mobile App on the MFA Server has been renamed to On-Premises MFA Server.
66-
The account name on the Authenticator App will change with the next push notification to the user.
63+
For example, the Account name that appears under Mobile App on the MFA Server has been renamed to **On-Premises MFA Server**.
64+
The account name on Microsoft Authenticator will change with the next push notification to the user.
6765

6866
Migrating phone numbers can also lead to stale numbers being migrated and make users more likely to stay on phone-based MFA instead of setting up more secure methods like Microsoft Authenticator in passwordless mode.
6967
We therefore recommend that regardless of the migration path you choose, that you have all users register for [combined security information](howto-registration-mfa-sspr-combined.md).
7068

71-
7269
#### Migrating hardware security keys
7370

74-
Azure AD provides support for OATH hardware tokens.
75-
In order to migrate the tokens from MFA Server to Azure AD Multi-Factor Authentication, the [tokens must be uploaded into Azure AD using a CSV file](concept-authentication-oath-tokens.md#oath-hardware-tokens-preview), commonly referred to as a "seed file".
71+
Azure AD provides support for OATH hardware tokens. You can use the [MFA Server Migration Utility](how-to-mfa-server-migration-utility.md) to synchronize MFA settings between MFA Server and Azure AD MFA and use [Staged Rollout](../hybrid/how-to-connect-staged-rollout.md) to test user migrations without changing domain federation settings.
72+
73+
If you only want to migrate OATH hardware tokens, you need to [upload tokens to Azure AD by using a CSV file](concept-authentication-oath-tokens.md#oath-hardware-tokens-preview), commonly referred to as a "seed file".
7674
The seed file contains the secret keys, token serial numbers, and other necessary information needed to upload the tokens into Azure AD.
7775

7876
If you no longer have the seed file with the secret keys, it isn't possible to export the secret keys from MFA Server.
7977
If you no longer have access to the secret keys, contact your hardware vendor for support.
8078

8179
The MFA Server Web Service SDK can be used to export the serial number for any OATH tokens assigned to a given user.
82-
Using this information along with the seed file, IT admins can import the tokens into Azure AD and assign the OATH token to the specified user based on the serial number.
80+
You can use this information along with the seed file to import the tokens into Azure AD and assign the OATH token to the specified user based on the serial number.
8381
The user will also need to be contacted at the time of import to supply OTP information from the device to complete the registration.
84-
Refer to the GetUserInfo > userSettings > OathTokenSerialNumber topic in the Multi-Factor Authentication Server help file on your MFA Server.
85-
82+
Refer to the help file topic **GetUserInfo** > **userSettings** > **OathTokenSerialNumber** in Multi-Factor Authentication Server on your MFA Server.
8683

8784
### More migrations
8885

@@ -91,19 +88,19 @@ The decision to migrate from MFA Server to Azure AD Multi-Factor Authentication
9188
- Your willingness to use Azure AD authentication for users
9289
- Your willingness to move your applications to Azure AD
9390

94-
Because MFA Server is deeply integrated with both applications and user authentication, you may want to consider moving both of those functions to Azure as a part of your MFA migration, and eventually decommissioning AD FS.
91+
Because MFA Server is integral to both application and user authentication, consider moving both of those functions to Azure as a part of your MFA migration, and eventually decommission AD FS.
9592

9693
Our recommendations:
9794

9895
- Use Azure AD for authentication as it enables more robust security and governance
9996
- Move applications to Azure AD if possible
10097

101-
To select the user authentication method best for your organization, see [Choose the right authentication method for your Azure AD hybrid identity solution](../hybrid/choose-ad-authn.md).
98+
To select the best user authentication method for your organization, see [Choose the right authentication method for your Azure AD hybrid identity solution](../hybrid/choose-ad-authn.md).
10299
We recommend that you use Password Hash Synchronization (PHS).
103100

104101
### Passwordless authentication
105102

106-
As part of enrolling users to use Microsoft Authenticator as a second factor, we recommend you enable passwordless phone sign-in as part of their registration. For more information, including other passwordless methods such as FIDO and Windows Hello for Business, visit [Plan a passwordless authentication deployment with Azure AD](howto-authentication-passwordless-deployment.md#plan-for-and-deploy-microsoft-authenticator).
103+
As part of enrolling users to use Microsoft Authenticator as a second factor, we recommend you enable passwordless phone sign-in as part of their registration. For more information, including other passwordless methods such as FIDO2 security keys and Windows Hello for Business, visit [Plan a passwordless authentication deployment with Azure AD](howto-authentication-passwordless-deployment.md#plan-for-and-deploy-microsoft-authenticator).
107104

108105
### Microsoft Identity Manager self-service password reset
109106

@@ -128,14 +125,13 @@ Check with the service provider for supported product versions and their capabil
128125
- The NPS extension doesn't use Azure AD Conditional Access policies. If you stay with RADIUS and use the NPS extension, all authentication requests going to NPS will require the user to perform MFA.
129126
- Users must register for Azure AD Multi-Factor Authentication prior to using the NPS extension. Otherwise, the extension fails to authenticate the user, which can generate help desk calls.
130127
- When the NPS extension invokes MFA, the MFA request is sent to the user's default MFA method.
131-
- Because the sign-in happens on non-Microsoft applications, it's unlikely that the user will see visual notification that multifactor authentication is required and that a request has been sent to their device.
128+
- Because the sign-in happens on non-Microsoft applications, the user often can't see visual notification that multifactor authentication is required and that a request has been sent to their device.
132129
- During the multifactor authentication requirement, the user must have access to their default authentication method to complete the requirement. They can't choose an alternative method. Their default authentication method will be used even if it's disabled in the tenant authentication methods and multifactor authentication policies.
133130
- Users can change their default multifactor authentication method in the Security Info page (aka.ms/mysecurityinfo).
134131
- Available MFA methods for RADIUS clients are controlled by the client systems sending the RADIUS access requests.
135-
- MFA methods that require user input after they enter a password can only be used with systems that support access-challenge responses with RADIUS. Input methods might include OTP, hardware OATH tokens or the Microsoft Authenticator application.
132+
- MFA methods that require user input after they enter a password can only be used with systems that support access-challenge responses with RADIUS. Input methods might include OTP, hardware OATH tokens or Microsoft Authenticator.
136133
- Some systems might limit available multifactor authentication methods to Microsoft Authenticator push notifications and phone calls.
137134

138-
139135
>[!NOTE]
140136
>The password encryption algorithm used between the RADIUS client and the NPS system, and the input methods the client can use affect which authentication methods are available. For more information, see [Determine which authentication methods your users can use](howto-mfa-nps-extension.md).
141137
@@ -162,5 +158,5 @@ Others might include:
162158

163159
- [Moving to Azure AD Multi-Factor Authentication with federation](how-to-migrate-mfa-server-to-azure-mfa-with-federation.md)
164160
- [Moving to Azure AD Multi-Factor Authentication and Azure AD user authentication](how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md)
165-
161+
- [How to use the MFA Server Migration Utility](how-to-mfa-server-migration-utility.md)
166162

77.2 KB
Loading
171 KB
Loading
211 KB
Loading
103 KB
Loading
80.9 KB
Loading
90.8 KB
Loading

0 commit comments

Comments
 (0)