Skip to content

Commit 77565c9

Browse files
authored
Merge pull request #205052 from Justinha/code-match-new-ux
Code match new ux
2 parents 5ad4000 + b0fc1b7 commit 77565c9

File tree

9 files changed

+32
-328
lines changed

9 files changed

+32
-328
lines changed

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 19 additions & 161 deletions
Original file line numberDiff line numberDiff line change
@@ -13,193 +13,51 @@ ms.collection: M365-identity-device-management
1313
---
1414
# How to use additional context in Microsoft Authenticator app notifications (Preview) - Authentication Methods Policy
1515

16-
This article covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
16+
This topic covers how to improve the security of user sign-in by adding the application name and geographic location of the sign-in to Microsoft Authenticator push and passwordless notifications. The schema for the API to enable application name and geographic location is currently being updated. **While the API is updated over the next two weeks, you should only use the Azure AD portal to enable application name and geographic location.**
1717

1818
## Prerequisites
1919

20-
Your organization will need to enable Authenticator app push notifications for some users or groups using the new Authentication Methods Policy API.
20+
Your organization will need to enable Microsoft Authenticator push notifications for some users or groups by using the Azure AD portal. The new Authentication Methods Policy API will soon be ready as another configuration option.
2121

2222
>[!NOTE]
2323
>Additional context can be targeted to only a single group, which can be dynamic or nested. On-premises synchronized security groups and cloud-only security groups are supported for the Authentication Method Policy.
2424
2525
## Passwordless phone sign-in and multifactor authentication
2626

27-
When a user receives a Passwordless phone sign-in or MFA push notification in the Authenticator app, they'll see the name of the application that requests the approval and the location based on the IP address where the sign-in originated from.
27+
When a user receives a passwordless phone sign-in or MFA push notification in the Authenticator app, they'll see the name of the application that requests the approval and the location based on the IP address where the sign-in originated from.
2828

2929
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/location.png" alt-text="Screenshot of additional context in the MFA push notification.":::
3030

3131
The additional context can be combined with [number matching](how-to-mfa-number-match.md) to further improve sign-in security.
3232

3333
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/location-with-number-match.png" alt-text="Screenshot of additional context with number matching in the MFA push notification.":::
3434

35-
### Policy schema changes
35+
## Enable additional context
3636

37-
>[!NOTE]
38-
>In Graph Explorer, ensure you've consented to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
37+
To enable application name or geographic location, complete the following steps:
3938

40-
Identify a single target group for the schema configuration. Then use the following API endpoint to change the displayAppInformationRequiredState property to **enabled**:
39+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
40+
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone, and change **Authentication mode** to **Any**.
41+
42+
Only users who are enabled for Microsoft Authenticator here can be included in the policy to show the application name or geographic location of the sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see application name or geographic location.
4143

42-
https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
44+
:::image type="content" border="true" source="./media/how-to-mfa-additional-context/enable-settings-additional-context.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Any authentication mode.":::
4345

44-
>[!NOTE]
45-
>For Passwordless phone sign-in, the Authenticator app does not retrieve policy information just in time for each sign-in request. Instead, the Authenticator app does a best effort retrieval of the policy once every 7 days. We understand this limitation is less than ideal and are working to optimize the behavior. In the meantime, if you want to force a policy update to test using additional context with Passwordless phone sign-in, you can remove and re-add the account in the Authenticator app.
46-
47-
#### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
48-
49-
**PROPERTIES**
50-
51-
| Property | Type | Description |
52-
|---------|------|-------------|
53-
| ID | String | The authentication method policy identifier. |
54-
| state | authenticationMethodState | Possible values are: **enabled**<br>**disabled** |
55-
56-
**RELATIONSHIPS**
57-
58-
| Relationship | Type | Description |
59-
|--------------|------|-------------|
60-
| includeTargets | [microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) |
61-
| collection | A collection of users or groups who are enabled to use the authentication method. |
62-
63-
#### MicrosoftAuthenticator includeTarget properties
64-
65-
**PROPERTIES**
66-
67-
| Property | Type | Description |
68-
|----------|------|-------------|
69-
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
70-
| ID | String | Object ID of an Azure AD user or group. |
71-
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>You can only set one group or user for additional context. |
72-
| displayAppInformationRequiredState | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
46+
1. On the **Configure** tab, for **Show application name in push and passwordless notifications (Preview)**, change **Status** to **Enabled**, choose who to include or exclude from the policy, and click **Save**.
7347

74-
>[!NOTE]
75-
>Additional context can only be enabled for a single group.
76-
77-
#### Example of how to enable additional context for all users
78-
79-
Change the **displayAppInformationRequiredState** from **default** to **enabled**.
80-
81-
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
82-
83-
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **displayAppInformationRequiredState**.
84-
85-
```json
86-
//Retrieve your existing policy via a GET.
87-
//Leverage the Response body to create the Request body section. Then update the Request body similar to the Request body as shown below.
88-
//Change the Query to PATCH and Run query
89-
90-
{
91-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
92-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
93-
"id": "MicrosoftAuthenticator",
94-
"state": "enabled",
95-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
96-
"includeTargets": [
97-
{
98-
"targetType": "group",
99-
"id": "all_users",
100-
"authenticationMode": "any",
101-
"displayAppInformationRequiredState": "enabled",
102-
"numberMatchingRequiredState": "enabled"
103-
}
104-
]
105-
}
106-
107-
```
108-
109-
To confirm this update has applied, run the GET request below using the endpoint below.
110-
GET - https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
111-
112-
113-
#### Example of how to enable additional context for a single group
114-
115-
Change the **displayAppInformationRequiredState** value from **default** to **enabled.**
116-
Change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
117-
118-
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **displayAppInformationRequiredState**.
119-
120-
```json
121-
//Copy paste the below in the Request body section as shown below.
122-
//Leverage the Response body to create the Request body section. Then update the Request body similar to the Request body as shown below.
123-
//Change query to PATCH and run query
124-
125-
{
126-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
127-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
128-
"id": "MicrosoftAuthenticator",
129-
"state": "enabled",
130-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
131-
"includeTargets": [
132-
{
133-
"targetType": "group",
134-
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a",
135-
"authenticationMode": "any",
136-
"displayAppInformationRequiredState": "enabled",
137-
"numberMatchingRequiredState": "enabled"
138-
}
139-
]
140-
}
141-
```
142-
143-
To verify, RUN GET again and verify the ObjectID
144-
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
145-
146-
147-
#### Example of error when enabling additional context for multiple groups
148-
149-
The PATCH request will fail with 400 Bad Request and the error will contain the following message:
150-
151-
`Persistance of policy failed with error: You cannot enable multiple targets for feature 'Require Display App Information'. Choose only one of the following includeTargets to enable: aede0efe-c1b4-40dc-8ae7-2c402f23e312,aede0efe-c1b4-40dc-8ae7-2c402f23e317.`
152-
153-
### Test the end-user experience
154-
Add the test user account to the Authenticator app. The account **doesn't** need to be enabled for phone sign-in.
155-
156-
See the end-user experience of an Authenticator multifactor authentication push notification with additional context by signing into aka.ms/MFAsetup.
157-
158-
### Turn off additional context
159-
160-
To turn off additional context, you'll need to PATCH remove **displayAppInformationRequiredState** from **enabled** to **disabled**/**default**.
161-
162-
```json
163-
{
164-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
165-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
166-
"id": "MicrosoftAuthenticator",
167-
"state": "enabled",
168-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
169-
"includeTargets": [
170-
{
171-
"targetType": "group",
172-
"id": "all_users",
173-
"authenticationMode": "any",
174-
"displayAppInformationRequiredState": "enabled",
175-
"numberMatchingRequiredState": "default"
176-
}
177-
]
178-
}
179-
```
180-
181-
## Enable additional context in the portal
182-
183-
To enable additional context in the Azure AD portal, complete the following steps:
184-
185-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
186-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
187-
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
188-
1. From the list of available authentication methods, select **Microsoft Authenticator**.
189-
190-
![Screenshot that shows how to select the Microsoft Authenticator policy.](./media/how-to-mfa-additional-context/select-microsoft-authenticator-policy.png)
191-
192-
1. Select the target users, select the three dots on the right, and choose **Configure**.
193-
194-
![Screenshot of configuring Microsoft authenticator additional context.](./media/how-to-mfa-additional-context/configure-microsoft-authenticator.png)
48+
:::image type="content" border="true" source="./media/how-to-mfa-additional-context/enable-app-name.png" alt-text="Screenshot of how to enable application name.":::
49+
50+
Then do the same for **Show geographic location in push and passwordless notifications (Preview)**.
51+
52+
:::image type="content" border="true" source="./media/how-to-mfa-additional-context/enable-geolocation.png" alt-text="Screenshot of how to enable geographic location.":::
19553

196-
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, select **Enable**, and then select **Done**.
54+
You can configure application name and geographic location separately. For example, the following policy enables application name and geographic location for all users but excludes the Operations group from seeing geographic location.
19755

198-
![Screenshot of enabling additional context.](media/howto-authentication-passwordless-phone/enable-additional-context.png)
56+
:::image type="content" border="true" source="./media/how-to-mfa-additional-context/exclude.png" alt-text="Screenshot of how to enable application name and geographic location separately.":::
19957

20058
## Known issues
20159

202-
Additional context isn't supported for Network Policy Server (NPS).
60+
Additional context is not supported for Network Policy Server (NPS) or Active Directory Federation Services (AD FS).
20361

20462
## Next steps
20563

0 commit comments

Comments
 (0)