You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/tutorial-configure-custom-password-protection.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: tutorial
9
-
ms.date: 01/29/2023
9
+
ms.date: 09/14/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -66,9 +66,8 @@ Let's enable the custom banned password list and add some entries. You can add a
66
66
67
67
To enable the custom banned password list and add entries to it, complete the following steps:
68
68
69
-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
70
-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
71
-
1. Under the **Manage** menu header, select **Authentication methods**, then **Password protection**.
69
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
70
+
1. Browse to **Protection** > **Authentication methods**, then **Password protection**.
72
71
1. Set the option for **Enforce custom list** to *Yes*.
73
72
1. Add strings to the **Custom banned password list**, one string per line. The following considerations and limitations apply to the custom banned password list:
74
73
@@ -79,7 +78,7 @@ To enable the custom banned password list and add entries to it, complete the fo
79
78
80
79
Specify your own custom passwords to ban, as shown in the following example
81
80
82
-
[](media/tutorial-configure-custom-password-protection/enable-configure-custom-banned-passwords.png#lightbox)
81
+
[](media/tutorial-configure-custom-password-protection/enable-configure-custom-banned-passwords.png#lightbox)
83
82
84
83
1. Leave the option for **Enable password protection on Windows Server Active Directory** to *No*.
85
84
1. To enable the custom banned passwords and your entries, select **Save**.
@@ -110,9 +109,8 @@ To see the custom banned password list in action, try to change the password to
110
109
111
110
If you no longer want to use the custom banned password list you have configured as part of this tutorial, complete the following steps:
112
111
113
-
1. Sign in to the [Azure portal](https://portal.azure.com).
114
-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
115
-
1. Under the **Manage** menu header, select **Authentication methods**, then **Password protection**.
112
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
113
+
1. Browse to **Protection** > **Authentication methods**, then **Password protection**.
116
114
1. Set the option for **Enforce custom list** to *No*.
117
115
1. To update the custom banned password configuration, select **Save**.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/tutorial-enable-azure-mfa.md
+12-18Lines changed: 12 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: tutorial
9
-
ms.date: 01/29/2023
9
+
ms.date: 09/14/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -59,15 +59,12 @@ The recommended way to enable and use Azure AD Multi-Factor Authentication is wi
59
59
60
60
Conditional Access policies can be applied to specific users, groups, and apps. The goal is to protect your organization while also providing the right levels of access to the users who need it.
61
61
62
-
In this tutorial, we create a basic Conditional Access policy to prompt for MFA when a user signs in to the Azure portal. In a later tutorial in this series, we configure Azure AD Multi-Factor Authentication by using a risk-based Conditional Access policy.
62
+
In this tutorial, we create a basic Conditional Access policy to prompt for MFA when a user signs in. In a later tutorial in this series, we configure Azure AD Multi-Factor Authentication by using a risk-based Conditional Access policy.
63
63
64
64
First, create a Conditional Access policy and assign your test group of users as follows:
65
65
66
-
1. Sign in to the [Azure portal](https://portal.azure.com) by using an account with *global administrator* permissions.
67
-
68
-
1. Search for and select **Azure Active Directory**. Then select **Security** from the menu on the left-hand side.
69
-
70
-
1. Select **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
66
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
67
+
1. Browse to **Protection** > **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
71
68
72
69
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select 'New policy' and then select 'Create new policy'." source="media/tutorial-enable-azure-mfa/tutorial-enable-azure-mfa-conditional-access-menu-new-policy.png":::
73
70
@@ -99,7 +96,7 @@ Now that the Conditional Access policy is created and a test group of users is a
99
96
100
97
### Configure which apps require multi-factor authentication
101
98
102
-
For this tutorial, configure the Conditional Access policy to require multi-factor authentication when a user signs in to the Azure portal.
99
+
For this tutorial, configure the Conditional Access policy to require multi-factor authentication when a user signs in.
103
100
104
101
1. Select the current value under **Cloud apps or actions**, and then under **Select what this policy applies to**, verify that **Cloud apps** is selected.
105
102
@@ -110,15 +107,15 @@ For this tutorial, configure the Conditional Access policy to require multi-fact
110
107
> [!TIP]
111
108
> You can choose to apply the Conditional Access policy to **All cloud apps** or **Select apps**. To provide flexibility, you can also exclude certain apps from the policy.
112
109
113
-
1. Browse the list of available sign-in events that can be used. For this tutorial, select **Microsoft Azure Management** so that the policy applies to sign-in events to the Azure portal. Then choose **Select**.
110
+
1. Browse the list of available sign-in events that can be used. For this tutorial, select **Microsoft Azure Management** so that the policy applies to sign-in events. Then choose **Select**.
114
111
115
112
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select the app, Microsoft Azure Management, to which the new policy will apply." source="media/tutorial-enable-azure-mfa/tutorial-enable-azure-mfa-conditional-access-menu-select-apps.png":::
116
113
117
114
### Configure multi-factor authentication for access
118
115
119
116
Next, we configure access controls. Access controls let you define the requirements for a user to be granted access. They might be required to use an approved client app or a device that's hybrid-joined to Azure AD.
120
117
121
-
In this tutorial, configure the access controls to require multi-factor authentication during a sign-in event to the Azure portal.
118
+
In this tutorial, configure the access controls to require multi-factor authentication during a sign-in event.
122
119
123
120
1. Under **Access controls**, select the current value under **Grant**, and then select **Grant access**.
124
121
@@ -156,9 +153,9 @@ First, sign in to a resource that doesn't require MFA:
156
153
1. Close the browser window.
157
154
158
155
159
-
You configured the Conditional Access policy to require additional authentication for the Azure portal. Because of that configuration, you're prompted to use Azure AD Multi-Factor Authentication or to configure a method if you haven't yet done so. Test this new requirement by signing in to the Azure portal:
156
+
You configured the Conditional Access policy to require additional authentication for sign in. Because of that configuration, you're prompted to use Azure AD Multi-Factor Authentication or to configure a method if you haven't yet done so. Test this new requirement by signing in to the Microsoft Entra admin center:
160
157
161
-
1. Open a new browser window in InPrivate or incognito mode and sign in to the [Azure portal](https://portal.azure.com).
158
+
1. Open a new browser window in InPrivate or incognito mode and sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
162
159
163
160
1. Sign in with your non-administrator test user, such as *testuser*. Be sure to include `@` and the domain name for the user account.
164
161
@@ -174,7 +171,7 @@ You configured the Conditional Access policy to require additional authenticatio
174
171
175
172
1. Complete the instructions on the screen to configure the method of multi-factor authentication that you've selected.
176
173
177
-
1. Close the browser window, and sign in to the [Azure portal](https://portal.azure.com) again to test the authentication method that you configured. For example, if you configured a mobile app for authentication, you should see a prompt like the following.
174
+
1. Close the browser window, and sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) again to test the authentication method that you configured. For example, if you configured a mobile app for authentication, you should see a prompt like the following.
178
175
179
176

180
177
@@ -184,11 +181,8 @@ You configured the Conditional Access policy to require additional authenticatio
184
181
185
182
If you no longer want to use the Conditional Access policy that you configured as part of this tutorial, delete the policy by using the following steps:
186
183
187
-
1. Sign in to the [Azure portal](https://portal.azure.com).
188
-
189
-
1. Search for and select **Azure Active Directory**, and then select **Security** from the menu on the left-hand side.
190
-
191
-
1. Select **Conditional Access**, and then select the policy that you created, such as **MFA Pilot**.
184
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
185
+
1. Browse to **Protection** > **Conditional Access**, and then select the policy that you created, such as **MFA Pilot**.
192
186
193
187
1. select **Delete**, and then confirm that you want to delete the policy.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: active-directory
5
5
ms.service: active-directory
6
6
ms.subservice: authentication
7
7
ms.topic: tutorial
8
-
ms.date: 01/29/2023
8
+
ms.date: 09/13/2023
9
9
ms.author: justinha
10
10
author: justinha
11
11
ms.reviewer: tilarso
@@ -38,18 +38,18 @@ Azure Active Directory Connect cloud sync can synchronize Azure AD password chan
38
38
Permissions for cloud sync are configured by default. If permissions need to be reset, see [Troubleshooting](#troubleshooting) for more details about the specific permissions required for password writeback and how to set them by using PowerShell.
39
39
40
40
### Enable password writeback in SSPR
41
-
You can enable Azure AD connect cloud sync provisioning directly in Azure portal or through PowerShell.
41
+
You can enable Azure AD connect cloud sync provisioning directly in the Microsoft Entra admin center or through PowerShell.
42
42
43
-
#### Enable password writeback in Azure portal
43
+
#### Enable password writeback in the Microsoft Entra admin center
With password writeback enabled in Azure AD Connect cloud sync, now verify, and configure Azure AD self-service password reset (SSPR) for password writeback. When you enable SSPR to use password writeback, users who change or reset their password have that updated password synchronized back to the on-premises AD DS environment as well.
48
48
49
49
To verify and enable password writeback in SSPR, complete the following steps:
50
-
1. Sign in to the [Azure portal](https://portal.azure.com)using a Global Administrator account.
51
-
1.Search for and select **Azure Active Directory**, select**Password reset**, then choose **On-premises integration**.
52
-
1. Check the option for **Enable password write back for synced users**.
50
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
51
+
1.Browse to **Protection** >**Password reset**, then choose **On-premises integration**.
52
+
1. Check the option for **Enable password write back for synced users**.
53
53
1. (optional) If Azure AD Connect provisioning agents are detected, you can additionally check the option for **Write back passwords with Azure AD Connect cloud sync**.
54
54
3. Check the option for **Allow users to unlock accounts without resetting their password** to *Yes*.
If you no longer want to use the SSPR writeback functionality you have configured as part of this tutorial, complete the following steps:
71
71
72
-
1. Sign in to the [Azure portal](https://portal.azure.com).
73
-
1.Search for and select **Azure Active Directory**, select**Password reset**, then choose **On-premises integration**.
72
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
73
+
1.Browse to **Protection** >**Password reset**, then choose **On-premises integration**.
74
74
1. Uncheck the option for **Enable password write back for synced users**.
75
75
1. Uncheck the option for **Write back passwords with Azure AD Connect cloud sync**.
76
76
1. Uncheck the option for **Allow users to unlock accounts without resetting their password**.
77
77
1. When ready, select **Save**.
78
78
79
79
If you no longer want to use the Azure AD Connect cloud sync for SSPR writeback functionality but want to continue using Azure AD Connect sync agent for writebacks complete the following steps:
80
80
81
-
1. Sign in to the [Azure portal](https://portal.azure.com).
82
-
1.Search for and select **Azure Active Directory**, select**Password reset**, then choose **On-premises integration**.
81
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
82
+
1.Browse to **Protection** >**Password reset**, then choose **On-premises integration**.
83
83
1. Uncheck the option for **Write back passwords with Azure AD Connect cloud sync**.
84
84
1. When ready, select **Save**.
85
85
@@ -97,8 +97,8 @@ Passwords are written back in the following situations for end-users and adminis
97
97
98
98
| Account | Supported operations |
99
99
|----------------|------------------------|
100
-
| End users | Any end-user self-service voluntary change password operation.<br>Any end-user self-service force change password operation, for example, password expiration.<br>Any end-user self-service password reset that originates from the password reset portal. |
101
-
| Administrators | Any administrator self-service voluntary change password operation.<br>Any administrator self-service force change password operation, for example, password expiration.<br>Any administrator self-service password reset that originates from the password reset portal.<br> Any administrator-initiated end-user password reset from the Azure portal.<br>Any administrator-initiated end-user password reset from the Microsoft Graph API. |
100
+
| End users | Any end-user self-service voluntary change password operation.<br>Any end-user self-service force change password operation, for example, password expiration.<br>Any end-user self-service password reset that originates from password reset. |
101
+
| Administrators | Any administrator self-service voluntary change password operation.<br>Any administrator self-service force change password operation, for example, password expiration.<br>Any administrator self-service password reset that originates from password reset.<br> Any administrator-initiated end-user password reset from the Microsoft Entra admin center.<br>Any administrator-initiated end-user password reset from the Microsoft Graph API. |
102
102
103
103
## Unsupported operations
104
104
@@ -119,7 +119,7 @@ Try the following operations to validate scenarios using password writeback. All
119
119
| Reset password from the login page | Have two users from disconnected domains and forests perform SSPR. You could also have Azure AD Connect and cloud sync deployed side-by-side and have one user in the scope of cloud sync configuration and another in scope of Azure AD Connect and have those users reset their password. |
120
120
| Force expired password change | Have two users from disconnected domains and forests change expired passwords. You could also have Azure AD Connect and cloud sync deployed side-by-side and have one user in the scope of cloud sync configuration and another in scope of Azure AD Connect. |
121
121
| Regular password change | Have two users from disconnected domains and forests perform routine password change. You could also have Azure AD Connect and cloud sync side by side and have one user in the scope of cloud sync config and another in scope of Azure AD Connect. |
122
-
| Admin reset user password | Have two users disconnected domains and forests reset their password from the Azure Admin Portal or Frontline worker portal. You could also have Azure AD Connect and cloud sync side by side and have one user in the scope of cloud sync config and another in scope of Azure AD Connect |
122
+
| Admin reset user password | Have two users disconnected domains and forests reset their password from the Microsoft Entra admin center or Frontline worker portal. You could also have Azure AD Connect and cloud sync side by side and have one user in the scope of cloud sync config and another in scope of Azure AD Connect |
123
123
| Self-service account unlock | Have two users from disconnected domains and forests unlock accounts in the SSPR portal resetting the password. You could also have Azure AD Connect and cloud sync side by side and have one user in the scope of cloud sync config and another in scope of Azure AD Connect. |
0 commit comments