Skip to content

Commit 7a8b13c

Browse files
Merge pull request #251573 from Justinha/steps-auth-9
revised portal steps
2 parents f18f075 + 8a7a129 commit 7a8b13c

6 files changed

+50
-59
lines changed

articles/active-directory/authentication/tutorial-configure-custom-password-protection.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 01/29/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -66,9 +66,8 @@ Let's enable the custom banned password list and add some entries. You can add a
6666

6767
To enable the custom banned password list and add entries to it, complete the following steps:
6868

69-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
70-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
71-
1. Under the **Manage** menu header, select **Authentication methods**, then **Password protection**.
69+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
70+
1. Browse to **Protection** > **Authentication methods**, then **Password protection**.
7271
1. Set the option for **Enforce custom list** to *Yes*.
7372
1. Add strings to the **Custom banned password list**, one string per line. The following considerations and limitations apply to the custom banned password list:
7473

@@ -79,7 +78,7 @@ To enable the custom banned password list and add entries to it, complete the fo
7978

8079
Specify your own custom passwords to ban, as shown in the following example
8180

82-
[ ![Modify the custom banned password list under Authentication Methods in the Azure portal](media/tutorial-configure-custom-password-protection/enable-configure-custom-banned-passwords-cropped.png) ](media/tutorial-configure-custom-password-protection/enable-configure-custom-banned-passwords.png#lightbox)
81+
[ ![Modify the custom banned password list under Authentication methods](media/tutorial-configure-custom-password-protection/enable-configure-custom-banned-passwords-cropped.png) ](media/tutorial-configure-custom-password-protection/enable-configure-custom-banned-passwords.png#lightbox)
8382

8483
1. Leave the option for **Enable password protection on Windows Server Active Directory** to *No*.
8584
1. To enable the custom banned passwords and your entries, select **Save**.
@@ -110,9 +109,8 @@ To see the custom banned password list in action, try to change the password to
110109

111110
If you no longer want to use the custom banned password list you have configured as part of this tutorial, complete the following steps:
112111

113-
1. Sign in to the [Azure portal](https://portal.azure.com).
114-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
115-
1. Under the **Manage** menu header, select **Authentication methods**, then **Password protection**.
112+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
113+
1. Browse to **Protection** > **Authentication methods**, then **Password protection**.
116114
1. Set the option for **Enforce custom list** to *No*.
117115
1. To update the custom banned password configuration, select **Save**.
118116

articles/active-directory/authentication/tutorial-enable-azure-mfa.md

Lines changed: 12 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 01/29/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -59,15 +59,12 @@ The recommended way to enable and use Azure AD Multi-Factor Authentication is wi
5959

6060
Conditional Access policies can be applied to specific users, groups, and apps. The goal is to protect your organization while also providing the right levels of access to the users who need it.
6161

62-
In this tutorial, we create a basic Conditional Access policy to prompt for MFA when a user signs in to the Azure portal. In a later tutorial in this series, we configure Azure AD Multi-Factor Authentication by using a risk-based Conditional Access policy.
62+
In this tutorial, we create a basic Conditional Access policy to prompt for MFA when a user signs in. In a later tutorial in this series, we configure Azure AD Multi-Factor Authentication by using a risk-based Conditional Access policy.
6363

6464
First, create a Conditional Access policy and assign your test group of users as follows:
6565

66-
1. Sign in to the [Azure portal](https://portal.azure.com) by using an account with *global administrator* permissions.
67-
68-
1. Search for and select **Azure Active Directory**. Then select **Security** from the menu on the left-hand side.
69-
70-
1. Select **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
66+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
67+
1. Browse to **Protection** > **Conditional Access**, select **+ New policy**, and then select **Create new policy**.
7168

7269
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select 'New policy' and then select 'Create new policy'." source="media/tutorial-enable-azure-mfa/tutorial-enable-azure-mfa-conditional-access-menu-new-policy.png":::
7370

@@ -99,7 +96,7 @@ Now that the Conditional Access policy is created and a test group of users is a
9996

10097
### Configure which apps require multi-factor authentication
10198

102-
For this tutorial, configure the Conditional Access policy to require multi-factor authentication when a user signs in to the Azure portal.
99+
For this tutorial, configure the Conditional Access policy to require multi-factor authentication when a user signs in.
103100

104101
1. Select the current value under **Cloud apps or actions**, and then under **Select what this policy applies to**, verify that **Cloud apps** is selected.
105102

@@ -110,15 +107,15 @@ For this tutorial, configure the Conditional Access policy to require multi-fact
110107
> [!TIP]
111108
> You can choose to apply the Conditional Access policy to **All cloud apps** or **Select apps**. To provide flexibility, you can also exclude certain apps from the policy.
112109
113-
1. Browse the list of available sign-in events that can be used. For this tutorial, select **Microsoft Azure Management** so that the policy applies to sign-in events to the Azure portal. Then choose **Select**.
110+
1. Browse the list of available sign-in events that can be used. For this tutorial, select **Microsoft Azure Management** so that the policy applies to sign-in events. Then choose **Select**.
114111

115112
:::image type="content" alt-text="A screenshot of the Conditional Access page, where you select the app, Microsoft Azure Management, to which the new policy will apply." source="media/tutorial-enable-azure-mfa/tutorial-enable-azure-mfa-conditional-access-menu-select-apps.png":::
116113

117114
### Configure multi-factor authentication for access
118115

119116
Next, we configure access controls. Access controls let you define the requirements for a user to be granted access. They might be required to use an approved client app or a device that's hybrid-joined to Azure AD.
120117

121-
In this tutorial, configure the access controls to require multi-factor authentication during a sign-in event to the Azure portal.
118+
In this tutorial, configure the access controls to require multi-factor authentication during a sign-in event.
122119

123120
1. Under **Access controls**, select the current value under **Grant**, and then select **Grant access**.
124121

@@ -156,9 +153,9 @@ First, sign in to a resource that doesn't require MFA:
156153
1. Close the browser window.
157154

158155

159-
You configured the Conditional Access policy to require additional authentication for the Azure portal. Because of that configuration, you're prompted to use Azure AD Multi-Factor Authentication or to configure a method if you haven't yet done so. Test this new requirement by signing in to the Azure portal:
156+
You configured the Conditional Access policy to require additional authentication for sign in. Because of that configuration, you're prompted to use Azure AD Multi-Factor Authentication or to configure a method if you haven't yet done so. Test this new requirement by signing in to the Microsoft Entra admin center:
160157

161-
1. Open a new browser window in InPrivate or incognito mode and sign in to the [Azure portal](https://portal.azure.com).
158+
1. Open a new browser window in InPrivate or incognito mode and sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
162159

163160
1. Sign in with your non-administrator test user, such as *testuser*. Be sure to include `@` and the domain name for the user account.
164161

@@ -174,7 +171,7 @@ You configured the Conditional Access policy to require additional authenticatio
174171

175172
1. Complete the instructions on the screen to configure the method of multi-factor authentication that you've selected.
176173

177-
1. Close the browser window, and sign in to the [Azure portal](https://portal.azure.com) again to test the authentication method that you configured. For example, if you configured a mobile app for authentication, you should see a prompt like the following.
174+
1. Close the browser window, and sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) again to test the authentication method that you configured. For example, if you configured a mobile app for authentication, you should see a prompt like the following.
178175

179176
![To sign in, follow the prompts in your browser and then the prompt on the device that you registered for multi-factor authentication.](media/tutorial-enable-azure-mfa/tutorial-enable-azure-mfa-browser-prompt.png)
180177

@@ -184,11 +181,8 @@ You configured the Conditional Access policy to require additional authenticatio
184181

185182
If you no longer want to use the Conditional Access policy that you configured as part of this tutorial, delete the policy by using the following steps:
186183

187-
1. Sign in to the [Azure portal](https://portal.azure.com).
188-
189-
1. Search for and select **Azure Active Directory**, and then select **Security** from the menu on the left-hand side.
190-
191-
1. Select **Conditional Access**, and then select the policy that you created, such as **MFA Pilot**.
184+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
185+
1. Browse to **Protection** > **Conditional Access**, and then select the policy that you created, such as **MFA Pilot**.
192186

193187
1. select **Delete**, and then confirm that you want to delete the policy.
194188

articles/active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: tutorial
8-
ms.date: 01/29/2023
8+
ms.date: 09/13/2023
99
ms.author: justinha
1010
author: justinha
1111
ms.reviewer: tilarso
@@ -38,18 +38,18 @@ Azure Active Directory Connect cloud sync can synchronize Azure AD password chan
3838
Permissions for cloud sync are configured by default. If permissions need to be reset, see [Troubleshooting](#troubleshooting) for more details about the specific permissions required for password writeback and how to set them by using PowerShell.
3939

4040
### Enable password writeback in SSPR
41-
You can enable Azure AD connect cloud sync provisioning directly in Azure portal or through PowerShell.
41+
You can enable Azure AD connect cloud sync provisioning directly in the Microsoft Entra admin center or through PowerShell.
4242

43-
#### Enable password writeback in Azure portal
43+
#### Enable password writeback in the Microsoft Entra admin center
4444

4545
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4646

4747
With password writeback enabled in Azure AD Connect cloud sync, now verify, and configure Azure AD self-service password reset (SSPR) for password writeback. When you enable SSPR to use password writeback, users who change or reset their password have that updated password synchronized back to the on-premises AD DS environment as well.
4848

4949
To verify and enable password writeback in SSPR, complete the following steps:
50-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global Administrator account.
51-
1. Search for and select **Azure Active Directory**, select **Password reset**, then choose **On-premises integration**.
52-
1. Check the option for **Enable password write back for synced users** .
50+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
51+
1. Browse to **Protection** > **Password reset**, then choose **On-premises integration**.
52+
1. Check the option for **Enable password write back for synced users**.
5353
1. (optional) If Azure AD Connect provisioning agents are detected, you can additionally check the option for **Write back passwords with Azure AD Connect cloud sync**.
5454
3. Check the option for **Allow users to unlock accounts without resetting their password** to *Yes*.
5555

@@ -69,17 +69,17 @@ Set-AADCloudSyncPasswordWritebackConfiguration -Enable $true -Credential $(Get-C
6969

7070
If you no longer want to use the SSPR writeback functionality you have configured as part of this tutorial, complete the following steps:
7171

72-
1. Sign in to the [Azure portal](https://portal.azure.com).
73-
1. Search for and select **Azure Active Directory**, select **Password reset**, then choose **On-premises integration**.
72+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
73+
1. Browse to **Protection** > **Password reset**, then choose **On-premises integration**.
7474
1. Uncheck the option for **Enable password write back for synced users**.
7575
1. Uncheck the option for **Write back passwords with Azure AD Connect cloud sync**.
7676
1. Uncheck the option for **Allow users to unlock accounts without resetting their password**.
7777
1. When ready, select **Save**.
7878

7979
If you no longer want to use the Azure AD Connect cloud sync for SSPR writeback functionality but want to continue using Azure AD Connect sync agent for writebacks complete the following steps:
8080

81-
1. Sign in to the [Azure portal](https://portal.azure.com).
82-
1. Search for and select **Azure Active Directory**, select **Password reset**, then choose **On-premises integration**.
81+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
82+
1. Browse to **Protection** > **Password reset**, then choose **On-premises integration**.
8383
1. Uncheck the option for **Write back passwords with Azure AD Connect cloud sync**.
8484
1. When ready, select **Save**.
8585

@@ -97,8 +97,8 @@ Passwords are written back in the following situations for end-users and adminis
9797

9898
| Account | Supported operations |
9999
|----------------|------------------------|
100-
| End users | Any end-user self-service voluntary change password operation.<br>Any end-user self-service force change password operation, for example, password expiration.<br>Any end-user self-service password reset that originates from the password reset portal. |
101-
| Administrators | Any administrator self-service voluntary change password operation.<br>Any administrator self-service force change password operation, for example, password expiration.<br>Any administrator self-service password reset that originates from the password reset portal.<br> Any administrator-initiated end-user password reset from the Azure portal.<br>Any administrator-initiated end-user password reset from the Microsoft Graph API. |
100+
| End users | Any end-user self-service voluntary change password operation.<br>Any end-user self-service force change password operation, for example, password expiration.<br>Any end-user self-service password reset that originates from password reset. |
101+
| Administrators | Any administrator self-service voluntary change password operation.<br>Any administrator self-service force change password operation, for example, password expiration.<br>Any administrator self-service password reset that originates from password reset.<br> Any administrator-initiated end-user password reset from the Microsoft Entra admin center.<br>Any administrator-initiated end-user password reset from the Microsoft Graph API. |
102102

103103
## Unsupported operations
104104

@@ -119,7 +119,7 @@ Try the following operations to validate scenarios using password writeback. All
119119
| Reset password from the login page | Have two users from disconnected domains and forests perform SSPR. You could also have Azure AD Connect and cloud sync deployed side-by-side and have one user in the scope of cloud sync configuration and another in scope of Azure AD Connect and have those users reset their password. |
120120
| Force expired password change | Have two users from disconnected domains and forests change expired passwords. You could also have Azure AD Connect and cloud sync deployed side-by-side and have one user in the scope of cloud sync configuration and another in scope of Azure AD Connect. |
121121
| Regular password change | Have two users from disconnected domains and forests perform routine password change. You could also have Azure AD Connect and cloud sync side by side and have one user in the scope of cloud sync config and another in scope of Azure AD Connect. |
122-
| Admin reset user password | Have two users disconnected domains and forests reset their password from the Azure Admin Portal or Frontline worker portal. You could also have Azure AD Connect and cloud sync side by side and have one user in the scope of cloud sync config and another in scope of Azure AD Connect |
122+
| Admin reset user password | Have two users disconnected domains and forests reset their password from the Microsoft Entra admin center or Frontline worker portal. You could also have Azure AD Connect and cloud sync side by side and have one user in the scope of cloud sync config and another in scope of Azure AD Connect |
123123
| Self-service account unlock | Have two users from disconnected domains and forests unlock accounts in the SSPR portal resetting the password. You could also have Azure AD Connect and cloud sync side by side and have one user in the scope of cloud sync config and another in scope of Azure AD Connect. |
124124

125125
## Troubleshooting

0 commit comments

Comments
 (0)