Skip to content

Commit 804b3e3

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 75de9e9 + ef52657 commit 804b3e3

File tree

137 files changed

+1422
-1294
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+1422
-1294
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18014,6 +18014,11 @@
1801418014
"redirect_url": "/azure/active-directory/active-directory-b2b-what-is-azure-ad-b2b",
1801518015
"redirect_document_id": false
1801618016
},
18017+
{
18018+
"source_path": "articles/active-directory/authentication/concept-mfa-whichversion.md",
18019+
"redirect_url": "/azure/active-directory/authentication/concept-mfa-howitworks",
18020+
"redirect_document_id": false
18021+
},
1801718022
{
1801818023
"source_path": "articles/active-directory/active-directory-b2b-references-csv-file-format.md",
1801918024
"redirect_url": "/azure/active-directory/active-directory-b2b-invitation-email",

articles/active-directory/authentication/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@
4343
items:
4444
- name: How MFA works
4545
href: concept-mfa-howitworks.md
46-
- name: What version is right?
47-
href: concept-mfa-whichversion.md
4846
- name: License your users
4947
href: concept-mfa-licensing.md
5048
- name: Manage an Auth Provider

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,6 @@ Two-step verification is available by default for global administrators who have
2121

2222
An Azure Multi-Factor Auth Provider is used to take advantage of features provided by Azure Multi-Factor Authentication for users who **do not have licenses**.
2323

24-
If you have licenses that cover all of the users in your organization, then you do not need an Azure Multi-Factor Auth Provider. Create an Azure Multi-Factor Authentication Provider only if you also need to provide two-step verification for some users that don't have licenses.
25-
2624
> [!NOTE]
2725
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
2826

articles/active-directory/authentication/concept-mfa-howitworks.md

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/11/2018
9+
ms.date: 06/03/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -33,10 +33,10 @@ Azure Multi-Factor Authentication (MFA) helps safeguard access to data and appli
3333

3434
Multi-Factor Authentication comes as part of the following offerings:
3535

36-
* **Azure Active Directory Premium licenses** - Full featured use of Azure Multi-Factor Authentication Service (Cloud) or Azure Multi-Factor Authentication Server (On-premises).
37-
* **Azure MFA Service (Cloud)** - **This option is the recommended path for new deployments**. Azure MFA in the cloud requires no on-premises infrastructure and can be used with your federated or cloud-only users.
38-
* **Azure MFA Server** - If your organization wants to manage the associated infrastructure elements and has deployed AD FS in your on-premises environment this way may be an option.
39-
* **Multi-Factor Authentication for Office 365** - A subset of Azure Multi-Factor Authentication capabilities are available as a part of your subscription. For more information about MFA for Office 365, see the article [Plan for multi-factor authentication for Office 365 Deployments](https://support.office.com/article/plan-for-multi-factor-authentication-for-office-365-deployments-043807b2-21db-4d5c-b430-c8a6dee0e6ba).
36+
* **Azure Active Directory Premium** or **Microsoft 365 Business** - Full featured use of Azure Multi-Factor Authentication using Conditional Access policies to require multi-factor authentication.
37+
38+
* **Azure AD Free**, **Azure AD Basic**, or standalone **Office 365** licenses - Use pre-created [Conditional Access baseline protection policies](../conditional-access/concept-baseline-protection.md) to require multi-factor authentication for your users and administrators.
39+
4040
* **Azure Active Directory Global Administrators** - A subset of Azure Multi-Factor Authentication capabilities are available as a means to protect global administrator accounts.
4141

4242
> [!NOTE]
@@ -48,16 +48,9 @@ Since most users are accustomed to using only passwords to authenticate, it is i
4848

4949
* Train your support staff to handle scenarios where the user can't sign in because they do not have access to their authentication methods or they are not working correctly.
5050
* Using conditional access policies for Azure MFA Service, your support staff can add a user to a group that is excluded from a policy requiring MFA.
51-
* Support staff can enable a temporary one-time bypass for Azure MFA Server users to allow a user to authenticate without two-step verification. The bypass is temporary and expires after a specified number of seconds.
52-
* Consider using Trusted IPs or named locations as a way to minimize two-step verification prompts. With this feature, administrators of a managed or federated tenant can bypass two-step verification for users that are signing in from a trusted network location such as their organization's intranet.
51+
* Consider using Conditional Access named locations as a way to minimize two-step verification prompts. With this functionality, administrators can bypass two-step verification for users that are signing in from a secure trusted network location such as a network segment used for new user onboarding.
5352
* Deploy [Azure AD Identity Protection](../active-directory-identityprotection.md) and trigger two-step verification based on risk events.
5453

5554
## Next steps
5655

57-
- Get a step-by-step MFA [deployment plan](https://aka.ms/MFADeploymentPlan)
58-
59-
- Find details about [licensing your users](concept-mfa-licensing.md)
60-
61-
- Get details about [which version to deploy](concept-mfa-whichversion.md)
62-
63-
- Find answers to [Frequently asked questions](multi-factor-authentication-faq.md)
56+
- [Step-by-step Azure Multi-Factor Authentication deployment](howto-mfa-getstarted.md)

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/11/2019
9+
ms.date: 06/03/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -28,9 +28,9 @@ The following table describes the differences between three versions of multi-fa
2828

2929
| Version | Description |
3030
| --- | --- |
31-
| Multi-Factor Authentication for Office 365 <br> Microsoft 365 Business |This version works exclusively with Office 365 applications and is managed from the Office 365 or Microsoft 365 portal. Administrators can [secure Office 365 resources with two-step verification](https://support.office.com/article/Set-up-multi-factor-authentication-for-Office-365-users-8f0454b2-f51a-4d9c-bcde-2c48e41621c6). This version is part of an Office 365 or Microsoft 365 Business subscription. |
32-
| Multi-Factor Authentication for Azure AD Administrators | Users assigned the Azure AD Global Administrator role in Azure AD tenants can enable two-step verification at no additional cost.|
33-
| Azure Multi-Factor Authentication | Often referred to as the "full" version, Azure Multi-Factor Authentication offers the richest set of capabilities. It provides additional configuration options via the [Azure portal](https://portal.azure.com), advanced reporting, and support for a range of on-premises and cloud applications. Azure Multi-Factor Authentication is a feature of [Azure Active Directory Premium](https://www.microsoft.com/cloud-platform/azure-active-directory-features), and can be deployed either in the cloud or on-premises. |
31+
| Multi-Factor Authentication for Office 365 <br> Microsoft 365 Business | This version is managed from the Office 365 or Microsoft 365 portal. Administrators can [secure Office 365 resources with two-step verification](https://support.office.com/article/Set-up-multi-factor-authentication-for-Office-365-users-8f0454b2-f51a-4d9c-bcde-2c48e41621c6). This version is part of an Office 365 or Microsoft 365 Business subscription. |
32+
| Multi-Factor Authentication for Azure AD Administrators | Users assigned the Azure AD Global Administrator role in Azure AD tenants can enable two-step verification at no additional cost. |
33+
| Azure Multi-Factor Authentication | Often referred to as the "full" version, Azure Multi-Factor Authentication offers the richest set of capabilities. It provides additional configuration options via the [Azure portal](https://portal.azure.com), advanced reporting, and support for a range of on-premises and cloud applications. Azure Multi-Factor Authentication is a feature of [Azure Active Directory Premium](https://www.microsoft.com/cloud-platform/azure-active-directory-features). |
3434

3535
> [!NOTE]
3636
> New customers may no longer purchase Azure Multi-Factor Authentication as a standalone offering effective September 1st, 2018. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
@@ -51,7 +51,7 @@ The following table provides a list of the features that are available in the va
5151
| SMS as a second factor ||||
5252
| App passwords for clients that don't support MFA ||||
5353
| Admin control over verification methods ||||
54-
| Protect non-admin accounts with MFA |(Only for Office 365 applications) | ||
54+
| Protect non-admin accounts with MFA || ||
5555
| PIN mode | | ||
5656
| Fraud alert | | ||
5757
| MFA Reports | | ||
@@ -71,17 +71,13 @@ Users assigned the Global Administrator role in Azure AD tenants can enable two-
7171

7272
## How to purchase Azure Multi-Factor Authentication
7373

74-
If you would like the full functionality offered by Azure Multi-Factor Authentication, there are several options:
74+
Purchase licenses that include Azure Multi-Factor Authentication, like Azure Active Directory Premium, or a license bundle that includes Azure AD Premium, or Conditional Access and assign them to your users in Azure Active Directory.
7575

76-
### Option 1 - Licenses that include MFA
76+
### Consumption-based licensing
7777

78-
Purchase licenses that include Azure Multi-Factor Authentication, like Azure Active Directory Premium or a license bundle that includes Azure AD Premium, and assign them to your users in Azure Active Directory.
78+
Consumption-based licensing is no longer available to new customers effective September 1, 2018.
7979

80-
### Option 2 - MFA consumption-based model
81-
82-
This option is no longer available to new customers effective September 1, 2018.
83-
84-
Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
80+
Effective September 1, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
8581

8682
When using an Azure Multi-Factor Authentication Provider, there are two usage models available that are billed through your Azure subscription:
8783

articles/active-directory/authentication/concept-mfa-whichversion.md

Lines changed: 0 additions & 83 deletions
This file was deleted.

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/26/2018
9+
ms.date: 06/03/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,9 +17,9 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Configure Azure Multi-Factor Authentication settings
1919

20-
This article helps you to manage Multi-Factor Authentication settings in the Azure portal. It covers various topics that help you to get the most out of Azure Multi-Factor Authentication. Not all of the features are available in every [version of Azure Multi-Factor Authentication](concept-mfa-whichversion.md#what-features-do-i-need).
20+
This article helps you to manage Multi-Factor Authentication settings in the Azure portal. It covers various topics that help you to get the most out of Azure Multi-Factor Authentication. Not all of the features are available in every version of Azure Multi-Factor Authentication.
2121

22-
You can access settings related to Multi-Factor Authentication from the Azure portal by browsing to **Azure Active Directory** > **MFA**.
22+
You can access settings related to Azure Multi-Factor Authentication from the Azure portal by browsing to **Azure Active Directory** > **MFA**.
2323

2424
![Azure portal - Azure AD Multi-Factor Authentication settings](./media/howto-mfa-mfasettings/multi-factor-authentication-settings-portal.png)
2525

@@ -30,7 +30,7 @@ Some of these settings apply to MFA Server, Azure MFA, or both.
3030
| Feature | Description |
3131
| ------- | ----------- |
3232
| Account lockout | Temporarily lock accounts in the multi-factor authentication service if there are too many denied authentication attempts in a row. This feature only applies to users who enter a PIN to authenticate. (MFA Server) |
33-
| [Block/unblock users](#block-and-unblock-users) | Used to block specific users on MFA Server (on-premises) from being able to receive Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they are blocked. |
33+
| [Block/unblock users](#block-and-unblock-users) | Used to block specific users from being able to receive Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they are blocked. |
3434
| [Fraud alert](#fraud-alert) | Configure settings related to users ability to report fraudulent verification requests |
3535
| Notifications | Enable notifications of events from MFA Server. |
3636
| [OATH tokens](concept-authentication-methods.md#oath-hardware-tokens-public-preview) | Used in cloud-based Azure MFA environments to manage OATH tokens for users. |
Binary file not shown.

articles/active-directory/develop/quickstart-v1-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Now that you have an application in Azure AD, you can install ADAL and write you
9797
link_with ['QuickStart']
9898
xcodeproj 'QuickStart'
9999
100-
pod 'ADALiOS'
100+
pod 'ADAL'
101101
```
102102
103103
1. Load the podfile by using CocoaPods. This step creates a new XCode workspace that you load.

0 commit comments

Comments
 (0)