You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121
121
122
122
- question: |
123
-
Why does not proof up for registering other auth methods come up when I use single factor certificates?
123
+
Why doesn't proof up for registering other auth methods come up when I use single factor certificates?
124
124
answer: |
125
-
A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods and should have MFA via another method to register other available auth methods.
125
+
A user is considered capable for MFA when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods.
126
126
127
127
- question: |
128
128
How can I use single-factor certificates to complete MFA?
129
129
answer: |
130
-
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
130
+
We have support for single factor CBA to get MFA. CBA SF + passwordless phone sign-in (PSI) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
131
131
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#mfa-authentication-flow-using-single-factor-certificates-and-passwordless-sign-in)
132
132
133
133
- question: |
@@ -146,7 +146,16 @@ sections:
146
146
GET https://graph.microsoft.com/v1.0/users?$filter=certificateUserIds/any(x:x eq '[email protected]')
147
147
```
148
148
149
-
149
+
- question: |
150
+
After a CRL endpoint is configured, end users aren't able to sign in and they see the following diagnostic message:
151
+
152
+
```http
153
+
AADSTS500173: Unable to download CRL. Invalid status code Forbidden from CRL distribution point
154
+
errorCode: 500173
155
+
```
156
+
157
+
answer: |
158
+
This is commonly seen when a firewall rule setting blocks access to the CRL endpoint.
0 commit comments