Skip to content

Commit 84aba75

Browse files
Merge pull request #231034 from Justinha/links-auth
Links auth
2 parents 3c73dec + b54dca2 commit 84aba75

File tree

3 files changed

+16
-17
lines changed

3 files changed

+16
-17
lines changed

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 03/02/2023
7+
ms.date: 03/16/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -24,6 +24,9 @@ System-preferred MFA is a Microsoft managed setting, which is a [tristate policy
2424

2525
After system-preferred MFA is enabled, the authentication system does all the work. Users don't need to set any authentication method as their default because the system always determines and presents the most secure method they registered.
2626

27+
>[!NOTE]
28+
>System-preferred MFA is a key security upgrade to traditional second factor notifications. We highly recommend enabling system-preferred MFA in the near term for improved sign-in security.
29+
2730
## Enable system-preferred MFA
2831

2932
To enable system-preferred MFA in advance, you need to choose a single target group for the schema configuration, as shown in the [Request](#request) example.
@@ -58,7 +61,7 @@ https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy
5861
5962
### Request
6063

61-
The following example excludes a sample target group and includes all users. For more information, see [Update authenticationMethodsPolicy](/graph/api/authenticationmethodspolicy-update?view=graph-rest-beta).
64+
The following example excludes a sample target group and includes all users. For more information, see [Update authenticationMethodsPolicy](/graph/api/authenticationmethodspolicy-update).
6265

6366
```http
6467
PATCH https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy

articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/29/2023
9+
ms.date: 03/16/2023
1010
ms.author: justinha
1111
author: aanjusingh
1212
manager: amycolannino
@@ -47,7 +47,7 @@ For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Compa
4747
| --- | --- |
4848
| Native desktop Microsoft apps | Microsoft Teams, O365 apps, Word, Excel, etc.|
4949
| Native mobile Microsoft apps (except Microsoft Teams, Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
50-
| Microsoft 365 web apps (accessed directly on web) | [Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx), [OneDrive](https://onedrive.live.com/about/signin)|
50+
| Microsoft 365 web apps (accessed directly on web) | [Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx)|
5151

5252
## Support for Non-Microsoft apps
5353

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 03/16/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -106,21 +106,17 @@ When you install the extension, you need the *Tenant ID* and admin credentials f
106106

107107
The NPS server must be able to communicate with the following URLs over TCP port 443:
108108

109-
* *https:\//strongauthenticationservice.auth.microsoft.com* (for Azure Public cloud customers).
110-
* *https:\//strongauthenticationservice.auth.microsoft.us* (for Azure Government customers).
111-
* *https:\//strongauthenticationservice.auth.microsoft.cn* (for Azure China 21Vianet customers).
112-
* *https:\//adnotifications.windowsazure.com*
113-
* *https:\//login.microsoftonline.com*
114-
* *https:\//credentials.azure.com*
109+
* `https:\//login.microsoftonline.com`
110+
* `https:\//credentials.azure.com`
115111

116112
Additionally, connectivity to the following URLs is required to complete the [setup of the adapter using the provided PowerShell script](#run-the-powershell-script):
117113

118-
* *https:\//login.microsoftonline.com*
119-
* *https:\//provisioningapi.microsoftonline.com*
120-
* *https:\//aadcdn.msauth.net*
121-
* *https:\//www.powershellgallery.com*
122-
* *https:\//go.microsoft.com*
123-
* *https:\//aadcdn.msftauthimages.net*
114+
* `https:\//login.microsoftonline.com`
115+
* `https:\//provisioningapi.microsoftonline.com`
116+
* `https:\//aadcdn.msauth.net`
117+
* `https:\//www.powershellgallery.com`
118+
* `https:\//go.microsoft.com`
119+
* `https:\//aadcdn.msftauthimages.net`
124120

125121
## Prepare your environment
126122

0 commit comments

Comments
 (0)