Skip to content

Commit 8797fc6

Browse files
committed
acro
1 parent 764fa5e commit 8797fc6

File tree

2 files changed

+15
-17
lines changed

2 files changed

+15
-17
lines changed

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 02/09/2023
8+
ms.date: 09/13/2023
99

1010
ms.author: justinha
1111
author: justinha
@@ -53,16 +53,16 @@ Optionally, you can also configure authentication bindings to map certificates t
5353

5454
## Step 1: Configure the certification authorities
5555

56-
You can configure CAs by using the Azure portal or PowerShell.
56+
You can configure CAs by using the Microsoft Entra admin center or PowerShell.
5757

58-
### Configure certification authorities using the Azure portal
58+
### Configure certification authorities using the Microsoft Entra admin center
5959

6060
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
6161

62-
To enable the certificate-based authentication and configure user bindings in the Azure portal, complete the following steps:
62+
To enable the certificate-based authentication and configure user bindings in the Microsoft Entra admin center, complete the following steps:
6363

64-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
65-
1. Click **Azure Active Directory** > **Security**.
64+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
65+
1. Browse to **Protection** > **Authentication methods** > **Certifacte-based authentication**.
6666

6767
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/certificate-authorities.png" alt-text="Screenshot of certification authorities.":::
6868

@@ -144,11 +144,10 @@ For more information, see [Understanding the certificate revocation process](./c
144144
>[!IMPORTANT]
145145
>A user is considered capable for **MFA** when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods. If the users do not have access to certificates they will be locked out and not be able to register other methods for MFA. So the admin needs to enable users who have a valid certificate into the CBA scope. Do not use all users for CBA target and use groups of users who have valid certificates available. For more information, see [Azure AD MFA](concept-mfa-howitworks.md).
146146
147-
To enable the certificate-based authentication in the Azure portal, complete the following steps:
147+
To enable the certificate-based authentication in the Microsoft Entra admin center, complete the following steps:
148148

149-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
150-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
151-
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
149+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
150+
1. Browse to **Protection** > **Authentication methods** > **Certificate-based Authentication**.
152151
1. Under **Enable and Target**, click **Enable**.
153152
1. Click **All users**, or click **Add groups** to select specific groups.
154153

@@ -164,11 +163,10 @@ Once certificate-based authentication is enabled on the tenant, all users in the
164163

165164
The authentication binding policy helps determine the strength of authentication to either a single factor or multi factor. An admin can change the default value from single-factor to multifactor and configure custom policy rules by mapping to issuer Subject or policy OID fields in the certificate.
166165

167-
To enable Azure AD CBA and configure user bindings in the Azure portal, complete the following steps:
166+
To enable Azure AD CBA and configure user bindings in the Microsoft Entra admin center, complete the following steps:
168167

169-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
170-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
171-
1. Click **Authentication methods** > **Policies**.
168+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
169+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
172170
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
173171

174172
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/policy.png" alt-text="Screenshot of Authentication policy.":::

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ ms.service: active-directory
55
ms.subservice: authentication
66
ms.custom: has-azure-ad-ps-ref
77
ms.topic: how-to
8-
ms.date: 03/06/2023
8+
ms.date: 09/13/2023
99
ms.author: justinha
1010
author: justinha
1111
manager: amycolannino
12-
ms.reviewer: michmcla
12+
ms.reviewer: jpettere
1313
ms.collection: M365-identity-device-management
1414
---
1515
# Plan an Azure Active Directory Multi-Factor Authentication deployment
@@ -243,7 +243,7 @@ You can monitor authentication method registration and usage across your organiz
243243

244244
The Azure AD sign-in reports include authentication details for events when a user is prompted for MFA, and if any Conditional Access policies were in use. You can also use PowerShell for reporting on users registered for Azure AD Multi-Factor Authentication.
245245

246-
NPS extension and AD FS logs for cloud MFA activity are now included in the [Sign-in logs](../reports-monitoring/concept-sign-ins.md), and no longer published to **Security** > **MFA** > **Activity report**.
246+
NPS extension and AD FS logs for cloud MFA activity are now included in the [Sign-in logs](../reports-monitoring/concept-sign-ins.md), and no longer published to the **Activity report**.
247247

248248
For more information, and additional Azure AD Multi-Factor Authentication reports, see [Review Azure AD Multi-Factor Authentication events](howto-mfa-reporting.md#view-the-azure-ad-sign-ins-report).
249249

0 commit comments

Comments
 (0)