Skip to content

Commit 8ae0552

Browse files
committed
Updates to MFA article
1 parent bfc4716 commit 8ae0552

File tree

5 files changed

+16
-24
lines changed

5 files changed

+16
-24
lines changed

articles/active-directory/privileged-identity-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@
1111
href: pim-roles.md
1212
- name: Secure privileged access
1313
href: ../users-groups-roles/directory-admin-roles-secure.md?toc=%2fazure%2factive-directory%2fprivileged-identity-management%2ftoc.json
14+
- name: MFA and PIM
15+
href: pim-how-to-require-mfa.md
1416
- name: Overview dashboards
1517
href: pim-resource-roles-overview-dashboards.md
1618
- name: Email notifications
@@ -44,8 +46,6 @@
4446
href: pim-how-to-add-role-to-user.md
4547
- name: Configure role settings
4648
href: pim-how-to-change-default-settings.md
47-
- name: Require MFA
48-
href: pim-how-to-require-mfa.md
4949
- name: Configure alerts
5050
href: pim-how-to-configure-security-alerts.md
5151
- name: Approve requests

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Use the **Multi-Factor Authentication** switch to specify whether to require use
7777
* Skype for Business administrator
7878
* User account administrator
7979

80-
For more information about using MFA with PIM, see [Require multi-factor authentication for Azure AD directory roles in PIM](pim-how-to-require-mfa.md).
80+
For more information, see [Multi-factor authentication (MFA) and PIM](pim-how-to-require-mfa.md).
8181

8282
## Require approval
8383

@@ -105,5 +105,4 @@ If you want to require approval to activate a role, follow these steps.
105105
## Next steps
106106

107107
- [Assign Azure AD directory roles in PIM](pim-how-to-add-role-to-user.md)
108-
- [Require multi-factor authentication for Azure AD directory roles in PIM](pim-how-to-require-mfa.md)
109108
- [Configure security alerts for Azure AD directory roles in PIM](pim-how-to-configure-security-alerts.md)

articles/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,3 @@ This alert triggers if a user goes a certain amount of time without activating a
6262
## Next steps
6363

6464
- [Configure Azure AD directory role settings in PIM](pim-how-to-change-default-settings.md)
65-
- [Require multi-factor authentication for Azure AD directory roles in PIM](pim-how-to-require-mfa.md)
Lines changed: 11 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Require multi-factor authentication for Azure AD directory roles in PIM | Microsoft Docs
3-
description: Learn how to require multi-factor authentication (MFA) for Azure AD directory roles in Azure AD Privileged Identity Management (PIM).
2+
title: Multi-factor authentication (MFA) and PIM - Azure | Microsoft Docs
3+
description: Learn how Azure AD Privileged Identity Management (PIM) validates multi-factor authentication (MFA).
44
services: active-directory
55
documentationcenter: ''
66
author: rolyon
@@ -11,36 +11,28 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.component: pim
14-
ms.date: 06/06/2017
14+
ms.date: 08/31/2018
1515
ms.author: rolyon
1616
ms.custom: pim
1717
---
18-
# Require multi-factor authentication for Azure AD directory roles in PIM
19-
We recommend that you require multi-factor authentication (MFA) for all of your administrators. This reduces the risk of an attack due to a compromised password.
18+
# Multi-factor authentication (MFA) and PIM
2019

21-
You can require that users complete an MFA challenge when they sign in. The blog post [MFA for Office 365 and MFA for Azure](https://blogs.technet.microsoft.com/ad/2014/02/11/mfa-for-office-365-and-mfa-for-azure/) compares what is included in Office and Azure subscriptions, with the features contained in the Microsoft Azure Multi-Factor Authentication offering.
20+
We recommend that you require multi-factor authentication (MFA) for all your administrators. This reduces the risk of an attack due to a compromised password.
2221

23-
You can also require that users complete an MFA challenge when they activate a role in Azure AD PIM. This way, if the user didn't complete an MFA challenge when they signed in, they will be prompted to do so by PIM.
24-
25-
## Requiring MFA in Azure AD Privileged Identity Management
26-
When you manage identities in PIM as a privileged role administrator, you may see alerts that recommend MFA for privileged accounts. Click the security alert in the PIM dashboard, and a new blade will open with a list of the administrator accounts that should require MFA. You can require MFA by selecting multiple roles and then clicking the **Fix** button, or you can click the ellipses next to individual roles and then click the **Fix** button.
22+
You can require that users complete an MFA challenge when they sign in. You can also require that users complete an MFA challenge when they activate a role in Azure AD Privileged Identity Management (PIM). This way, if the user didn't complete an MFA challenge when they signed in, they will be prompted to do so by PIM.
2723

2824
> [!IMPORTANT]
29-
> Right now, Azure MFA only works with work or school accounts, not Microsoft accounts (usually a personal account that's used to sign in to Microsoft services like Skype, Xbox, Outlook.com, etc.). Because of this, anyone using a Microsoft account can't be an eligible admin because they can't use MFA to activate their roles. If these users need to continue managing workloads using a Microsoft account, elevate them to permanent administrators for now.
30-
>
31-
>
25+
> Right now, Azure MFA only works with work or school accounts, not Microsoft accounts (usually a personal account that's used to sign in to Microsoft services like Skype, Xbox, Outlook.com, etc.). Because of this, anyone using a Microsoft account can't be an eligible administrator because they can't use MFA to activate their roles. If these users need to continue managing workloads using a Microsoft account, elevate them to permanent administrators for now.
3226
33-
Additionally, you can change the MFA requirement for a specific role by clicking on it in the Roles section of the PIM dashboard. Then, click on **Settings** in the role blade and then selecting **Enable** under multi-factor authentication.
27+
## How PIM validates MFA
3428

35-
## How Azure AD PIM validates MFA
3629
There are two options for validating MFA when a user activates a role.
3730

38-
The simplest option is to rely on Azure MFA for users who are activating a privileged role. To do this, first check that those users are licensed, if necessary, and have registered for Azure MFA. More information on how to do this is in [Getting started with Azure Multi-Factor Authentication in the cloud](../authentication/howto-mfa-getstarted.md). It is recommended, but not required, that you configure Azure AD to enforce MFA for these users when they sign in. This is because the MFA checks will be made by Azure AD PIM itself.
31+
The simplest option is to rely on Azure MFA for users who are activating a privileged role. To do this, first check that those users are licensed, if necessary, and have registered for Azure MFA. For more information about how to deploy Azure MFA, see [Deploy cloud-based Azure Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md). It is recommended, but not required, that you configure Azure AD to enforce MFA for these users when they sign in. This is because the MFA checks will be made by PIM itself.
3932

40-
Alternatively, if users authenticate on-premises you can have your identity provider be responsible for MFA. For example, if you have configured AD Federation Services to require smartcard-based authentication before accessing Azure AD, [Securing cloud resources with Azure Multi-Factor Authentication and AD FS](../authentication/howto-mfa-adfs.md) includes instructions for configuring AD FS to send claims to Azure AD. When a user tries to activate a role, Azure AD PIM will accept that MFA has already been validated for the user once it receives the appropriate claims.
33+
Alternatively, if users authenticate on-premises you can have your identity provider be responsible for MFA. For example, if you have configured AD Federation Services to require smartcard-based authentication before accessing Azure AD, [Securing cloud resources with Azure Multi-Factor Authentication and AD FS](../authentication/howto-mfa-adfs.md) includes instructions for configuring AD FS to send claims to Azure AD. When a user tries to activate a role, PIM will accept that MFA has already been validated for the user once it receives the appropriate claims.
4134

42-
<!--Every topic should have next steps and links to the next logical set of content to keep the customer engaged-->
4335
## Next steps
4436

4537
- [Configure Azure AD directory role settings in PIM](pim-how-to-change-default-settings.md)
46-
- [Configure security alerts for Azure AD directory roles in PIM](pim-how-to-configure-security-alerts.md)
38+
- [Configure Azure resource role settings in PIM](pim-resource-roles-configure-role-settings.md)

articles/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,8 @@ You can require eligible members of a role to run MFA before they can activate.
8585

8686
To require an eligible member to run MFA before activation, check the **Require Multi-Factor Authentication on activation** box.
8787

88+
For more information, see [Multi-factor authentication (MFA) and PIM](pim-how-to-require-mfa.md).
89+
8890
## Activation maximum duration
8991

9092
Use the **Activation maximum duration** slider to set the maximum time, in hours, that a role stays active before it expires. This value can be between 1 and 24 hours.

0 commit comments

Comments
 (0)