You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ Use the **Multi-Factor Authentication** switch to specify whether to require use
77
77
* Skype for Business administrator
78
78
* User account administrator
79
79
80
-
For more information about using MFA with PIM, see [Require multi-factor authentication for Azure AD directory roles in PIM](pim-how-to-require-mfa.md).
80
+
For more information, see [Multi-factor authentication (MFA) and PIM](pim-how-to-require-mfa.md).
81
81
82
82
## Require approval
83
83
@@ -105,5 +105,4 @@ If you want to require approval to activate a role, follow these steps.
105
105
## Next steps
106
106
107
107
-[Assign Azure AD directory roles in PIM](pim-how-to-add-role-to-user.md)
108
-
-[Require multi-factor authentication for Azure AD directory roles in PIM](pim-how-to-require-mfa.md)
109
108
-[Configure security alerts for Azure AD directory roles in PIM](pim-how-to-configure-security-alerts.md)
title: Require multi-factor authentication for Azure AD directory roles in PIM | Microsoft Docs
3
-
description: Learn how to require multi-factor authentication (MFA) for Azure AD directory roles in Azure AD Privileged Identity Management (PIM).
2
+
title: Multi-factor authentication (MFA) and PIM - Azure | Microsoft Docs
3
+
description: Learn how Azure AD Privileged Identity Management (PIM) validates multi-factor authentication (MFA).
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: rolyon
@@ -11,36 +11,28 @@ ms.service: active-directory
11
11
ms.topic: conceptual
12
12
ms.workload: identity
13
13
ms.component: pim
14
-
ms.date: 06/06/2017
14
+
ms.date: 08/31/2018
15
15
ms.author: rolyon
16
16
ms.custom: pim
17
17
---
18
-
# Require multi-factor authentication for Azure AD directory roles in PIM
19
-
We recommend that you require multi-factor authentication (MFA) for all of your administrators. This reduces the risk of an attack due to a compromised password.
18
+
# Multi-factor authentication (MFA) and PIM
20
19
21
-
You can require that users complete an MFA challenge when they sign in. The blog post [MFA for Office 365 and MFA for Azure](https://blogs.technet.microsoft.com/ad/2014/02/11/mfa-for-office-365-and-mfa-for-azure/) compares what is included in Office and Azure subscriptions, with the features contained in the Microsoft Azure Multi-Factor Authentication offering.
20
+
We recommend that you require multi-factor authentication (MFA) for all your administrators. This reduces the risk of an attack due to a compromised password.
22
21
23
-
You can also require that users complete an MFA challenge when they activate a role in Azure AD PIM. This way, if the user didn't complete an MFA challenge when they signed in, they will be prompted to do so by PIM.
24
-
25
-
## Requiring MFA in Azure AD Privileged Identity Management
26
-
When you manage identities in PIM as a privileged role administrator, you may see alerts that recommend MFA for privileged accounts. Click the security alert in the PIM dashboard, and a new blade will open with a list of the administrator accounts that should require MFA. You can require MFA by selecting multiple roles and then clicking the **Fix** button, or you can click the ellipses next to individual roles and then click the **Fix** button.
22
+
You can require that users complete an MFA challenge when they sign in. You can also require that users complete an MFA challenge when they activate a role in Azure AD Privileged Identity Management (PIM). This way, if the user didn't complete an MFA challenge when they signed in, they will be prompted to do so by PIM.
27
23
28
24
> [!IMPORTANT]
29
-
> Right now, Azure MFA only works with work or school accounts, not Microsoft accounts (usually a personal account that's used to sign in to Microsoft services like Skype, Xbox, Outlook.com, etc.). Because of this, anyone using a Microsoft account can't be an eligible admin because they can't use MFA to activate their roles. If these users need to continue managing workloads using a Microsoft account, elevate them to permanent administrators for now.
30
-
>
31
-
>
25
+
> Right now, Azure MFA only works with work or school accounts, not Microsoft accounts (usually a personal account that's used to sign in to Microsoft services like Skype, Xbox, Outlook.com, etc.). Because of this, anyone using a Microsoft account can't be an eligible administrator because they can't use MFA to activate their roles. If these users need to continue managing workloads using a Microsoft account, elevate them to permanent administrators for now.
32
26
33
-
Additionally, you can change the MFA requirement for a specific role by clicking on it in the Roles section of the PIM dashboard. Then, click on **Settings** in the role blade and then selecting **Enable** under multi-factor authentication.
27
+
## How PIM validates MFA
34
28
35
-
## How Azure AD PIM validates MFA
36
29
There are two options for validating MFA when a user activates a role.
37
30
38
-
The simplest option is to rely on Azure MFA for users who are activating a privileged role. To do this, first check that those users are licensed, if necessary, and have registered for Azure MFA. More information on how to do this is in [Getting started with Azure Multi-Factor Authentication in the cloud](../authentication/howto-mfa-getstarted.md). It is recommended, but not required, that you configure Azure AD to enforce MFA for these users when they sign in. This is because the MFA checks will be made by Azure AD PIM itself.
31
+
The simplest option is to rely on Azure MFA for users who are activating a privileged role. To do this, first check that those users are licensed, if necessary, and have registered for Azure MFA. For more information about how to deploy Azure MFA, see [Deploy cloud-based Azure Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md). It is recommended, but not required, that you configure Azure AD to enforce MFA for these users when they sign in. This is because the MFA checks will be made by PIM itself.
39
32
40
-
Alternatively, if users authenticate on-premises you can have your identity provider be responsible for MFA. For example, if you have configured AD Federation Services to require smartcard-based authentication before accessing Azure AD, [Securing cloud resources with Azure Multi-Factor Authentication and AD FS](../authentication/howto-mfa-adfs.md) includes instructions for configuring AD FS to send claims to Azure AD. When a user tries to activate a role, Azure AD PIM will accept that MFA has already been validated for the user once it receives the appropriate claims.
33
+
Alternatively, if users authenticate on-premises you can have your identity provider be responsible for MFA. For example, if you have configured AD Federation Services to require smartcard-based authentication before accessing Azure AD, [Securing cloud resources with Azure Multi-Factor Authentication and AD FS](../authentication/howto-mfa-adfs.md) includes instructions for configuring AD FS to send claims to Azure AD. When a user tries to activate a role, PIM will accept that MFA has already been validated for the user once it receives the appropriate claims.
41
34
42
-
<!--Every topic should have next steps and links to the next logical set of content to keep the customer engaged-->
43
35
## Next steps
44
36
45
37
-[Configure Azure AD directory role settings in PIM](pim-how-to-change-default-settings.md)
46
-
-[Configure security alerts for Azure AD directory roles in PIM](pim-how-to-configure-security-alerts.md)
38
+
-[Configure Azure resource role settings in PIM](pim-resource-roles-configure-role-settings.md)
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,6 +85,8 @@ You can require eligible members of a role to run MFA before they can activate.
85
85
86
86
To require an eligible member to run MFA before activation, check the **Require Multi-Factor Authentication on activation** box.
87
87
88
+
For more information, see [Multi-factor authentication (MFA) and PIM](pim-how-to-require-mfa.md).
89
+
88
90
## Activation maximum duration
89
91
90
92
Use the **Activation maximum duration** slider to set the maximum time, in hours, that a role stays active before it expires. This value can be between 1 and 24 hours.
0 commit comments