You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Enable combined security information registration in Azure Active Directory
19
19
20
-
Before combined registration, users registered authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Multi-Factor Authentication and SSPR.
20
+
Before combined registration, users registered authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Azure Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure Multi-Factor Authentication and SSPR.
21
21
22
22
Before enabling the new experience, review the article [Combined security information registration](concept-registration-mfa-sspr-combined.md) to ensure you understand the functionality and effects of this feature.
23
23
@@ -31,10 +31,10 @@ Complete these steps to enable combined registration:
31
31
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
32
32
3. Under **Users can use the combined security information registration experience**, choose to enable for a **Selected** group of users or for **All** users.
33
33
34
-

34
+

35
35
36
36
> [!NOTE]
37
-
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Multi-Factor Authentication and SSPR, if those methods are enabled in the Multi-Factor Authentication and SSPR policies. If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` will be required to perform multi-factor authentication before they can access the page.
37
+
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Azure Multi-Factor Authentication and SSPR, if those methods are enabled in the Azure Multi-Factor Authentication and SSPR policies. If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` will be required to perform multi-factor authentication before they can access the page.
38
38
39
39
If you have configured the Site to Zone Assignment List in Internet Explorer, the following sites have to be in the same zone:
40
40
@@ -52,8 +52,8 @@ For more information about creating trusted locations in Conditional Access, see
52
52
53
53
The following policy applies to all selected users that attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network.
54
54
55
-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
56
-
1. Select **+ New policy**
55
+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**.
56
+
1. Select **+ New policy**.
57
57
1. Enter a name for this policy, such as *Combined Security Info Registration on Trusted Networks*.
58
58
1. Under **Assignments**, select **Users and groups**. Choose the users and groups you want this policy to apply to, then select **Done**.
59
59
@@ -65,20 +65,20 @@ The following policy applies to all selected users that attempt to register usin
65
65

66
66
67
67
1. Under **Conditions** > **Locations**, configure the following options:
68
-
1. Configure **Yes**
69
-
1. Include **Any location**
70
-
1. Exclude **All trusted locations**
68
+
1. Configure **Yes**.
69
+
1. Include **Any location**.
70
+
1. Exclude **All trusted locations**.
71
71
1. Select **Done** on the *Locations* window, then select **Done** on the *Conditions* window.
72
-
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**
73
-
1. Set **Enable policy** to **On**
74
-
1. To finalize the policy, select **Create**
72
+
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**.
73
+
1. Set **Enable policy** to **On**.
74
+
1. To finalize the policy, select **Create**.
75
75
76
76
## Next steps
77
77
78
78
If you need help, see how to [troubleshoot combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md) or learn [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md)
79
79
80
80
To enable the features in your Azure AD tenant, see the tutorials to [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
81
81
82
-
Learn how to [enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md) or [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).
82
+
Learn how to [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).
83
83
84
84
You can also review the [available methods for Azure Multi-Factor Authentication and SSPR](concept-authentication-methods.md).
0 commit comments