Skip to content

Commit 9553f47

Browse files
authored
Merge pull request #210772 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 9/11
2 parents e2e9d2e + d89749f commit 9553f47

File tree

82 files changed

+35285
-35128
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+35285
-35128
lines changed

.openpublishing.redirection.json

Lines changed: 34271 additions & 34276 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md

Lines changed: 15 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Migrate to Azure AD MFA and Azure AD user authentication - Azure Active Directory
3-
description: Step-by-step guidance to move from Azure MFA Server on-premises to Azure AD MFA and Azure AD user authentication
3+
description: Step-by-step guidance to move from MFA Server on-premises to Azure AD MFA and Azure AD user authentication
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 08/30/2022
9+
ms.date: 09/09/2022
1010

1111
ms.author: gasinh
1212
author: gargi-sinha
@@ -30,7 +30,7 @@ There are several options for migrating from MFA Server to Azure Active Director
3030
To select the appropriate MFA migration option for your organization, see the considerations in [Migrate from MFA Server to Azure Active Directory MFA](how-to-migrate-mfa-server-to-azure-mfa.md).
3131

3232
The following diagram shows the process for migrating to Azure AD MFA and cloud authentication while keeping some of your applications on AD FS.
33-
This process enables the iterative migration of users from MFA Server to Azure MFA based on group membership.
33+
This process enables the iterative migration of users from MFA Server to Azure AD MFA based on group membership.
3434

3535
Each step is explained in the subsequent sections of this article.
3636

@@ -132,7 +132,7 @@ This command will move the logic from your current Access Control Policy into Ad
132132

133133
#### Set up the group, and find the SID
134134

135-
You will need to have a specific group in which you place users for whom you want to invoke Azure AD MFA. You will need to find the security identifier (SID) for that group.
135+
You'll need to have a specific group in which you place users for whom you want to invoke Azure AD MFA. You'll need to find the security identifier (SID) for that group.
136136
To find the group SID, run the following command and replace `GroupName` with your group name:
137137

138138
```powershell
@@ -141,7 +141,7 @@ Get-ADGroup GroupName
141141

142142
![PowerShell command to get the group SID.](media/how-to-migrate-mfa-server-to-azure-mfa-user-authentication/find-the-sid.png)
143143

144-
#### Setting the claims rules to call Azure MFA
144+
#### Setting the claims rules to call Azure AD MFA
145145

146146
The following PowerShell cmdlets invoke Azure AD MFA for users in the group when they aren’t on the corporate network.
147147
You must replace `"YourGroupSid"` with the SID found by running the preceding cmdlet.
@@ -229,21 +229,14 @@ Now you're ready to enable [Staged Rollout](../hybrid/how-to-connect-staged-roll
229229
* [Enable the Staged Rollout of cloud authentication](../hybrid/how-to-connect-staged-rollout.md#enable-a-staged-rollout-of-a-specific-feature-on-your-tenant) for your selected authentication method.
230230
* Add the group(s) you created for Staged Rollout. Remember that you'll add users to groups iteratively, and that they can't be dynamic groups or nested groups.
231231

232-
## Register users for Azure MFA
232+
## Register users for Azure AD MFA
233233

234-
There are two ways to register users for Azure MFA:
235-
236-
* Register for combined security (MFA and self-service-password reset)
237-
* Migrate phone numbers from MFA Server
238-
239-
Microsoft Authenticator can be used as a passwordless sign-in method and a second factor for MFA with either method.
234+
This section covers how users can register for combined security (MFA and self-service-password reset) and how to migrate their MFA settings. Microsoft Authenticator can be used as in passwordless mode. It can also be used as a second factor for MFA with either registration method.
240235

241236
### Register for combined security registration (recommended)
242237

243238
We recommend having your users register for combined security information, which is a single place to register their authentication methods and devices for both MFA and SSPR.
244239

245-
Authentication data can be migrated from MFA Server to Azure AD. This process doesn't require any end-user interaction during or after the migration, but it can result in stale data being migrated.
246-
247240
Microsoft provides communication templates that you can provide to your users to guide them through the combined registration process.
248241
These include templates for email, posters, table tents, and various other assets. Users register their information at `https://aka.ms/mysecurityinfo`, which takes them to the combined security registration screen.
249242

@@ -256,54 +249,16 @@ We recommend that you [secure the security registration process with Conditional
256249
You can use the [MFA Server Migration utility](how-to-mfa-server-migration-utility.md) to synchronize registered MFA settings for users from MFA Server to Azure AD.
257250
You can synchronize phone numbers, hardware tokens, and device registrations such as Microsoft Authenticator app settings.
258251

259-
### Migrate phone numbers from MFA Server
260-
261-
If you only want to migrate registered MFA phone numbers, you can export the users along with their phone numbers from MFA Server and import the phone numbers into Azure AD.
262-
263-
#### Export user phone numbers from MFA Server
264-
265-
1. Open the Multi-Factor Authentication Server admin console on the MFA Server.
266-
1. Select **File** > **Export Users**.
267-
1. Save the .csv file. The default name is Multi-Factor Authentication Users.csv.
268-
269-
#### Interpret and format the .csv file
270-
271-
The .csv file contains many fields not necessary for migration and will need to be edited and formatted prior to importing the phone numbers into Azure AD.
272-
273-
In the .csv file, columns of interest include Username, Primary Phone, Primary Country Code, Backup Country Code, Backup Phone, Backup Extension. You must interpret this data and format it, as necessary.
274-
275-
#### Tips to avoid errors during import
276-
277-
* The .csv file will need to be modified prior to using the Authentication Methods API to import the phone numbers into Azure AD.
278-
* We recommend simplifying the .csv to three columns: UPN, PhoneType, and PhoneNumber.
279-
280-
![Screenshot of a csv example.](media/how-to-migrate-mfa-server-to-azure-mfa-user-authentication/csv-example.png)
281-
282-
* Make sure the exported MFA Server Username matches the Azure AD UserPrincipalName. If it doesn't, update the username in the .csv file to match what is in Azure AD, otherwise the user won't be found.
283-
284-
Users may have already registered phone numbers in Azure AD.
285-
When importing the phone numbers using the Authentication Methods API, you must decide whether to overwrite the existing phone number, or to add the imported number as an alternate phone number.
286-
287-
The following PowerShell cmdlets takes the .csv file you supply and add the exported phone numbers as a phone number for each UPN using the Authentication Methods API. You must replace "myPhones" with the name of your .csv file.
288-
289-
290-
```powershell
291-
$csv = import-csv myPhones.csv
292-
$csv|% { New-MgUserAuthenticationPhoneMethod -UserId $_.UPN -phoneType $_.PhoneType -phoneNumber $_.PhoneNumber}
293-
```
294-
295-
For more information about managing authentication methods, see [Manage authentication methods for Azure AD Multi-Factor Authentication](howto-mfa-userdevicesettings.md).
296-
297252
### Add users to the appropriate groups
298253

299254
* If you created new conditional access policies, add the appropriate users to those groups.
300255
* If you created on-premises security groups for claims rules, add the appropriate users to those groups.
301-
* Only after you add users to the appropriate conditional access rules, add users to the group that you created for Staged Rollout. Once done, they'll begin to use the Azure authentication method that you selected (PHS or PTA) and Azure AD MFA when they are required to perform MFA.
256+
* Only after you add users to the appropriate conditional access rules, add users to the group that you created for Staged Rollout. Once done, they'll begin to use the Azure authentication method that you selected (PHS or PTA) and Azure AD MFA when they're required to perform MFA.
302257

303258
> [!IMPORTANT]
304259
> Nested and dynamic groups aren't supported for Staged Rollout. Do not use these types of groups.
305260
306-
We don't recommend that you reuse groups that are used for security. Therefore, if you're using a security group to secure a group of high-value apps via a Conditional Access policy, that should be the only use of that group.
261+
We don't recommend that you reuse groups that are used for security. If you're using a security group to secure a group of high-value apps with a Conditional Access policy, only use the group for that purpose.
307262

308263
## Monitoring
309264

@@ -319,14 +274,14 @@ This workbook can be used to monitor the following activities:
319274
* Users and groups removed from Staged Rollout.
320275
* Sign-in failures for users in Staged Rollout, and the reasons for failures.
321276

322-
### Monitoring Azure MFA registration
323-
Azure MFA registration can be monitored using the [Authentication methods usage & insights report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/AuthMethodsActivity/menuId/AuthMethodsActivity). This report can be found in Azure AD. Select **Monitoring**, then select **Usage & insights**.
277+
### Monitoring Azure AD MFA registration
278+
Azure AD MFA registration can be monitored using the [Authentication methods usage & insights report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/AuthMethodsActivity/menuId/AuthMethodsActivity). This report can be found in Azure AD. Select **Monitoring**, then select **Usage & insights**.
324279

325280
![Screenshot of how to find the Usage and Insights report.](media/how-to-migrate-mfa-server-to-azure-mfa-user-authentication/usage-report.png)
326281

327282
In Usage & insights, select **Authentication methods**.
328283

329-
Detailed Azure MFA registration information can be found on the Registration tab. You can drill down to view a list of registered users by selecting the **Users registered for Azure multi-factor authentication** hyperlink.
284+
Detailed Azure AD MFA registration information can be found on the Registration tab. You can drill down to view a list of registered users by selecting the **Users registered for Azure multi-factor authentication** hyperlink.
330285

331286
![Screenshot of the Registration tab.](media/how-to-migrate-mfa-server-to-azure-mfa-user-authentication/registration-tab.png)
332287

@@ -339,7 +294,7 @@ Monitor applications you moved to Azure AD with the App sign-in health workbook
339294

340295
## Clean up tasks
341296

342-
After you move all users to Azure AD cloud authentication and Azure MFA, you are ready to decommission your MFA Server.
297+
After you move all users to Azure AD cloud authentication and Azure AD MFA, you're ready to decommission your MFA Server.
343298
We recommend reviewing MFA Server logs to ensure no users or applications are using it before you remove the server.
344299

345300
### Convert your domains to managed authentication
@@ -365,7 +320,7 @@ Value=="YourGroupSid"]) => issue(Type =
365320

366321
### Disable MFA Server as an authentication provider in AD FS
367322

368-
This change ensures only Azure MFA is used as an authentication provider.
323+
This change ensures only Azure AD MFA is used as an authentication provider.
369324

370325
1. Open the **AD FS management console**.
371326
1. Under **Services**, right-click on **Authentication Methods**, and select **Edit Multi-factor Authentication Methods**.
@@ -397,6 +352,6 @@ For more information about migrating applications to Azure, see [Resources for m
397352

398353
## Next steps
399354

400-
- [Migrate from Microsoft MFA Server to Azure MFA (Overview)](how-to-migrate-mfa-server-to-azure-mfa.md)
355+
- [Migrate from Microsoft MFA Server to Azure AD MFA (Overview)](how-to-migrate-mfa-server-to-azure-mfa.md)
401356
- [Migrate applications from Windows Active Directory to Azure Active Directory](../manage-apps/migrate-application-authentication-to-azure-active-directory.md)
402357
- [Plan your cloud authentication strategy](../fundamentals/active-directory-deployment-plans.md)

0 commit comments

Comments
 (0)