You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md
+15-60Lines changed: 15 additions & 60 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Migrate to Azure AD MFA and Azure AD user authentication - Azure Active Directory
3
-
description: Step-by-step guidance to move from Azure MFA Server on-premises to Azure AD MFA and Azure AD user authentication
3
+
description: Step-by-step guidance to move from MFA Server on-premises to Azure AD MFA and Azure AD user authentication
4
4
5
5
services: multi-factor-authentication
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 08/30/2022
9
+
ms.date: 09/09/2022
10
10
11
11
ms.author: gasinh
12
12
author: gargi-sinha
@@ -30,7 +30,7 @@ There are several options for migrating from MFA Server to Azure Active Director
30
30
To select the appropriate MFA migration option for your organization, see the considerations in [Migrate from MFA Server to Azure Active Directory MFA](how-to-migrate-mfa-server-to-azure-mfa.md).
31
31
32
32
The following diagram shows the process for migrating to Azure AD MFA and cloud authentication while keeping some of your applications on AD FS.
33
-
This process enables the iterative migration of users from MFA Server to Azure MFA based on group membership.
33
+
This process enables the iterative migration of users from MFA Server to Azure AD MFA based on group membership.
34
34
35
35
Each step is explained in the subsequent sections of this article.
36
36
@@ -132,7 +132,7 @@ This command will move the logic from your current Access Control Policy into Ad
132
132
133
133
#### Set up the group, and find the SID
134
134
135
-
You will need to have a specific group in which you place users for whom you want to invoke Azure AD MFA. You will need to find the security identifier (SID) for that group.
135
+
You'll need to have a specific group in which you place users for whom you want to invoke Azure AD MFA. You'll need to find the security identifier (SID) for that group.
136
136
To find the group SID, run the following command and replace `GroupName` with your group name:
137
137
138
138
```powershell
@@ -141,7 +141,7 @@ Get-ADGroup GroupName
141
141
142
142

143
143
144
-
#### Setting the claims rules to call Azure MFA
144
+
#### Setting the claims rules to call Azure AD MFA
145
145
146
146
The following PowerShell cmdlets invoke Azure AD MFA for users in the group when they aren’t on the corporate network.
147
147
You must replace `"YourGroupSid"` with the SID found by running the preceding cmdlet.
@@ -229,21 +229,14 @@ Now you're ready to enable [Staged Rollout](../hybrid/how-to-connect-staged-roll
229
229
*[Enable the Staged Rollout of cloud authentication](../hybrid/how-to-connect-staged-rollout.md#enable-a-staged-rollout-of-a-specific-feature-on-your-tenant) for your selected authentication method.
230
230
* Add the group(s) you created for Staged Rollout. Remember that you'll add users to groups iteratively, and that they can't be dynamic groups or nested groups.
231
231
232
-
## Register users for Azure MFA
232
+
## Register users for Azure AD MFA
233
233
234
-
There are two ways to register users for Azure MFA:
235
-
236
-
* Register for combined security (MFA and self-service-password reset)
237
-
* Migrate phone numbers from MFA Server
238
-
239
-
Microsoft Authenticator can be used as a passwordless sign-in method and a second factor for MFA with either method.
234
+
This section covers how users can register for combined security (MFA and self-service-password reset) and how to migrate their MFA settings. Microsoft Authenticator can be used as in passwordless mode. It can also be used as a second factor for MFA with either registration method.
240
235
241
236
### Register for combined security registration (recommended)
242
237
243
238
We recommend having your users register for combined security information, which is a single place to register their authentication methods and devices for both MFA and SSPR.
244
239
245
-
Authentication data can be migrated from MFA Server to Azure AD. This process doesn't require any end-user interaction during or after the migration, but it can result in stale data being migrated.
246
-
247
240
Microsoft provides communication templates that you can provide to your users to guide them through the combined registration process.
248
241
These include templates for email, posters, table tents, and various other assets. Users register their information at `https://aka.ms/mysecurityinfo`, which takes them to the combined security registration screen.
249
242
@@ -256,54 +249,16 @@ We recommend that you [secure the security registration process with Conditional
256
249
You can use the [MFA Server Migration utility](how-to-mfa-server-migration-utility.md) to synchronize registered MFA settings for users from MFA Server to Azure AD.
257
250
You can synchronize phone numbers, hardware tokens, and device registrations such as Microsoft Authenticator app settings.
258
251
259
-
### Migrate phone numbers from MFA Server
260
-
261
-
If you only want to migrate registered MFA phone numbers, you can export the users along with their phone numbers from MFA Server and import the phone numbers into Azure AD.
262
-
263
-
#### Export user phone numbers from MFA Server
264
-
265
-
1. Open the Multi-Factor Authentication Server admin console on the MFA Server.
266
-
1. Select **File** > **Export Users**.
267
-
1. Save the .csv file. The default name is Multi-Factor Authentication Users.csv.
268
-
269
-
#### Interpret and format the .csv file
270
-
271
-
The .csv file contains many fields not necessary for migration and will need to be edited and formatted prior to importing the phone numbers into Azure AD.
272
-
273
-
In the .csv file, columns of interest include Username, Primary Phone, Primary Country Code, Backup Country Code, Backup Phone, Backup Extension. You must interpret this data and format it, as necessary.
274
-
275
-
#### Tips to avoid errors during import
276
-
277
-
* The .csv file will need to be modified prior to using the Authentication Methods API to import the phone numbers into Azure AD.
278
-
* We recommend simplifying the .csv to three columns: UPN, PhoneType, and PhoneNumber.
279
-
280
-

281
-
282
-
* Make sure the exported MFA Server Username matches the Azure AD UserPrincipalName. If it doesn't, update the username in the .csv file to match what is in Azure AD, otherwise the user won't be found.
283
-
284
-
Users may have already registered phone numbers in Azure AD.
285
-
When importing the phone numbers using the Authentication Methods API, you must decide whether to overwrite the existing phone number, or to add the imported number as an alternate phone number.
286
-
287
-
The following PowerShell cmdlets takes the .csv file you supply and add the exported phone numbers as a phone number for each UPN using the Authentication Methods API. You must replace "myPhones" with the name of your .csv file.
For more information about managing authentication methods, see [Manage authentication methods for Azure AD Multi-Factor Authentication](howto-mfa-userdevicesettings.md).
296
-
297
252
### Add users to the appropriate groups
298
253
299
254
* If you created new conditional access policies, add the appropriate users to those groups.
300
255
* If you created on-premises security groups for claims rules, add the appropriate users to those groups.
301
-
* Only after you add users to the appropriate conditional access rules, add users to the group that you created for Staged Rollout. Once done, they'll begin to use the Azure authentication method that you selected (PHS or PTA) and Azure AD MFA when they are required to perform MFA.
256
+
* Only after you add users to the appropriate conditional access rules, add users to the group that you created for Staged Rollout. Once done, they'll begin to use the Azure authentication method that you selected (PHS or PTA) and Azure AD MFA when they're required to perform MFA.
302
257
303
258
> [!IMPORTANT]
304
259
> Nested and dynamic groups aren't supported for Staged Rollout. Do not use these types of groups.
305
260
306
-
We don't recommend that you reuse groups that are used for security. Therefore, if you're using a security group to secure a group of high-value apps via a Conditional Access policy, that should be the only use of that group.
261
+
We don't recommend that you reuse groups that are used for security. If you're using a security group to secure a group of high-value apps with a Conditional Access policy, only use the group for that purpose.
307
262
308
263
## Monitoring
309
264
@@ -319,14 +274,14 @@ This workbook can be used to monitor the following activities:
319
274
* Users and groups removed from Staged Rollout.
320
275
* Sign-in failures for users in Staged Rollout, and the reasons for failures.
321
276
322
-
### Monitoring Azure MFA registration
323
-
Azure MFA registration can be monitored using the [Authentication methods usage & insights report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/AuthMethodsActivity/menuId/AuthMethodsActivity). This report can be found in Azure AD. Select **Monitoring**, then select **Usage & insights**.
277
+
### Monitoring Azure AD MFA registration
278
+
Azure AD MFA registration can be monitored using the [Authentication methods usage & insights report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/AuthMethodsActivity/menuId/AuthMethodsActivity). This report can be found in Azure AD. Select **Monitoring**, then select **Usage & insights**.
324
279
325
280

326
281
327
282
In Usage & insights, select **Authentication methods**.
328
283
329
-
Detailed Azure MFA registration information can be found on the Registration tab. You can drill down to view a list of registered users by selecting the **Users registered for Azure multi-factor authentication** hyperlink.
284
+
Detailed Azure AD MFA registration information can be found on the Registration tab. You can drill down to view a list of registered users by selecting the **Users registered for Azure multi-factor authentication** hyperlink.
330
285
331
286

332
287
@@ -339,7 +294,7 @@ Monitor applications you moved to Azure AD with the App sign-in health workbook
339
294
340
295
## Clean up tasks
341
296
342
-
After you move all users to Azure AD cloud authentication and Azure MFA, you are ready to decommission your MFA Server.
297
+
After you move all users to Azure AD cloud authentication and Azure AD MFA, you're ready to decommission your MFA Server.
343
298
We recommend reviewing MFA Server logs to ensure no users or applications are using it before you remove the server.
344
299
345
300
### Convert your domains to managed authentication
### Disable MFA Server as an authentication provider in AD FS
367
322
368
-
This change ensures only Azure MFA is used as an authentication provider.
323
+
This change ensures only Azure AD MFA is used as an authentication provider.
369
324
370
325
1. Open the **AD FS management console**.
371
326
1. Under **Services**, right-click on **Authentication Methods**, and select **Edit Multi-factor Authentication Methods**.
@@ -397,6 +352,6 @@ For more information about migrating applications to Azure, see [Resources for m
397
352
398
353
## Next steps
399
354
400
-
-[Migrate from Microsoft MFA Server to Azure MFA (Overview)](how-to-migrate-mfa-server-to-azure-mfa.md)
355
+
-[Migrate from Microsoft MFA Server to Azure AD MFA (Overview)](how-to-migrate-mfa-server-to-azure-mfa.md)
401
356
-[Migrate applications from Windows Active Directory to Azure Active Directory](../manage-apps/migrate-application-authentication-to-azure-active-directory.md)
402
357
-[Plan your cloud authentication strategy](../fundamentals/active-directory-deployment-plans.md)
0 commit comments