Skip to content

Commit 9b91014

Browse files
committed
acrolinx fixes
1 parent e58055d commit 9b91014

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ You can enable passwordless phone sign-in for multiple accounts in Microsoft Aut
3838

3939
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
4040

41-
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-in from one device.
41+
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-ins from one device.
4242

4343
>[!NOTE]
4444
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
@@ -47,7 +47,7 @@ The Azure AD accounts can be in the same tenant or different tenants. Guest acco
4747

4848
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
4949

50-
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
50+
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications. A user has a backup sign-in method even if their device doesn't have connectivity.
5151
- Latest version of Microsoft Authenticator installed on devices running iOS or Android.
5252
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
5353
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
@@ -61,7 +61,7 @@ To use passwordless authentication in Azure AD, first enable the combined regist
6161

6262
## Enable passwordless phone sign-in authentication methods
6363

64-
Azure AD lets you choose which authentication methods can be used during the sign-in process. Users then register for the methods they'd like to use. The **Microsoft Authenticator** authentication method policy manages both the traditional push MFA method, as well as the passwordless authentication method.
64+
Azure AD lets you choose which authentication methods can be used during the sign-in process. Users then register for the methods they'd like to use. The **Microsoft Authenticator** authentication method policy manages both the traditional push MFA method and the passwordless authentication method.
6565

6666
> [!NOTE]
6767
> If you enabled Microsoft Authenticator passwordless sign-in using Azure AD PowerShell, it was enabled for your entire directory. If you enable using this new method, it supersedes the PowerShell policy. We recommend you enable for all users in your tenant via the new **Authentication Methods** menu, otherwise users who aren't in the new policy can't sign in without a password.
@@ -73,7 +73,7 @@ To enable the authentication method for passwordless phone sign-in, complete the
7373
1. Under **Microsoft Authenticator**, choose the following options:
7474
1. **Enable** - Yes or No
7575
1. **Target** - All users or Select users
76-
1. Each added group or user is enabled by default to use Microsoft Authenticator in both passwordless and push notification modes ("Any" mode). To change this, for each row:
76+
1. Each added group or user is enabled by default to use Microsoft Authenticator in both passwordless and push notification modes ("Any" mode). To change the mode, for each row:
7777
1. Browse to **...** > **Configure**.
7878
1. For **Authentication mode** - choose **Any**, or **Passwordless**. Choosing **Push** prevents the use of the passwordless phone sign-in credential.
7979
1. To apply the new policy, click **Save**.
@@ -132,14 +132,14 @@ The following known issues exist.
132132

133133
### Not seeing option for passwordless phone sign-in
134134

135-
In one scenario, a user can have an unanswered passwordless phone sign-in verification that is pending. Yet the user might attempt to sign in again. When this happens, the user might see only the option to enter a password.
135+
In one scenario, a user can have an unanswered passwordless phone sign-in verification that is pending. If the user attempts to sign in again, they might only see the option to enter a password.
136136

137-
To resolve this scenario, the following steps can be used:
137+
To resolve this scenario, follow these steps:
138138

139139
1. Open Microsoft Authenticator.
140140
2. Respond to any notification prompts.
141141

142-
Then the user can continue to utilize passwordless phone sign-in.
142+
Then the user can continue to use passwordless phone sign-in.
143143

144144
### Federated Accounts
145145

0 commit comments

Comments
 (0)