You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# User portal for the Azure Multi-Factor Authentication Server
18
+
# User portal for the Azure AD Multi-Factor Authentication Server
19
19
20
-
The user portal is an IIS web site that allows users to enroll in Azure Multi-Factor Authentication (MFA) and maintain their accounts. A user may change their phone number, change their PIN, or choose to bypass two-step verification during their next sign-on.
20
+
The user portal is an IIS web site that allows users to enroll in Azure AD Multi-Factor Authentication (MFA) and maintain their accounts. A user may change their phone number, change their PIN, or choose to bypass two-step verification during their next sign-on.
21
21
22
22
Users sign in to the user portal with their normal username and password, then either complete a two-step verification call or answer security questions to complete their authentication. If user enrollment is allowed, users configure their phone number and PIN the first time they sign in to the user portal.
23
23
24
24
User portal Administrators may be set up and granted permission to add new users and update existing users.
25
25
26
-
Depending on your environment, you may want to deploy the user portal on the same server as Azure Multi-Factor Authentication Server or on another internet-facing server.
26
+
Depending on your environment, you may want to deploy the user portal on the same server as Azure AD Multi-Factor Authentication Server or on another internet-facing server.
27
27
28
28
> [!IMPORTANT]
29
-
> As of July 1, 2019, Microsoft no longer offers MFA Server for new deployments. New customers that want to require multi-factor authentication (MFA) during sign-in events should use cloud-based Azure AD Multi-Factor Authentication.
30
-
>
29
+
> In September 2022, Microsoft announced deprecation of Azure AD Multi-Factor Authentication Server. Beginning September 30, 2024, Azure AD Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
30
+
31
31
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
32
-
>
33
-
> Existing customers that activated MFA Server before July 1, 2019 can download the latest version, future updates, and generate activation credentials as usual.
34
32
35
-

33
+
34
+

36
35
37
36
> [!NOTE]
38
37
> The user portal is only available with Multi-Factor Authentication Server. If you use Multi-Factor Authentication in the cloud, refer your users to the [Set-up your account for two-step verification](https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc) or [Manage your settings for two-step verification](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7).
39
38
40
39
## Install the web service SDK
41
40
42
-
In either scenario, if the Azure Multi-Factor Authentication Web Service SDK is **not** already installed on the Azure Multi-Factor Authentication (MFA) Server, complete the steps that follow.
41
+
In either scenario, if the Azure AD Multi-Factor Authentication Web Service SDK is **not** already installed on the Azure AD Multi-Factor Authentication (MFA) Server, complete the steps that follow.
43
42
44
43
1. Open the Multi-Factor Authentication Server console.
45
44
2. Go to the **Web Service SDK** and select **Install Web Service SDK**.
@@ -52,18 +51,18 @@ The Web Service SDK must be secured with a TLS/SSL certificate. A self-signed ce
52
51
53
52

54
53
55
-
## Deploy the user portal on the same server as the Azure Multi-Factor Authentication Server
54
+
## Deploy the user portal on the same server as the Azure AD Multi-Factor Authentication Server
56
55
57
-
The following pre-requisites are required to install the user portal on the **same server** as the Azure Multi-Factor Authentication Server:
56
+
The following pre-requisites are required to install the user portal on the **same server** as the Azure AD Multi-Factor Authentication Server:
58
57
59
58
* IIS, including ASP.NET, and IIS 6 meta base compatibility (for IIS 7 or higher)
60
59
* An account with admin rights for the computer and Domain if applicable. The account needs permissions to create Active Directory security groups.
61
60
* Secure the user portal with a TLS/SSL certificate.
62
-
* Secure the Azure Multi-Factor Authentication Web Service SDK with a TLS/SSL certificate.
61
+
* Secure the Azure AD Multi-Factor Authentication Web Service SDK with a TLS/SSL certificate.
63
62
64
63
To deploy the user portal, follow these steps:
65
64
66
-
1. Open the Azure Multi-Factor Authentication Server console, click the **User Portal** icon in the left menu, then click **Install User Portal**.
65
+
1. Open the Azure AD Multi-Factor Authentication Server console, click the **User Portal** icon in the left menu, then click **Install User Portal**.
67
66
2. Complete the install using the defaults unless you need to change them for some reason.
68
67
3. Bind a TLS/SSL Certificate to the site in IIS
69
68
@@ -78,20 +77,20 @@ If you have questions about configuring a TLS/SSL Certificate on an IIS server,
78
77
79
78
## Deploy the user portal on a separate server
80
79
81
-
If the server where Azure Multi-Factor Authentication Server is running is not internet-facing, you should install the user portal on a **separate, internet-facing server**.
80
+
If the server where Azure AD Multi-Factor Authentication Server is running is not internet-facing, you should install the user portal on a **separate, internet-facing server**.
82
81
83
82
If your organization uses the Microsoft Authenticator app as one of the verification methods, and want to deploy the user portal on its own server, complete the following requirements:
84
83
85
-
* Use v6.0 or higher of the Azure Multi-Factor Authentication Server.
84
+
* Use v6.0 or higher of the Azure AD Multi-Factor Authentication Server.
86
85
* Install the user portal on an internet-facing web server running Microsoft internet Information Services (IIS) 6.x or higher.
87
86
* When using IIS 6.x, ensure ASP.NET v2.0.50727 is installed, registered, and set to **Allowed**.
88
87
* When using IIS 7.x or higher, IIS, including Basic Authentication, ASP.NET, and IIS 6 meta base compatibility.
89
88
* Secure the user portal with a TLS/SSL certificate.
90
-
* Secure the Azure Multi-Factor Authentication Web Service SDK with a TLS/SSL certificate.
91
-
* Ensure that the user portal can connect to the Azure Multi-Factor Authentication Web Service SDK over TLS/SSL.
92
-
* Ensure that the user portal can authenticate to the Azure Multi-Factor Authentication Web Service SDK using the credentials of a service account in the "PhoneFactor Admins" security group. This service account and group should exist in Active Directory if the Azure Multi-Factor Authentication Server is running on a domain-joined server. This service account and group exist locally on the Azure Multi-Factor Authentication Server if it is not joined to a domain.
89
+
* Secure the Azure AD Multi-Factor Authentication Web Service SDK with a TLS/SSL certificate.
90
+
* Ensure that the user portal can connect to the Azure AD Multi-Factor Authentication Web Service SDK over TLS/SSL.
91
+
* Ensure that the user portal can authenticate to the Azure AD Multi-Factor Authentication Web Service SDK using the credentials of a service account in the "PhoneFactor Admins" security group. This service account and group should exist in Active Directory if the Azure AD Multi-Factor Authentication Server is running on a domain-joined server. This service account and group exist locally on the Azure AD Multi-Factor Authentication Server if it is not joined to a domain.
93
92
94
-
Installing the user portal on a server other than the Azure Multi-Factor Authentication Server requires the following steps:
93
+
Installing the user portal on a server other than the Azure AD Multi-Factor Authentication Server requires the following steps:
95
94
96
95
1.**On the MFA Server**, browse to the installation path (Example: C:\Program Files\Multi-Factor Authentication Server), and copy the file **MultiFactorAuthenticationUserPortalSetup64** to a location accessible to the internet-facing server where you will install it.
97
96
2.**On the internet-facing web server**, run the MultiFactorAuthenticationUserPortalSetup64 install file as an administrator, change the Site if desired and change the Virtual directory to a short name if you would like.
@@ -113,11 +112,11 @@ Installing the user portal on a server other than the Azure Multi-Factor Authent
113
112
114
113
If you have questions about configuring a TLS/SSL Certificate on an IIS server, see the article [How to Set Up SSL on IIS](/iis/manage/configuring-security/how-to-set-up-ssl-on-iis).
115
114
116
-
## Configure user portal settings in the Azure Multi-Factor Authentication Server
115
+
## Configure user portal settings in the Azure AD Multi-Factor Authentication Server
117
116
118
-
Now that the user portal is installed, you need to configure the Azure Multi-Factor Authentication Server to work with the portal.
117
+
Now that the user portal is installed, you need to configure the Azure AD Multi-Factor Authentication Server to work with the portal.
119
118
120
-
1. In the Azure Multi-Factor Authentication Server console, click the **User Portal** icon. On the Settings tab, enter the URL to the user portal in the **User Portal URL** textbox. If email functionality has been enabled, this URL is included in the emails that are sent to users when they are imported into the Azure Multi-Factor Authentication Server.
119
+
1. In the Azure AD Multi-Factor Authentication Server console, click the **User Portal** icon. On the Settings tab, enter the URL to the user portal in the **User Portal URL** textbox. If email functionality has been enabled, this URL is included in the emails that are sent to users when they are imported into the Azure AD Multi-Factor Authentication Server.
121
120
2. Choose the settings that you want to use in the User Portal. For example, if users are allowed to choose their authentication methods, ensure that **Allow users to select method** is checked, along with the methods they can choose from.
122
121
3. Define who should be Administrators on the **Administrators** tab. You can create granular administrative permissions using the checkboxes and dropdowns in the Add/Edit boxes.
123
122
@@ -129,7 +128,7 @@ Optional configuration:
129
128
130
129

131
130
132
-
Azure Multi-Factor Authentication server provides several options for the user portal. The following table provides a list of these options and an explanation of what they are used for.
131
+
Azure AD Multi-Factor Authentication server provides several options for the user portal. The following table provides a list of these options and an explanation of what they are used for.
133
132
134
133
| User Portal Settings | Description |
135
134
|:--- |:--- |
@@ -157,15 +156,15 @@ These settings become visible to the user in the portal once they are enabled an
157
156
158
157
If you want your users to sign in and enroll, you must select the **Allow users to log in** and **Allow user enrollment** options under the Settings tab. Remember that the settings you select affect the user sign-in experience.
159
158
160
-
For example, when a user signs in to the user portal for the first time, they are then taken to the Azure Multi-Factor Authentication User Setup page. Depending on how you have configured Azure Multi-Factor Authentication, the user may be able to select their authentication method.
159
+
For example, when a user signs in to the user portal for the first time, they are then taken to the Azure AD Multi-Factor Authentication User Setup page. Depending on how you have configured Azure AD Multi-Factor Authentication, the user may be able to select their authentication method.
161
160
162
161
If they select the Voice Call verification method or have been pre-configured to use that method, the page prompts the user to enter their primary phone number and extension if applicable. They may also be allowed to enter a backup phone number.
163
162
164
163

165
164
166
-
If the user is required to use a PIN when they authenticate, the page prompts them to create a PIN. After entering their phone number(s) and PIN (if applicable), the user clicks the **Call Me Now to Authenticate** button. Azure Multi-Factor Authentication performs a phone call verification to the user's primary phone number. The user must answer the phone call and enter their PIN (if applicable) and press # to move on to the next step of the self-enrollment process.
165
+
If the user is required to use a PIN when they authenticate, the page prompts them to create a PIN. After entering their phone number(s) and PIN (if applicable), the user clicks the **Call Me Now to Authenticate** button. Azure AD Multi-Factor Authentication performs a phone call verification to the user's primary phone number. The user must answer the phone call and enter their PIN (if applicable) and press # to move on to the next step of the self-enrollment process.
167
166
168
-
If the user selects the Text Message verification method or has been pre-configured to use that method, the page prompts the user for their mobile phone number. If the user is required to use a PIN when they authenticate, the page also prompts them to enter a PIN. After entering their phone number and PIN (if applicable), the user clicks the **Text Me Now to Authenticate** button. Azure Multi-Factor Authentication performs an SMS verification to the user's mobile phone. The user receives the text message with a one-time-passcode (OTP), then replies to the message with that OTP plus their PIN (if applicable).
167
+
If the user selects the Text Message verification method or has been pre-configured to use that method, the page prompts the user for their mobile phone number. If the user is required to use a PIN when they authenticate, the page also prompts them to enter a PIN. After entering their phone number and PIN (if applicable), the user clicks the **Text Me Now to Authenticate** button. Azure AD Multi-Factor Authentication performs an SMS verification to the user's mobile phone. The user receives the text message with a one-time-passcode (OTP), then replies to the message with that OTP plus their PIN (if applicable).
169
168
170
169

171
170
@@ -176,14 +175,14 @@ If the user selects the Mobile App verification method, the page prompts the use
176
175
177
176
The page then displays an activation code and a URL along with a barcode picture. If the user is required to use a PIN when they authenticate, the page additionally prompts them to enter a PIN. The user enters the activation code and URL into the Microsoft Authenticator app or uses the barcode scanner to scan the barcode picture and clicks the Activate button.
178
177
179
-
After the activation is complete, the user clicks the **Authenticate Me Now** button. Azure Multi-Factor Authentication performs a verification to the user's mobile app. The user must enter their PIN (if applicable) and press the Authenticate button in their mobile app to move on to the next step of the self-enrollment process.
178
+
After the activation is complete, the user clicks the **Authenticate Me Now** button. Azure AD Multi-Factor Authentication performs a verification to the user's mobile app. The user must enter their PIN (if applicable) and press the Authenticate button in their mobile app to move on to the next step of the self-enrollment process.
180
179
181
-
If the administrators have configured the Azure Multi-Factor Authentication Server to collect security questions and answers, the user is then taken to the Security Questions page. The user must select four security questions and provide answers to their selected questions.
180
+
If the administrators have configured the Azure AD Multi-Factor Authentication Server to collect security questions and answers, the user is then taken to the Security Questions page. The user must select four security questions and provide answers to their selected questions.
The user self-enrollment is now complete and the user is signed in to the user portal. Users can sign back in to the user portal at any time in the future to change their phone numbers, PINs, authentication methods, and security questions if changing their methods is allowed by their administrators.
186
185
187
186
## Next steps
188
187
189
-
-[Deploy the Azure Multi-Factor Authentication Server Mobile App Web Service](howto-mfaserver-deploy-mobileapp.md)
188
+
-[Deploy the Azure AD Multi-Factor Authentication Server Mobile App Web Service](howto-mfaserver-deploy-mobileapp.md)
0 commit comments