Skip to content

Commit a4a10d4

Browse files
authored
Merge pull request #217588 from MicrosoftDocs/main
11/08 AM Publish
2 parents 1973617 + ad003fc commit a4a10d4

File tree

109 files changed

+964
-300
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

109 files changed

+964
-300
lines changed

articles/active-directory/authentication/howto-mfa-app-passwords.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/01/2022
9+
ms.date: 11/08/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ Modern authentication is supported for the Microsoft Office 2013 clients and lat
2424
This article shows you how to use app passwords for legacy applications that don't support multi-factor authentication prompts.
2525

2626
>[!NOTE]
27-
> App passwords don't work with Conditional Access based multi-factor authentication policies and modern authentication. App passwords only work with legacy authentication protocols such as IMAP and SMTP.
27+
>App passwords don't work for accounts that are required to use modern authentication.
2828
2929
## Overview and considerations
3030

articles/active-directory/external-identities/b2b-tutorial-require-mfa.md

Lines changed: 30 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,20 @@ ms.date: 01/07/2022
1111
ms.author: mimart
1212
author: msmimart
1313
manager: CelesteDG
14-
ms.custom: "it-pro, seo-update-azuread-jan"
14+
ms.custom: "engagement-fy23, it-pro, seo-update-azuread-jan"
1515
ms.collection: M365-identity-device-management
16+
17+
# Customer intent: As a tenant administrator, I want to set up MFA requirement for B2B guest users to protect my apps and resources.
1618
---
1719

1820
# Tutorial: Enforce multi-factor authentication for B2B guest users
1921

20-
When collaborating with external B2B guest users, it’s a good idea to protect your apps with multi-factor authentication (MFA) policies. Then external users will need more than just a user name and password to access your resources. In Azure Active Directory (Azure AD), you can accomplish this goal with a Conditional Access policy that requires MFA for access. MFA policies can be enforced at the tenant, app, or individual guest user level, the same way that they are enabled for members of your own organization. The resource tenant is always responsible for Azure AD Multi-Factor Authentication for users, even if the guest user’s organization has Multi-Factor Authentication capabilities.
22+
When collaborating with external B2B guest users, it’s a good idea to protect your apps with multi-factor authentication (MFA) policies. Then external users will need more than just a user name and password to access your resources. In Azure Active Directory (Azure AD), you can accomplish this goal with a Conditional Access policy that requires MFA for access. MFA policies can be enforced at the tenant, app, or individual guest user level, the same way that they're enabled for members of your own organization. The resource tenant is always responsible for Azure AD Multi-Factor Authentication for users, even if the guest user’s organization has Multi-Factor Authentication capabilities.
2123

2224
Example:
2325

24-
![Diagram showing a guest user signing into a company's apps](media/tutorial-mfa/aad-b2b-mfa-example.png)
26+
:::image type="content" source="media/tutorial-mfa/aad-b2b-mfa-example.png" alt-text="Diagram showing a guest user signing into a company's apps.":::
27+
2528

2629
1. An admin or employee at Company A invites a guest user to use a cloud or on-premises application that is configured to require MFA for access.
2730
1. The guest user signs in with their own work, school, or social identity.
@@ -34,6 +37,7 @@ Example:
3437
In this tutorial, you will:
3538

3639
> [!div class="checklist"]
40+
>
3741
> - Test the sign-in experience before MFA setup.
3842
> - Create a Conditional Access policy that requires MFA for access to a cloud app in your environment. In this tutorial, we’ll use the Microsoft Azure Management app to illustrate the process.
3943
> - Use the What If tool to simulate MFA sign-in.
@@ -46,29 +50,29 @@ If you don’t have an Azure subscription, create a [free account](https://azure
4650

4751
To complete the scenario in this tutorial, you need:
4852

49-
- **Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. Note that MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities.
53+
- **Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities.
5054
- **A valid external email account** that you can add to your tenant directory as a guest user and use to sign in. If you don't know how to create a guest account, see [Add a B2B guest user in the Azure portal](add-users-administrator.md).
5155

5256
## Create a test guest user in Azure AD
5357

5458
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD administrator.
5559
1. In the Azure portal, select **Azure Active Directory**.
5660
1. In the left menu, under **Manage**, select **Users**.
57-
1. Select **New guest user**.
61+
1. Select **New user**, and then select **Invite external user**.
5862

59-
![Screenshot showing where to select the New guest user option](media/tutorial-mfa/tutorial-mfa-user-3.png)
63+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-new-user.png" alt-text="Screenshot showing where to select the new guest user option.":::
6064

6165
1. Under **Identity**, enter the email address of the external user. Optionally, include a name and welcome message.
6266

63-
![Screenshot showing where to enter the guest invitation message](media/tutorial-mfa/tutorial-mfa-user-4.png)
67+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-new-user-identity.png" alt-text="Screenshot showing where to enter the guest email.":::
6468

6569
1. Select **Invite** to automatically send the invitation to the guest user. A **Successfully invited user** message appears.
6670
1. After you send the invitation, the user account is automatically added to the directory as a guest.
6771

6872
## Test the sign-in experience before MFA setup
6973

7074
1. Use your test user name and password to sign in to your [Azure portal](https://portal.azure.com/).
71-
1. Note that you’re able to access the Azure portal using just your sign-in credentials. No additional authentication is required.
75+
1. You should be able to access the Azure portal using only your sign-in credentials. No other authentication is required.
7276
1. Sign out.
7377

7478
## Create a Conditional Access policy that requires MFA
@@ -80,56 +84,55 @@ To complete the scenario in this tutorial, you need:
8084
1. On the **Conditional Access** page, in the toolbar on the top, select **New policy**.
8185
1. On the **New** page, in the **Name** textbox, type **Require MFA for B2B portal access**.
8286
1. In the **Assignments** section, choose the link under **Users and groups**.
83-
1. On the **Users and groups** page, choose **Select users and groups**, and then choose **All guest and external users**.
87+
1. On the **Users and groups** page, choose **Select users and groups**, and then choose **Guest or external users**. You can assign the policy to different [external user types](authentication-conditional-access.md#assigning-conditional-access-policies-to-external-user-types-preview), built-in [directory roles](../conditional-access/concept-conditional-access-users-groups.md#include-users), or users and groups.
88+
89+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-user-access.png" alt-text="Screenshot showing selecting all guest users.":::
8490

85-
![Screenshot showing selecting all guest users](media/tutorial-mfa/tutorial-mfa-policy-6.png)
8691
1. In the **Assignments** section, choose the link under **Cloud apps or actions**.
8792
1. Choose **Select apps**, and then choose the link under **Select**.
8893

89-
![Screenshot showing the Cloud apps page and the Select option](media/tutorial-mfa/tutorial-mfa-policy-10.png)
94+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-app-access.png" alt-text="Screenshot showing the Cloud apps page and the Select option." lightbox="media/tutorial-mfa/tutorial-mfa-app-access.png":::
9095

91-
1. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
96+
1. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
9297

93-
![Screenshot that highlights the Microsoft Azure Management option.](media/tutorial-mfa/tutorial-mfa-policy-11.png)
98+
1. On the **New** page, in the **Access controls** section, choose the link under **Grant**.
99+
1. On the **Grant** page, choose **Grant access**, select the **Require multi-factor authentication** check box, and then choose **Select**.
94100

95-
1. On the **New** page, in the **Access controls** section, choose the link under **Grant**.
96-
1. On the **Grant** page, choose **Grant access**, select the **Require multi-factor authentication** check box, and then choose **Select**.
101+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-grant-access.png" alt-text="Screenshot showing the Require multi-factor authentication option.":::
97102

98-
![Screenshot showing the Require multi-factor authentication option](media/tutorial-mfa/tutorial-mfa-policy-13.png)
99103

100-
1. Under **Enable policy**, select **On**.
104+
1. Under **Enable policy**, select **On**.
101105

102-
![Screenshot showing the Enable policy option set to On](media/tutorial-mfa/tutorial-mfa-policy-14.png)
106+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-enable-policy.png" alt-text="Screenshot showing the Enable policy option set to On.":::
103107

104-
1. Select **Create**.
108+
1. Select **Create**.
105109

106110
## Use the What If option to simulate sign-in
107111

108112
1. On the **Conditional Access | Policies** page, select **What If**.
109113

110-
![Screenshot that highlights where to select the What if option on the Conditional Access - Policies page.](media/tutorial-mfa/tutorial-mfa-whatif-1.png)
114+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-what-if.png" alt-text="Screenshot that highlights where to select the What if option on the Conditional Access - Policies page.":::
111115

112116
1. Select the link under **User**.
113117
1. In the search box, type the name of your test guest user. Choose the user in the search results, and then choose **Select**.
114118

115-
![Screenshot showing a guest user selected](media/tutorial-mfa/tutorial-mfa-whatif-2.png)
119+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-what-if-user.png" alt-text="Screenshot showing a guest user selected.":::
116120

117-
1. Select the link under **Cloud apps, actions, or authentication content**.
118-
. Choose **Select apps**, and then choose the link under **Select**.
121+
1. Select the link under **Cloud apps, actions, or authentication content**. Choose **Select apps**, and then choose the link under **Select**.
119122

120-
![Screenshot showing the Microsoft Azure Management app selected](media/tutorial-mfa/tutorial-mfa-whatif-3.png)
123+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-what-if-app.png" alt-text="Screenshot showing the Microsoft Azure Management app selected." lightbox="media/tutorial-mfa/tutorial-mfa-what-if-app.png":::
121124

122125
1. On the **Cloud apps** page, in the applications list, choose **Microsoft Azure Management**, and then choose **Select**.
123126
1. Choose **What If**, and verify that your new policy appears under **Evaluation results** on the **Policies that will apply** tab.
124127

125-
![Screenshot showing where to select the What if option](media/tutorial-mfa/tutorial-mfa-whatif-4.png)
128+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-whatif-4.png" alt-text="Screenshot showing the results of the What If evaluation.":::
126129

127130
## Test your Conditional Access policy
128131

129132
1. Use your test user name and password to sign in to your [Azure portal](https://portal.azure.com/).
130-
1. You should see a request for additional authentication methods. Note that it could take some time for the policy to take effect.
133+
1. You should see a request for additional authentication methods. It can take some time for the policy to take effect.
131134

132-
![Screenshot showing the More information required message](media/tutorial-mfa/mfa-required.png)
135+
:::image type="content" source="media/tutorial-mfa/mfa-required.PNG" alt-text="Screenshot showing the More information required message.":::
133136

134137
> [!NOTE]
135138
> You also can configure [cross-tenant access settings](cross-tenant-access-overview.md) to trust the MFA from the Azure AD home tenant. This allows external Azure AD users to use the MFA registered in their own tenant rather than register in the resource tenant.
7.08 KB
Loading
23.2 KB
Loading
60 KB
Loading
10.4 KB
Loading
24.7 KB
Loading
34 KB
Loading
84.7 KB
Loading
33 KB
Loading

0 commit comments

Comments
 (0)