Skip to content

Commit a7f9dcb

Browse files
Merge pull request #229638 from Justinha/combined
edits from Tim
2 parents b0806de + 91f2070 commit a7f9dcb

File tree

3 files changed

+22
-18
lines changed

3 files changed

+22
-18
lines changed

articles/active-directory/authentication/concept-password-ban-bad-combined-policy.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,19 +6,19 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/29/2023
9+
ms.date: 03/06/2023
1010

1111
ms.author: justinha
12-
author: sajiang
12+
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: sajiang
14+
ms.reviewer: tilarso
1515

1616
ms.collection: M365-identity-device-management
1717
---
1818
# Combined password policy and check for weak passwords in Azure Active Directory
1919

2020
Beginning in October 2021, Azure Active Directory (Azure AD) validation for compliance with password policies also includes a check for [known weak passwords](concept-password-ban-bad.md) and their variants.
21-
As the combined check for password policy and banned passwords gets rolled out to tenants, Azure AD and Office 365 admin center users may see differences when they create, change, or reset their passwords. This topic explains details about the password policy criteria checked by Azure AD.
21+
This topic explains details about the password policy criteria checked by Azure AD.
2222

2323
## Azure AD password policies
2424

@@ -34,12 +34,12 @@ The following Azure AD password policy requirements apply for all passwords that
3434
| Characters not allowed | Unicode characters |
3535
| Password length |Passwords require<br>- A minimum of eight characters<br>- A maximum of 256 characters</li> |
3636
| Password complexity |Passwords require three out of four of the following categories:<br>- Uppercase characters<br>- Lowercase characters<br>- Numbers <br>- Symbols<br> Note: Password complexity check isn't required for Education tenants. |
37-
| Password not recently used | When a user changes or resets their password, the new password can't be the same as the current or recently used passwords. |
37+
| Password not recently used | When a user changes their password, the new password can't be the same as the current or recently used passwords. |
3838
| Password isn't banned by [Azure AD Password Protection](concept-password-ban-bad.md) | The password can't be on the global list of banned passwords for Azure AD Password Protection, or on the customizable list of banned passwords specific to your organization. |
3939

4040
## Password expiration policies
4141

42-
Password expiration policies are unchanged but they're included in this topic for completeness. A *global administrator* or *user administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
42+
Password expiration policies are unchanged but they're included in this topic for completeness. A *Global Administrator* or *User Administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
4343

4444
> [!NOTE]
4545
> By default, only passwords for user accounts that aren't synchronized through Azure AD Connect can be configured to not expire. For more information about directory synchronization, see [Connect AD with Azure AD](../hybrid/how-to-connect-password-hash-synchronization.md#password-expiration-policy).

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/29/2023
9+
ms.date: 03/06/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -66,7 +66,7 @@ Combined registration supports the authentication methods and actions in the fol
6666
> [!NOTE]
6767
> <b>Alternate phone</b> can only be registered in *manage mode* on the [Security info](https://mysignins.microsoft.com/security-info) page and requires Voice calls to be enabled in the Authentication methods policy. <br />
6868
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
69-
> <b>App passwords</b> are available only to users who have been enforced for per-user MFA. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
69+
> <b>App passwords</b> are available only to users who have been enforced for per-user MFA. App passwords aren't available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
7070
> <b>FIDO2 security keys</b>, can only be added in *manage mode only* on the [Security info](https://mysignins.microsoft.com/security-info) page.
7171
7272
Users can set one of the following options as the default multifactor authentication method.
@@ -77,9 +77,9 @@ Users can set one of the following options as the default multifactor authentica
7777
- Text message
7878

7979
>[!NOTE]
80-
>Virtual phone numbers are not supported for Voice calls or SMS messages.
80+
>Virtual phone numbers aren't supported for Voice calls or SMS messages.
8181
82-
Third party authenticator apps do not provide push notification. As we continue to add more authentication methods to Azure AD, those methods become available in combined registration.
82+
Third party authenticator apps don't provide push notification. As we continue to add more authentication methods to Azure AD, those methods become available in combined registration.
8383

8484
## Combined registration modes
8585

@@ -98,28 +98,32 @@ Combined registration adheres to both multifactor authentication and SSPR polici
9898

9999
The following are sample scenarios where users might be prompted to register or refresh their security info:
100100

101-
- *Multifactor Authentication registration enforced through Identity Protection:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
102-
- *Multifactor Authentication registration enforced through per-user multifactor authentication:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
103-
- *Multifactor Authentication registration enforced through Conditional Access or other policies:* Users are asked to register when they use a resource that requires multifactor authentication. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
101+
- *Multifactor authentication registration enforced through Identity Protection:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
102+
- *Multifactor authentication registration enforced through per-user multifactor authentication:* Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
103+
- *Multifactor authentication registration enforced through Conditional Access or other policies:* Users are asked to register when they use a resource that requires multifactor authentication. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
104104
- *SSPR registration enforced:* Users are asked to register during sign-in. They register only SSPR methods.
105105
- *SSPR refresh enforced:* Users are required to review their security info at an interval set by the admin. Users are shown their info and can confirm the current info or make changes if needed.
106106

107-
When registration is enforced, users are shown the minimum number of methods needed to be compliant with both multifactor authentication and SSPR policies, from most to least secure. Users going through combined registration where both MFA and SSPR registration is enforced and the SSPR policy requires two methods will first be required to register an MFA method as the first method and can select another MFA or SSPR specific method as the second registered method (e.g. email, security questions etc.)
107+
When registration is enforced, users are shown the minimum number of methods needed to be compliant with both multifactor authentication and SSPR policies, from most to least secure. Users going through combined registration where both MFA and SSPR registration are enforced and the SSPR policy requires two methods will first be required to register an MFA method as the first method and can select another MFA or SSPR specific method as the second registered method (e.g. email, security questions etc.)
108108

109109
Consider the following example scenario:
110110

111-
- A user is enabled for SSPR. The SSPR policy requires two methods to reset and has enabled Authenticator app, email, and phone.
111+
- A user is enabled for SSPR. The SSPR policy requires two methods to reset and has enabled Microsoft Authenticator app, email, and phone.
112112
- When the user chooses to register, two methods are required:
113-
- The user is shown Authenticator app and phone by default.
113+
- The user is shown Microsoft Authenticator app and phone by default.
114114
- The user can choose to register email instead of Authenticator app or phone.
115115

116+
When they set up Microsoft Authenticator, the user can click **I want to setup a different method** to register other authentication methods. The list of available methods is determined by the Authentication methods policy for the tenant. 
117+
118+
:::image type="content" border="true" source="media/concept-registration-mfa-sspr-combined/choose.png" alt-text="Screenshot of how to choose another method when you set up Microsoft Authenticator.":::
119+
116120
The following flowchart describes which methods are shown to a user when interrupted to register during sign-in:
117121

118122
![Combined security info flowchart](media/concept-registration-mfa-sspr-combined/combined-security-info-flow-chart.png)
119123

120124
If you have both multifactor authentication and SSPR enabled, we recommend that you enforce multifactor authentication registration.
121125

122-
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up to date, or they can make changes if they need to. Users must perform multi-factor authentication when accessing this page.
126+
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up to date, or they can make changes if they need to. Users must perform multifactor authentication to access this page.
123127

124128
### Manage mode
125129

@@ -135,7 +139,7 @@ A user has not set up all required security info and goes to the Azure portal. A
135139

136140
### Set up security info from My Account
137141

138-
An admin has not enforced registration.
142+
An admin hasn't enforced registration.
139143

140144
A user who hasn't yet set up all required security info goes to [https://myaccount.microsoft.com](https://myaccount.microsoft.com). The user selects **Security info** in the left pane. From there, the user chooses to add a method, selects any of the methods available, and follows the steps to set up that method. When finished, the user sees the method that was set up on the Security info page.
141145

84 KB
Loading

0 commit comments

Comments
 (0)