You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
25
25
| Microsoft One Note | ● ||
26
26
| Microsoft Teams | ● | ● |
27
27
| Company portal | ● | ● |
28
-
| My Apps Portal| ● |Not available|
28
+
| My Apps portal| ● |Not available|
29
29
| Microsoft Forms | ● |Not available|
30
30
| Microsoft Edge | ● ||
31
31
| Microsoft Power BI | ● ||
@@ -36,17 +36,17 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
36
36
37
37
*_SMS sign-in isn't available for office applications, such as Word, Excel, etc., when accessed directly on the web, but is available when accessed through the [Office 365 web app](https://www.office.com)_
38
38
39
-
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows user to enter phone number and SMS code.
39
+
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows users to enter phone number and SMS code.
40
40
41
41
## Unsupported Microsoft apps
42
42
43
43
Microsoft 365 desktop (Windows or Mac) apps and Microsoft 365 web apps (except MS One Note) that are accessed directly on the web don't support SMS sign-in. These apps use the Microsoft Office login (`https://office.live.com/start/*`) that requires a password to sign in.
44
-
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company Portal, and Microsoft Azure) don't support SMS sign-in.
44
+
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company portal, and Microsoft Azure) don't support SMS sign-in.
45
45
46
46
| Unsupported Microsoft apps| Examples |
47
47
| --- | --- |
48
48
| Native desktop Microsoft apps | Microsoft Teams, O365 apps, Word, Excel, etc.|
49
-
| Native mobile Microsoft apps (except Microsoft Teams, Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
49
+
| Native mobile Microsoft apps (except Microsoft Teams, Company portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
50
50
| Microsoft 365 web apps (accessed directly on web) |[Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx)|
# How to run a registration campaign to set up Microsoft Authenticator - Microsoft Authenticator
21
21
22
-
You can nudge users to set up Microsoft Authenticator during sign-in. Users will go through their regular sign-in, perform multifactor authentication as usual, and then be prompted to set up Microsoft Authenticator. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to the Authenticator app.
22
+
You can nudge users to set up Microsoft Authenticator during sign-in. Users go through their regular sign-in, perform multifactor authentication as usual, and then get prompted to set up Microsoft Authenticator. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to Authenticator.
23
23
24
-
In addition to choosing who can be nudged, you can define how many days a user can postpone, or "snooze", the nudge. If a user taps **Not now** to postpone the app setup, they'll be nudged again on the next MFA attempt after the snooze duration has elapsed. Users with free and trial subscriptions can postpone the app setup up to three times.
24
+
You can also define how many days a user can postpone, or "snooze," the nudge. If a user taps **Not now** to postpone the app setup, they get nudged again on the next MFA attempt after the snooze duration has elapsed. Users with free and trial subscriptions can postpone the app setup up to three times.
25
25
26
26
>[!NOTE]
27
27
>As users go through their regular sign-in, Conditional Access policies that govern security info registration apply before the user is prompted to set up Authenticator. For example, if a Conditional Access policy requires security info updates can only occur on an internal network, then users won't be prompted to set up Authenticator unless they are on the internal network.
28
28
29
29
## Prerequisites
30
30
31
-
- Your organization must have enabled Azure AD Multi-Factor Authentication. Every edition of Azure AD includes Azure AD Multi-Factor Authentication. No additional license is needed for a registration campaign.
31
+
- Your organization must have enabled Azure AD Multi-Factor Authentication. Every edition of Azure AD includes Azure AD Multi-Factor Authentication. No other license is needed for a registration campaign.
32
32
- Users can't have already set up the Authenticator app for push notifications on their account.
33
33
- Admins need to enable users for the Authenticator app using one of these policies:
34
34
- MFA Registration Policy: Users will need to be enabled for **Notification through mobile app**.
@@ -70,8 +70,10 @@ In addition to choosing who can be nudged, you can define how many days a user c
## Enable the registration campaign policy using the Microsoft Entra admin center
74
75
76
+
75
77
To enable a registration campaign in the Microsoft Entra admin center, complete the following steps:
76
78
77
79
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
@@ -132,7 +134,7 @@ Here are a few sample JSONs you can use to get started!
132
134
133
135
- Include all users
134
136
135
-
If you want to include ALL users in your tenant simply[download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/All%20Users%20Enabled.json) and paste it in Graph Explorer and run `PATCH` on the endpoint.
137
+
If you want to include ALL users in your tenant,[download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/All%20Users%20Enabled.json) and paste it in Graph Explorer and run `PATCH` on the endpoint.
136
138
137
139
```json
138
140
{
@@ -219,8 +221,7 @@ Here are a few sample JSONs you can use to get started!
219
221
220
222
### Identify the GUIDs of users to insert in the JSONs
221
223
222
-
1. Navigate to the Azure portal.
223
-
1. Tap **Azure Active Directory**.
224
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
224
225
1. In the **Manage** blade, tap **Users**.
225
226
1. In the **Users** page, identify the specific user you want to target.
226
227
1. When you tap the specific user, you’ll see their **Object ID**, which is the user’s GUID.
@@ -229,8 +230,7 @@ Here are a few sample JSONs you can use to get started!
229
230
230
231
### Identify the GUIDs of groups to insert in the JSONs
231
232
232
-
1. Navigate to the Azure portal.
233
-
1. Tap **Azure Active Directory**.
233
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
234
234
1. In the **Manage** blade, tap **Groups**.
235
235
1. In the **Groups** page, identify the specific group you want to target.
236
236
1. Tap the group and get the **Object ID**.
@@ -271,9 +271,9 @@ Nudge is available only on browsers and not on applications.
271
271
272
272
Nudge is not available on mobile devices.
273
273
274
-
**How long will the campaign run for?**
274
+
**How long does the campaign run for?**
275
275
276
-
You can use the APIs to enable the campaign for as long as you like. Whenever you want to be done running the campaign, simply use the APIs to disable the campaign.
276
+
You can enable the campaign for as long as you like. Whenever you want to be done running the campaign, use the admin center or APIs to disable the campaign.
277
277
278
278
**Can each group of users have a different snooze duration?**
279
279
@@ -291,7 +291,7 @@ If this user doesn’t have the Authenticator app set up for push notifications
291
291
292
292
Yes. If the Authenticator app is not set up for push notifications and the user is enabled for it by policy, yes, the user will see the nudge.
293
293
294
-
**If a user just went through MFA registration, will they be nudged in the same sign-in session?**
294
+
**If a user just went through MFA registration, are they nudged in the same sign-in session?**
295
295
296
296
No. To provide a good user experience, users won't be nudged to set up the Authenticator in the same session that they registered other authentication methods.
297
297
@@ -301,11 +301,11 @@ No. The feature, for now, aims to nudge users to set up the Authenticator app on
301
301
302
302
**Is there a way for me to hide the snooze option and force my users to setup the Authenticator app?**
303
303
304
-
Users in organizations with free and trial subscriptions can postpone the app setup up to three times. There is no way to hide the snooze option on the nudge for organizations with paid subscriptions yet. You can set the snoozeDuration to 0, which will ensure that users will see the nudge during each MFA attempt.
304
+
Users in organizations with free and trial subscriptions can postpone the app setup up to three times. There is no way to hide the snooze option on the nudge for organizations with paid subscriptions yet. You can set the snoozeDuration to 0, which ensures that users see the nudge during each MFA attempt.
305
305
306
306
**Will I be able to nudge my users if I am not using Azure AD Multi-Factor Authentication?**
307
307
308
-
No. The nudge will only work for users who are doing MFA using the Azure AD Multi-Factor Authentication service.
308
+
No. The nudge only works for users who are doing MFA using the Azure AD Multi-Factor Authentication service.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -271,7 +271,7 @@ For information about compliant security keys, see [FIDO2 security keys](concept
271
271
272
272
### What can I do if I lose my security key?
273
273
274
-
To delete an enrolled security key, sign in to the [Azure portal](https://portal.azure.com), and then go to the **Security info** page.
274
+
To delete an enrolled security key, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com), and then go to the **Security info** page.
275
275
276
276
### What can I do if I'm unable to use the FIDO security key immediately after I create a hybrid Azure AD-joined machine?
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-sms-signin.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,9 +59,8 @@ There are three main steps to enable and use SMS-based authentication in your or
59
59
60
60
First, let's enable SMS-based authentication for your Azure AD tenant.
61
61
62
-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
63
-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
64
-
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
62
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
63
+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
65
64
1. From the list of available authentication methods, select **SMS**.
66
65
67
66

Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-temporary-access-pass.md
+7-10Lines changed: 7 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 06/14/2023
9
+
ms.date: 09/23/2023
10
10
11
11
ms.author: justinha
12
12
author: tilarso
@@ -27,7 +27,7 @@ A Temporary Access Pass is a time-limited passcode that can be configured for si
27
27
28
28
A Temporary Access Pass also makes recovery easier when a user has lost or forgotten their strong authentication factor like a FIDO2 security key or Microsoft Authenticator app, but needs to sign in to register new strong authentication methods.
29
29
30
-
This article shows you how to enable and use a Temporary Access Pass in Azure AD using the Azure portal.
30
+
This article shows you how to enable and use a Temporary Access Pass in Azure AD using the the [Microsoft Entra admin center](https://entra.microsoft.com).
31
31
You can also perform these actions using the REST APIs.
32
32
33
33
## Enable the Temporary Access Pass policy
@@ -39,9 +39,8 @@ Although you can create a Temporary Access Pass for any user, only users include
39
39
Global administrator and Authentication Policy administrator role holders can update the Temporary Access Pass authentication method policy.
40
40
To configure the Temporary Access Pass authentication method policy:
41
41
42
-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
43
-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
44
-
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
42
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
43
+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
45
44
1. From the list of available authentication methods, select **Temporary Access Pass**.
46
45
47
46
:::image type="content" border="true" source="./media/how-to-authentication-temporary-access-pass/select-temporary-access-pass-policy.png" alt-text="Screenshot of how to manage Temporary Access Pass within the authentication method policy experience.":::
@@ -76,11 +75,9 @@ These roles can perform the following actions related to a Temporary Access Pass
76
75
- Authentication Administrators can create, delete, and view a Temporary Access Pass on members (except themselves)
77
76
- Global Reader can view the Temporary Access Pass details on the user (without reading the code itself).
78
77
79
-
1. Sign in to the [Azure portal](https://portal.azure.com) by using one of the preceding roles.
80
-
1. Select **Azure Active Directory**, browse to Users, select a user, such as *Chris Green*, then choose **Authentication methods**.
81
-
1. If needed, select the option to **Try the new user authentication methods experience**.
82
-
1. Select the option to **Add authentication methods**.
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
79
+
1. Browse to **Protection** > **Authentication methods**.
80
+
1. Select **Temporary Access Pass**.
84
81
1. Define a custom activation time or duration and select **Add**.
85
82
86
83

0 commit comments