Skip to content

Commit a880913

Browse files
Merge pull request #251365 from Justinha/steps-auth-2
revised portal steps
2 parents 770ffe4 + efd80d5 commit a880913

5 files changed

+27
-31
lines changed

articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
2525
| Microsoft One Note || |
2626
| Microsoft Teams |||
2727
| Company portal |||
28-
| My Apps Portal ||Not available|
28+
| My Apps portal ||Not available|
2929
| Microsoft Forms ||Not available|
3030
| Microsoft Edge || |
3131
| Microsoft Power BI || |
@@ -36,17 +36,17 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
3636

3737
*_SMS sign-in isn't available for office applications, such as Word, Excel, etc., when accessed directly on the web, but is available when accessed through the [Office 365 web app](https://www.office.com)_
3838

39-
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows user to enter phone number and SMS code.
39+
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows users to enter phone number and SMS code.
4040

4141
## Unsupported Microsoft apps
4242

4343
Microsoft 365 desktop (Windows or Mac) apps and Microsoft 365 web apps (except MS One Note) that are accessed directly on the web don't support SMS sign-in. These apps use the Microsoft Office login (`https://office.live.com/start/*`) that requires a password to sign in.
44-
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company Portal, and Microsoft Azure) don't support SMS sign-in.
44+
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company portal, and Microsoft Azure) don't support SMS sign-in.
4545

4646
| Unsupported Microsoft apps| Examples |
4747
| --- | --- |
4848
| Native desktop Microsoft apps | Microsoft Teams, O365 apps, Word, Excel, etc.|
49-
| Native mobile Microsoft apps (except Microsoft Teams, Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
49+
| Native mobile Microsoft apps (except Microsoft Teams, Company portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
5050
| Microsoft 365 web apps (accessed directly on web) | [Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx)|
5151

5252
## Support for Non-Microsoft apps

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,16 +19,16 @@ ms.collection: M365-identity-device-management
1919

2020
# How to run a registration campaign to set up Microsoft Authenticator - Microsoft Authenticator
2121

22-
You can nudge users to set up Microsoft Authenticator during sign-in. Users will go through their regular sign-in, perform multifactor authentication as usual, and then be prompted to set up Microsoft Authenticator. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to the Authenticator app.
22+
You can nudge users to set up Microsoft Authenticator during sign-in. Users go through their regular sign-in, perform multifactor authentication as usual, and then get prompted to set up Microsoft Authenticator. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to Authenticator.
2323

24-
In addition to choosing who can be nudged, you can define how many days a user can postpone, or "snooze", the nudge. If a user taps **Not now** to postpone the app setup, they'll be nudged again on the next MFA attempt after the snooze duration has elapsed. Users with free and trial subscriptions can postpone the app setup up to three times.
24+
You can also define how many days a user can postpone, or "snooze," the nudge. If a user taps **Not now** to postpone the app setup, they get nudged again on the next MFA attempt after the snooze duration has elapsed. Users with free and trial subscriptions can postpone the app setup up to three times.
2525

2626
>[!NOTE]
2727
>As users go through their regular sign-in, Conditional Access policies that govern security info registration apply before the user is prompted to set up Authenticator. For example, if a Conditional Access policy requires security info updates can only occur on an internal network, then users won't be prompted to set up Authenticator unless they are on the internal network.
2828
2929
## Prerequisites
3030

31-
- Your organization must have enabled Azure AD Multi-Factor Authentication. Every edition of Azure AD includes Azure AD Multi-Factor Authentication. No additional license is needed for a registration campaign.
31+
- Your organization must have enabled Azure AD Multi-Factor Authentication. Every edition of Azure AD includes Azure AD Multi-Factor Authentication. No other license is needed for a registration campaign.
3232
- Users can't have already set up the Authenticator app for push notifications on their account.
3333
- Admins need to enable users for the Authenticator app using one of these policies:
3434
- MFA Registration Policy: Users will need to be enabled for **Notification through mobile app**.
@@ -70,8 +70,10 @@ In addition to choosing who can be nudged, you can define how many days a user c
7070

7171
![Snooze installation](./media/how-to-nudge-authenticator-app/snooze.png)
7272

73+
7374
## Enable the registration campaign policy using the Microsoft Entra admin center
7475

76+
7577
To enable a registration campaign in the Microsoft Entra admin center, complete the following steps:
7678

7779
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
@@ -132,7 +134,7 @@ Here are a few sample JSONs you can use to get started!
132134

133135
- Include all users
134136

135-
If you want to include ALL users in your tenant simply [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/All%20Users%20Enabled.json) and paste it in Graph Explorer and run `PATCH` on the endpoint.
137+
If you want to include ALL users in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/All%20Users%20Enabled.json) and paste it in Graph Explorer and run `PATCH` on the endpoint.
136138

137139
```json
138140
{
@@ -219,8 +221,7 @@ Here are a few sample JSONs you can use to get started!
219221

220222
### Identify the GUIDs of users to insert in the JSONs
221223

222-
1. Navigate to the Azure portal.
223-
1. Tap **Azure Active Directory**.
224+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
224225
1. In the **Manage** blade, tap **Users**.
225226
1. In the **Users** page, identify the specific user you want to target.
226227
1. When you tap the specific user, you’ll see their **Object ID**, which is the user’s GUID.
@@ -229,8 +230,7 @@ Here are a few sample JSONs you can use to get started!
229230

230231
### Identify the GUIDs of groups to insert in the JSONs
231232

232-
1. Navigate to the Azure portal.
233-
1. Tap **Azure Active Directory**.
233+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
234234
1. In the **Manage** blade, tap **Groups**.
235235
1. In the **Groups** page, identify the specific group you want to target.
236236
1. Tap the group and get the **Object ID**.
@@ -271,9 +271,9 @@ Nudge is available only on browsers and not on applications.
271271

272272
Nudge is not available on mobile devices.
273273

274-
**How long will the campaign run for?**
274+
**How long does the campaign run for?**
275275

276-
You can use the APIs to enable the campaign for as long as you like. Whenever you want to be done running the campaign, simply use the APIs to disable the campaign.
276+
You can enable the campaign for as long as you like. Whenever you want to be done running the campaign, use the admin center or APIs to disable the campaign.
277277

278278
**Can each group of users have a different snooze duration?**
279279

@@ -291,7 +291,7 @@ If this user doesn’t have the Authenticator app set up for push notifications
291291

292292
Yes. If the Authenticator app is not set up for push notifications and the user is enabled for it by policy, yes, the user will see the nudge.
293293

294-
**If a user just went through MFA registration, will they be nudged in the same sign-in session?**
294+
**If a user just went through MFA registration, are they nudged in the same sign-in session?**
295295

296296
No. To provide a good user experience, users won't be nudged to set up the Authenticator in the same session that they registered other authentication methods.
297297

@@ -301,11 +301,11 @@ No. The feature, for now, aims to nudge users to set up the Authenticator app on
301301

302302
**Is there a way for me to hide the snooze option and force my users to setup the Authenticator app?**
303303

304-
Users in organizations with free and trial subscriptions can postpone the app setup up to three times. There is no way to hide the snooze option on the nudge for organizations with paid subscriptions yet. You can set the snoozeDuration to 0, which will ensure that users will see the nudge during each MFA attempt.
304+
Users in organizations with free and trial subscriptions can postpone the app setup up to three times. There is no way to hide the snooze option on the nudge for organizations with paid subscriptions yet. You can set the snoozeDuration to 0, which ensures that users see the nudge during each MFA attempt.
305305

306306
**Will I be able to nudge my users if I am not using Azure AD Multi-Factor Authentication?**
307307

308-
No. The nudge will only work for users who are doing MFA using the Azure AD Multi-Factor Authentication service.
308+
No. The nudge only works for users who are doing MFA using the Azure AD Multi-Factor Authentication service.
309309

310310
**Will Guest/B2B users in my tenant be nudged?**
311311

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ For information about compliant security keys, see [FIDO2 security keys](concept
271271

272272
### What can I do if I lose my security key?
273273

274-
To delete an enrolled security key, sign in to the [Azure portal](https://portal.azure.com), and then go to the **Security info** page.
274+
To delete an enrolled security key, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com), and then go to the **Security info** page.
275275

276276
### What can I do if I'm unable to use the FIDO security key immediately after I create a hybrid Azure AD-joined machine?
277277

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,8 @@ There are three main steps to enable and use SMS-based authentication in your or
5959

6060
First, let's enable SMS-based authentication for your Azure AD tenant.
6161

62-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
63-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
64-
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
62+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
63+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
6564
1. From the list of available authentication methods, select **SMS**.
6665

6766
![Screenshot that shows how to select the SMS authentication method.](./media/howto-authentication-sms-signin/authentication-methods-policy.png)

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/14/2023
9+
ms.date: 09/23/2023
1010

1111
ms.author: justinha
1212
author: tilarso
@@ -27,7 +27,7 @@ A Temporary Access Pass is a time-limited passcode that can be configured for si
2727

2828
A Temporary Access Pass also makes recovery easier when a user has lost or forgotten their strong authentication factor like a FIDO2 security key or Microsoft Authenticator app, but needs to sign in to register new strong authentication methods.
2929

30-
This article shows you how to enable and use a Temporary Access Pass in Azure AD using the Azure portal.
30+
This article shows you how to enable and use a Temporary Access Pass in Azure AD using the the [Microsoft Entra admin center](https://entra.microsoft.com).
3131
You can also perform these actions using the REST APIs.
3232

3333
## Enable the Temporary Access Pass policy
@@ -39,9 +39,8 @@ Although you can create a Temporary Access Pass for any user, only users include
3939
Global administrator and Authentication Policy administrator role holders can update the Temporary Access Pass authentication method policy.
4040
To configure the Temporary Access Pass authentication method policy:
4141

42-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
43-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
44-
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
42+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
43+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
4544
1. From the list of available authentication methods, select **Temporary Access Pass**.
4645

4746
:::image type="content" border="true" source="./media/how-to-authentication-temporary-access-pass/select-temporary-access-pass-policy.png" alt-text="Screenshot of how to manage Temporary Access Pass within the authentication method policy experience.":::
@@ -76,11 +75,9 @@ These roles can perform the following actions related to a Temporary Access Pass
7675
- Authentication Administrators can create, delete, and view a Temporary Access Pass on members (except themselves)
7776
- Global Reader can view the Temporary Access Pass details on the user (without reading the code itself).
7877

79-
1. Sign in to the [Azure portal](https://portal.azure.com) by using one of the preceding roles.
80-
1. Select **Azure Active Directory**, browse to Users, select a user, such as *Chris Green*, then choose **Authentication methods**.
81-
1. If needed, select the option to **Try the new user authentication methods experience**.
82-
1. Select the option to **Add authentication methods**.
83-
1. Below **Choose method**, select **Temporary Access Pass**.
78+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
79+
1. Browse to **Protection** > **Authentication methods**.
80+
1. Select **Temporary Access Pass**.
8481
1. Define a custom activation time or duration and select **Add**.
8582

8683
![Screenshot of how to create a Temporary Access Pass.](./media/how-to-authentication-temporary-access-pass/create.png)

0 commit comments

Comments
 (0)