Skip to content

Commit a98b62c

Browse files
Merge pull request #251663 from Justinha/steps-auth-16
revised portal steps
2 parents c179c2d + 2f7f810 commit a98b62c

File tree

3 files changed

+31
-26
lines changed

3 files changed

+31
-26
lines changed

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ A Temporary Access Pass is a time-limited passcode that can be configured for si
2727

2828
A Temporary Access Pass also makes recovery easier when a user has lost or forgotten their strong authentication factor like a FIDO2 security key or Microsoft Authenticator app, but needs to sign in to register new strong authentication methods.
2929

30-
This article shows you how to enable and use a Temporary Access Pass in Azure AD using the the [Microsoft Entra admin center](https://entra.microsoft.com).
30+
This article shows you how to enable and use a Temporary Access Pass using the the [Microsoft Entra admin center](https://entra.microsoft.com).
3131
You can also perform these actions using the REST APIs.
3232

3333
## Enable the Temporary Access Pass policy
@@ -119,7 +119,7 @@ The most common use for a Temporary Access Pass is for a user to register authen
119119
1. Open a web browser to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo).
120120
1. Enter the UPN of the account you created the Temporary Access Pass for, such as *[email protected]*.
121121
1. If the user is included in the Temporary Access Pass policy, they see a screen to enter their Temporary Access Pass.
122-
1. Enter the Temporary Access Pass that was displayed in the Azure portal.
122+
1. Enter the Temporary Access Pass that was displayed in the Microsoft Entra admin center.
123123

124124
:::image type="content" border="true" source="./media/how-to-authentication-temporary-access-pass/enter.png" alt-text="Screenshot of how to enter a Temporary Access Pass.":::
125125

@@ -171,7 +171,8 @@ The token lifetime (session token, refresh token, access token, and so on) obtai
171171

172172
Under the **Authentication methods** for a user, the **Detail** column shows when the Temporary Access Pass expired. You can delete an expired Temporary Access Pass using the following steps:
173173

174-
1. In the Azure portal, browse to **Users**, select a user, such as *Tap User*, then choose **Authentication methods**.
174+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
175+
1. Browse to **Identity** > **Users**, select a user, such as *Tap User*, then choose **Authentication methods**.
175176
1. On the right-hand side of the **Temporary Access Pass** authentication method shown in the list, select **Delete**.
176177

177178
You can also use PowerShell:

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,9 +74,9 @@ Azure AD Multi-Factor Authentication is enforced with Conditional Access policie
7474

7575
![Conceptual Conditional Access process flow](media/howto-mfa-getstarted/conditional-access-overview-how-it-works.png)
7676

77-
In the Azure portal, you configure Conditional Access policies under **Azure Active Directory** > **Security** > **Conditional Access**.
77+
In the Microsoft Entra admin center, you configure Conditional Access policies under **Protection** > **Conditional Access**.
7878

79-
To learn more about creating Conditional Access policies, see [Conditional Access policy to prompt for Azure AD Multi-Factor Authentication when a user signs in to the Azure portal](tutorial-enable-azure-mfa.md). This helps you to:
79+
To learn more about creating Conditional Access policies, see [Conditional Access policy to prompt for Azure AD Multi-Factor Authentication when a user signs in](tutorial-enable-azure-mfa.md). This helps you to:
8080

8181
- Become familiar with the user interface
8282
- Get a first impression of how Conditional Access works
@@ -183,7 +183,7 @@ As mentioned before, ensure users are registered for more than one MFA method, s
183183
If the user does not have a backup method available, you can:
184184

185185
- Provide them a Temporary Access Pass so that they can manage their own authentication methods. You can also provide a Temporary Access Pass to enable temporary access to resources.
186-
- Update their methods as an administrator. To do so, select the user in the Azure portal, then select Authentication methods and update their methods.
186+
- Update their methods as an administrator. To do so, select the user in the Microsoft Entra admin center, then select **Protection** > **Authentication methods** and update their methods.
187187

188188

189189
## Plan integration with on-premises systems

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 08/16/2023
9+
ms.date: 09/15/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -32,7 +32,7 @@ The following Azure AD Multi-Factor Authentication settings are available:
3232
| [Phone call settings](#phone-call-settings) | Configure settings related to phone calls and greetings for cloud and on-premises environments. |
3333
| Providers | This will show any existing authentication providers that you've associated with your account. Adding new providers is disabled as of September 1, 2018. |
3434

35-
![Azure portal - Azure AD Multi-Factor Authentication settings](./media/howto-mfa-mfasettings/multi-factor-authentication-settings-portal.png)
35+
![Azure AD Multi-Factor Authentication settings](./media/howto-mfa-mfasettings/multi-factor-authentication-settings-portal.png)
3636

3737
## Account lockout (MFA Server only)
3838

@@ -51,11 +51,11 @@ The following settings are available:
5151

5252
To configure account lockout settings, complete these steps:
5353

54-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
55-
1. Go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Account lockout**.
54+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
55+
1. Browse to **Protection** > **Multifactor authentication** > **Account lockout**.
5656
1. Enter the values for your environment, and then select **Save**.
5757

58-
![Screenshot that shows the account lockout settings in the Azure portal.](./media/howto-mfa-mfasettings/account-lockout-settings.png)
58+
![Screenshot that shows the account lockout settings.](./media/howto-mfa-mfasettings/account-lockout-settings.png)
5959

6060
## Block and unblock users
6161

@@ -89,7 +89,8 @@ Users who report an MFA prompt as suspicious are set to **High User Risk**. Admi
8989

9090
To enable **Report suspicious activity** from the Authentication methods **Settings**:
9191

92-
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
92+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
93+
1. Browse to **Protection** > **Authentication Methods** > **Settings**.
9394
1. Set **Report suspicious activity** to **Enabled**. The feature remains disabled if you choose **Microsoft managed**. For more information about Microsoft managed values, see [Protecting authentication methods in Azure Active Directory](concept-authentication-default-enablement.md).
9495
1. Select **All users** or a specific group.
9596
1. Select a **Reporting code**.
@@ -153,7 +154,7 @@ [email protected],1234567,1234567abcdef1234567abcdef,60,Contoso,HardwareKey
153154
> [!NOTE]
154155
> Be sure to include the header row in your CSV file.
155156
156-
An administrator can sign in to the Azure portal, go to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the CSV file.
157+
An Authentication Policy Administrator can sign in to the [Microsoft Entra admin center](https://entra.microsoft.com), go to **Protection** > **Multifactor authentication** > **OATH tokens**, and upload the CSV file.
157158

158159
Depending on the size of the CSV file, it might take a few minutes to process. Select **Refresh** to get the status. If there are any errors in the file, you can download a CSV file that lists them. The field names in the downloaded CSV file are different from those in the uploaded version.
159160

@@ -280,9 +281,9 @@ To use your own custom messages, complete the following steps:
280281

281282
## MFA service settings
282283

283-
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure portal.
284+
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal.
284285

285-
You can access service settings from the Azure portal by going to **Azure Active Directory** > **Security** > **Multifactor authentication** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**. A window or tab opens with additional service settings options.
286+
You can access service settings from the [Microsoft Entra admin center](https://entra.microsoft.com) by going to **Protection** > **Multifactor authentication** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**. A window or tab opens with additional service settings options.
286287

287288
### Trusted IPs
288289

@@ -319,7 +320,8 @@ Regardless of whether trusted IPs are defined, multi-factor authentication is re
319320

320321
You can use Conditional Access rules to define named locations by using the following steps:
321322

322-
1. In the Azure portal, search for and select **Azure Active Directory**, and then go to **Security** > **Conditional Access** > **Named locations**.
323+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
324+
1. Browse to **Protection** > **Conditional Access** > **Named locations**.
323325
1. Select **New location**.
324326
1. Enter a name for the location.
325327
1. Select **Mark as trusted location**.
@@ -330,7 +332,8 @@ You can use Conditional Access rules to define named locations by using the foll
330332

331333
To enable trusted IPs by using Conditional Access policies, complete the following steps:
332334

333-
1. In the Azure portal, search for and select **Azure Active Directory**, and then go to **Security** > **Conditional Access** > **Named locations**.
335+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
336+
1. Browse to **Protection** > **Conditional Access** > **Named locations**.
334337
1. Select **Configure MFA trusted IPs**.
335338
1. On the **Service Settings** page, under **Trusted IPs**, choose one of these options:
336339

@@ -349,10 +352,9 @@ To enable trusted IPs by using Conditional Access policies, complete the followi
349352

350353
If you don't want to use Conditional Access policies to enable trusted IPs, you can configure the service settings for Azure AD Multi-Factor Authentication by using the following steps:
351354

352-
1. In the Azure portal, search for and select **Azure Active Directory**, and then select **Users**.
353-
1. Select **Per-user MFA**.
354-
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
355-
1. On the **service settings** page, under **Trusted IPs**, choose one or both of the following options:
355+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
356+
1. Browse to **Protection** > **Multifactor authentication** > **Service settings**.
357+
1. On the **Service settings** page, under **Trusted IPs**, choose one or both of the following options:
356358

357359
* **For requests from federated users on my intranet**: To choose this option, select the checkbox. All federated users who sign in from the corporate network bypass multi-factor authentication by using a claim that's issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule doesn't exist, create the following rule in AD FS:
358360

@@ -384,10 +386,11 @@ For more information, see [What authentication and verification methods are avai
384386

385387
To enable or disable verification methods, complete the following steps:
386388

387-
1. In the Azure portal, search for and select **Azure Active Directory**, and then select **Users**.
389+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
390+
1. Browse to **Identity** > **Users**.
388391
1. Select **Per-user MFA**.
389-
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
390-
1. On the **service settings** page, under **verification options**, select or clear the appropriate checkboxes.
392+
1. Under **Multifactor authentication** at the top of the page, select **Service settings**.
393+
1. On the **Service settings** page, under **Verification options**, select or clear the appropriate checkboxes.
391394
1. Select **Save**.
392395

393396
### Remember multi-factor authentication
@@ -420,9 +423,10 @@ The feature reduces the number of authentications on web apps, which normally pr
420423

421424
To enable and configure the option to allow users to remember their MFA status and bypass prompts, complete the following steps:
422425

423-
1. In the Azure portal, search for and select **Azure Active Directory**, and then select **Users**.
426+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
427+
1. Browse to **Identity** > **Users**.
424428
1. Select **Per-user MFA**.
425-
1. Under **multi-factor authentication** at the top of the page, select **service settings**.
429+
1. Under **Multifactor authentication** at the top of the page, select **service settings**.
426430
1. On the **service settings** page, under **remember multi-factor authentication**, select **Allow users to remember multi-factor authentication on devices they trust**.
427431
1. Set the number of days to allow trusted devices to bypass multi-factor authentications. For the optimal user experience, extend the duration to 90 or more days.
428432
1. Select **Save**.

0 commit comments

Comments
 (0)