You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-mfa-authprovider.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
-
title: Azure Multi-Factor Auth Providers - Azure Active Directory
2
+
title: Azure AD Multi-Factor Auth Providers - Azure Active Directory
3
3
description: When should you use an Auth Provider with Azure MFA?
4
4
5
5
services: multi-factor-authentication
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 11/21/2019
9
+
ms.date: 10/10/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -15,30 +15,30 @@ ms.reviewer: michmcla
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# When to use an Azure Multi-Factor Authentication Provider
18
+
# When to use an Azure AD Multi-Factor Authentication provider
19
19
20
20
> [!IMPORTANT]
21
21
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
22
22
23
-
Two-step verification is available by default for global administrators who have Azure Active Directory, and Microsoft 365 users. However, if you wish to take advantage of [advanced features](howto-mfa-mfasettings.md) then you should purchase the full version of Azure Multi-Factor Authentication (MFA).
23
+
Two-step verification is available by default for Global Administrators who have Azure Active Directory, and Microsoft 365 users. However, if you wish to take advantage of [advanced features](howto-mfa-mfasettings.md) then you should purchase the full version of Azure AD Multi-Factor Authentication (MFA).
24
24
25
-
An Azure Multi-Factor Auth Provider is used to take advantage of features provided by Azure Multi-Factor Authentication for users who **do not have licenses**.
25
+
An Azure AD Multi-Factor Auth Provider is used to take advantage of features provided by Azure AD Multi-Factor Authentication for users who **do not have licenses**.
26
26
27
27
## Caveats related to the Azure MFA SDK
28
28
29
29
Note the SDK has been deprecated and will only continue to work until November 14, 2018. After that time, calls to the SDK will fail.
30
30
31
-
## What is an MFA Provider?
31
+
## What is an MFA provider?
32
32
33
-
There are two types of Auth providers, and the distinction is around how your Azure subscription is charged. The per-authentication option calculates the number of authentications performed against your tenant in a month. This option is best if you have a number of users authenticating only occasionally. The per-user option calculates the number of individuals in your tenant who perform two-step verification in a month. This option is best if you have some users with licenses but need to extend MFA to more users beyond your licensing limits.
33
+
There are two types of Auth providers, and the distinction is around how your Azure subscription is charged. The per-authentication option calculates the number of authentications performed against your tenant in a month. This option is best if some users authenticate only occasionally. The per-user option calculates the number of users who are eligible to perform MFA, which is all users in Azure AD, and all enabled users in MFA Server. This option is best if some users have licenses but you need to extend MFA to more users beyond your licensing limits.
34
34
35
-
## Manage your MFA Provider
35
+
## Manage your MFA provider
36
36
37
-
You cannot change the usage model (per enabled user or per authentication) after an MFA provider is created.
37
+
You can't change the usage model (per enabled user or per authentication) after an MFA provider is created.
38
38
39
39
If you purchased enough licenses to cover all users that are enabled for MFA, you can delete the MFA provider altogether.
40
40
41
-
If your MFA provider is not linked to an Azure AD tenant, or you link the new MFA provider to a different Azure AD tenant, user settings and configuration options are not transferred. Also, existing Azure MFA Servers need to be reactivated using activation credentials generated through the MFA Provider.
41
+
If your MFA provider isn't linked to an Azure AD tenant, or you link the new MFA provider to a different Azure AD tenant, user settings and configuration options aren't transferred. Also, existing Azure MFA Servers need to be reactivated using activation credentials generated through the MFA Provider.
42
42
43
43
### Removing an authentication provider
44
44
@@ -61,7 +61,7 @@ Azure MFA Servers linked to providers will need to be reactivated using credenti
61
61
62
62

63
63
64
-
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
64
+
After you confirm that all settings are migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
65
65
66
66
> [!WARNING]
67
67
> Deleting an authentication provider will delete any reporting information associated with that provider. You may want to save activity reports before deleting your provider.
0 commit comments