Skip to content

Commit b7c3337

Browse files
authored
Merge branch 'main' into anf-smb-ame-nonbrowsable
2 parents 2ba34c8 + 3356d47 commit b7c3337

File tree

81 files changed

+918
-699
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

81 files changed

+918
-699
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,12 +54,14 @@
5454
href: concept-sspr-policy.md
5555
- name: Licenses
5656
href: concept-sspr-licensing.md
57-
- name: Multi-Factor Authentication
57+
- name: Multifactor Authentication
5858
items:
5959
- name: How MFA works
6060
href: concept-mfa-howitworks.md
6161
- name: Default protection
6262
href: concept-authentication-default-enablement.md
63+
- name: System-preferred MFA
64+
href: concept-system-preferred-multifactor-authentication.md
6365
- name: Prompts and session lifetime
6466
href: concepts-azure-multi-factor-authentication-prompts-session-lifetime.md
6567
- name: Data residency

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/26/2022
9+
ms.date: 02/24/2023
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -58,6 +58,7 @@ The following table lists each setting that can be set to Microsoft managed and
5858
| [Registration campaign](how-to-mfa-registration-campaign.md) | Disabled |
5959
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
6060
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
61+
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Disabled |
6162

6263
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/).
6364

Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
---
2+
title: System-preferred multifactor authentication (MFA) - Azure Active Directory
3+
description: Learn how to use system-preferred multifactor authentication
4+
ms.service: active-directory
5+
ms.subservice: authentication
6+
ms.topic: conceptual
7+
ms.date: 02/28/2023
8+
ms.author: justinha
9+
author: justinha
10+
manager: amycolannino
11+
ms.reviewer: msft-poulomi
12+
ms.collection: M365-identity-device-management
13+
14+
15+
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
16+
---
17+
# System-preferred multifactor authentication - Authentication methods policy
18+
19+
System-preferred multifactor authentication (MFA) prompts users to sign in by using the most secure method they registered. Administrators can enable system-preferred MFA to improve sign-in security and discourage less secure sign-in methods like SMS.
20+
21+
For example, if a user registered both SMS and Microsoft Authenticator push notifications as methods for MFA, system-preferred MFA prompts the user to sign in by using the more secure push notification method. The user can still choose to sign in by using another method, but they're first prompted to try the most secure method they registered.
22+
23+
System-preferred MFA is a Microsoft managed setting, which is a [tristate policy](#authentication-method-feature-configuration-properties). For preview, the **default** state is disabled. If you want to turn it on for all users or a group of users during preview, you need to explicitly change the Microsoft managed state to **enabled** by using Microsoft Graph API. Sometime after general availability, the Microsoft managed state for system-preferred MFA will change to **enabled**.
24+
25+
After system-preferred MFA is enabled, the authentication system does all the work. Users don't need to set any authentication method as their default because the system always determines and presents the most secure method they registered.
26+
27+
## Enable system-preferred MFA
28+
29+
To enable system-preferred MFA in advance, you need to choose a single target group for the schema configuration, as shown in the [Request](#request) example.
30+
31+
### Authentication method feature configuration properties
32+
33+
By default, system-preferred MFA is [Microsoft managed](concept-authentication-default-enablement.md#microsoft-managed-settings) and disabled during preview. After generally availability, the Microsoft managed state default value will change to enable system-preferred MFA.
34+
35+
| Property | Type | Description |
36+
|----------|------|-------------|
37+
| excludeTarget | featureTarget | A single entity that is excluded from this feature. <br>You can only exclude one group from system-preferred MFA, which can be a dynamic or nested group.|
38+
| includeTarget | featureTarget | A single entity that is included in this feature. <br>You can only include one group for system-preferred MFA, which can be a dynamic or nested group.|
39+
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
40+
41+
### Feature target properties
42+
43+
System-preferred MFA can be enabled only for a single group, which can be a dynamic or nested group.
44+
45+
| Property | Type | Description |
46+
|----------|------|-------------|
47+
| id | String | ID of the entity targeted. |
48+
| targetType | featureTargetType | The kind of entity targeted, such as group, role, or administrative unit. The possible values are: 'group', 'administrativeUnit', 'role', 'unknownFutureValue'. |
49+
50+
Use the following API endpoint to enable **systemCredentialPreferences** and include or exclude groups:
51+
52+
```
53+
https://graph.microsoft.com/beta/authenticationMethodsPolicy
54+
```
55+
56+
>[!NOTE]
57+
>In Graph Explorer, you need to consent to the **Policy.ReadWrite.AuthenticationMethod** permission.
58+
59+
### Request
60+
61+
The following example excludes a sample target group and includes all users. For more information, see [Update authenticationMethodsPolicy](/graph/api/authenticationmethodspolicy-update?view=graph-rest-beta).
62+
63+
```http
64+
PATCH https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy
65+
Content-Type: application/json
66+
67+
{
68+
"systemCredentialPreferences": {
69+
"state": "enabled",
70+
"excludeTargets": [
71+
{
72+
"id": "d1411007-6fcf-4b4c-8d70-1da1857ed33c",
73+
"targetType": "group"
74+
}
75+
],
76+
"includeTargets": [
77+
{
78+
"id": "all_users",
79+
"targetType": "group"
80+
}
81+
]
82+
}
83+
}
84+
```
85+
86+
## Known issues
87+
88+
- [FIDO2 security key isn't supported on iOS mobile devices](../develop/support-fido2-authentication.md#mobile). This issue might surface when system-preferred MFA is enabled. Until a fix is available, we recommend not using FIDO2 security keys on iOS devices.
89+
90+
## Common questions
91+
92+
### How does system-preferred MFA determine the most secure method?
93+
94+
When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign-in with the most secure method according to the following order. The order of authentication methods is dynamic. It's updated as the security landscape changes, and as better authentication methods emerge.
95+
96+
1. Temporary Access Pass
97+
1. Certificate-based authentication
98+
1. FIDO2 security key
99+
1. Microsoft Authenticator notification
100+
1. Companion app notification
101+
1. Microsoft Authenticator time-based one-time password (TOTP)
102+
1. Companion app TOTP
103+
1. Hardware token based TOTP
104+
1. Software token based TOTP
105+
1. SMS over mobile
106+
1. OnewayVoiceMobileOTP
107+
1. OnewayVoiceAlternateMobileOTP
108+
1. OnewayVoiceOfficeOTP
109+
1. TwowayVoiceMobile
110+
1. TwowayVoiceAlternateMobile
111+
1. TwowayVoiceOffice
112+
1. TwowaySMSOverMobile
113+
114+
### How does system-preferred MFA affect AD FS or NPS extension?
115+
116+
System-preferred MFA doesn't affect users who sign in by using Active Directory Federation Services (AD FS) or Network Policy Server (NPS) extension. Those users don't see any change to their sign-in experience.
117+
118+
### What if the most secure MFA method isn't available?
119+
120+
If the user doesn't have that have the most secure method available, they can sign in with another method. After sign-in, they're redirected to their Security info page to remove the registration of the authentication method that isn't available.
121+
122+
For example, let's say an end user misplaces their FIDO2 security key. When they try to sign in without their security key, they can click **I can't use my security key right now** and continue to sign in by using another method, like a time-based one-time password (TOTP). After sign-in, their Security info page appears and they need to remove their FIDO2 security key registration. They can register the method again later if they find their FIDO2 security key.
123+
124+
### What happens for users who aren't specified in the Authentication methods policy but enabled in the legacy MFA tenant-wide policy?
125+
126+
The system-preferred MFA also applies for users who are enabled for MFA in the legacy MFA policy.
127+
:::image type="content" border="true" source="./media/how-to-mfa-number-match/legacy-settings.png" alt-text="Screenshot of legacy MFA settings.":::
128+
129+
## Next steps
130+
131+
* [Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)
132+
* [How to run a registration campaign to set up Microsoft Authenticator](how-to-mfa-registration-campaign.md)
10.6 KB
Loading

0 commit comments

Comments
 (0)