Skip to content

Commit bb2f724

Browse files
Merge pull request #230832 from Justinha/authenticator-lite
updated date
2 parents 61dff54 + 281b17f commit bb2f724

File tree

1 file changed

+36
-19
lines changed

1 file changed

+36
-19
lines changed

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 36 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/14/2023
9+
ms.date: 03/15/2023
1010

1111
ms.author: justinha
1212
author: sabina-smith
@@ -23,6 +23,9 @@ Microsoft Authenticator Lite is another surface for Azure Active Directory (Azur
2323

2424
Users receive a notification in Outlook mobile to approve or deny sign-in, or they can copy a TOTP to use during sign-in.
2525

26+
>[!NOTE]
27+
>This is an important security enhancement for users authenticating via telecom transports. The 'Microsoft managed' setting for this feature will be set to enabled on May 26th, 2023. This will enable the feature for all users in tenants where the feature is set to Microsoft managed. If you wish to change the state of this feature, please do so before May 26th, 2023.
28+
2629
## Prerequisites
2730

2831
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for some users or groups by using the Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
@@ -56,26 +59,40 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
5659
5760
### Request
5861

59-
```http
60-
PATCH https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy
61-
Content-Type: application/json
62-
62+
```JSON
63+
//Retrieve your existing policy via a GET.
64+
//Leverage the Response body to create the Request body section. Then update the Request body similar to the Request body as shown below.
65+
//Change the Query to PATCH and Run query
66+
6367
{
64-
"CompanionAppAllowedState": {
65-
"state": "enabled",
66-
"excludeTargets": [
67-
{
68-
"id": "s4432809-3bql-5m2l-0p42-8rq4707rq36m",
69-
"targetType": "group"
70-
}
71-
],
72-
"includeTargets": [
73-
{
74-
"id": "all_users",
75-
"targetType": "group"
68+
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
69+
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
70+
"id": "MicrosoftAuthenticator",
71+
"state": "enabled",
72+
"isSoftwareOathEnabled": false,
73+
"excludeTargets": [],
74+
"featureSettings": {
75+
"companionAppAllowedState": {
76+
"state": "enabled",
77+
"includeTarget": {
78+
"targetType": "group",
79+
"id": "s4432809-3bql-5m2l-0p42-8rq4707rq36m"
80+
},
81+
"excludeTarget": {
82+
"targetType": "group",
83+
"id": "00000000-0000-0000-0000-000000000000"
7684
}
77-
]
78-
}
85+
}
86+
},
87+
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
88+
"includeTargets": [
89+
{
90+
"targetType": "group",
91+
"id": "all_users",
92+
"isRegistrationRequired": false,
93+
"authenticationMode": "any"
94+
}
95+
]
7996
}
8097
```
8198

0 commit comments

Comments
 (0)