Skip to content

Commit bbbf34f

Browse files
committed
[AzureAD] Update for latest portal UI
1 parent 08feab7 commit bbbf34f

File tree

2 files changed

+17
-17
lines changed

2 files changed

+17
-17
lines changed

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 04/15/2020
9+
ms.date: 04/17/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -44,34 +44,34 @@ If you have configured the Site to Zone Assignment List in Internet Explorer, th
4444

4545
## Conditional Access policies for combined registration
4646

47-
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in Conditional Access policy. This feature is available to organizations who have enabled the [combined registration feature](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want users to register for Azure Multi-Factor Authentication and SSPR from a central location such as a trusted network location during HR onboarding. For more information about creating trusted locations in Conditional Access, see the article [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md#named-locations)
47+
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in Conditional Access policy. This feature is available to organizations who have enabled the [combined registration feature](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want users to register for Azure Multi-Factor Authentication and SSPR from a central location such as a trusted network location during HR onboarding.
4848

49-
### Create a policy to require registration from a trusted location
49+
For more information about creating trusted locations in Conditional Access, see the article [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md#named-locations)
5050

51-
The following policy applies to all selected users, who attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network.
51+
### Create a policy to require registration from a trusted location
5252

53-
![Create a CA policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
53+
The following policy applies to all selected users that attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network.
5454

5555
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
56-
1. Select **New policy**
57-
1. In Name, Enter a Name for this policy. For example, **Combined Security Info Registration on Trusted Networks**
58-
1. Under **Assignments**, click **Users and groups**, and select the users and groups you want this policy to apply to
56+
1. Select **+ New policy**
57+
1. Enter a name for this policy, such as *Combined Security Info Registration on Trusted Networks*.
58+
1. Under **Assignments**, select **Users and groups**. Choose the users and groups you want this policy to apply to, then select **Done**.
5959

6060
> [!WARNING]
61-
> Users must be enabled for [combined registration](../authentication/howto-registration-mfa-sspr-combined.md).
61+
> Users must be enabled for combined registration.
62+
63+
1. Under **Cloud apps or actions**, select **User actions**. Check **Register security information**, then select **Done**.
64+
65+
![Create a conditional access policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6266

63-
1. Under **Cloud apps or actions**, select **User actions**, check **Register security information (preview)**
64-
1. Under **Conditions** > **Locations**
67+
1. Under **Conditions** > **Locations**, configure the following options:
6568
1. Configure **Yes**
6669
1. Include **Any location**
6770
1. Exclude **All trusted locations**
68-
1. Click **Done** on the Locations blade
69-
1. Click **Done** on the Conditions blade
70-
1. Under **Access controls** > **Grant**
71-
1. Click **Block access**
72-
1. Then click **Select**
71+
1. Select **Done** on the *Locations* window, then select **Done** on the *Conditions* window.
72+
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**
7373
1. Set **Enable policy** to **On**
74-
1. Then click **Create**
74+
1. To finalize the policy, select **Create**
7575

7676
## Next steps
7777

Loading

0 commit comments

Comments
 (0)