You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-authentication-find-coverage-gaps.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,3 +58,7 @@ After your admins are enforced for multifactor authentication and have been usin
58
58
-[Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
59
59
60
60
You can read more about these authentication methods and their security considerations in [Azure AD authentication methods](concept-authentication-methods.md).
61
+
62
+
## Next steps
63
+
64
+
[Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md)
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-authentication-methods-manage.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 03/22/2023
9
+
ms.date: 09/13/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -70,7 +70,10 @@ Record which users are in scope for SSPR (either all users, one specific group,
70
70
71
71
### Authentication methods policy
72
72
73
-
To check settings in the Authentication methods policy, sign in as an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and go to **Azure Active Directory** > **Security** > **Authentication methods** > **Policies**. A new tenant has all methods **Off** by default, which makes migration easier because legacy policy settings don't need to be merged with existing settings.
73
+
To check settings in the Authentication methods policy, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and browse to **Protection** > **Authentication methods** > **Policies**. A new tenant has all methods **Off** by default, which makes migration easier because legacy policy settings don't need to be merged with existing settings.
74
+
75
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
76
+
1. Browse to **Protection** > **Authentication methods** >
74
77
75
78
:::image type="content" source="media/concept-authentication-methods-manage/authentication-methods-policy.png" alt-text="Screenshot that shows the authentication methods." lightbox="media/concept-authentication-methods-manage/authentication-methods-policy.png":::
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
25
25
| Microsoft One Note | ● ||
26
26
| Microsoft Teams | ● | ● |
27
27
| Company portal | ● | ● |
28
-
| My Apps Portal| ● |Not available|
28
+
| My Apps portal| ● |Not available|
29
29
| Microsoft Forms | ● |Not available|
30
30
| Microsoft Edge | ● ||
31
31
| Microsoft Power BI | ● ||
@@ -36,17 +36,17 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
36
36
37
37
*_SMS sign-in isn't available for office applications, such as Word, Excel, etc., when accessed directly on the web, but is available when accessed through the [Office 365 web app](https://www.office.com)_
38
38
39
-
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows user to enter phone number and SMS code.
39
+
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows users to enter phone number and SMS code.
40
40
41
41
## Unsupported Microsoft apps
42
42
43
43
Microsoft 365 desktop (Windows or Mac) apps and Microsoft 365 web apps (except MS One Note) that are accessed directly on the web don't support SMS sign-in. These apps use the Microsoft Office login (`https://office.live.com/start/*`) that requires a password to sign in.
44
-
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company Portal, and Microsoft Azure) don't support SMS sign-in.
44
+
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company portal, and Microsoft Azure) don't support SMS sign-in.
45
45
46
46
| Unsupported Microsoft apps| Examples |
47
47
| --- | --- |
48
48
| Native desktop Microsoft apps | Microsoft Teams, O365 apps, Word, Excel, etc.|
49
-
| Native mobile Microsoft apps (except Microsoft Teams, Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
49
+
| Native mobile Microsoft apps (except Microsoft Teams, Company portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
50
50
| Microsoft 365 web apps (accessed directly on web) |[Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx)|
To enable the certificate-based authentication and configure user bindings in the Azure portal, complete the following steps:
62
+
To enable the certificate-based authentication and configure user bindings in the Microsoft Entra admin center, complete the following steps:
63
63
64
-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
65
-
1.Click **Azure Active Directory**> **Security**.
64
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
65
+
1.Browse to **Protection** > **Authentication methods**> **Certifacte-based authentication**.
66
66
67
67
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/certificate-authorities.png" alt-text="Screenshot of certification authorities.":::
68
68
@@ -144,11 +144,10 @@ For more information, see [Understanding the certificate revocation process](./c
144
144
>[!IMPORTANT]
145
145
>A user is considered capable for **MFA** when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods. If the users do not have access to certificates they will be locked out and not be able to register other methods for MFA. So the admin needs to enable users who have a valid certificate into the CBA scope. Do not use all users for CBA target and use groups of users who have valid certificates available. For more information, see [Azure AD MFA](concept-mfa-howitworks.md).
146
146
147
-
To enable the certificate-based authentication in the Azure portal, complete the following steps:
147
+
To enable the certificate-based authentication in the Microsoft Entra admin center, complete the following steps:
148
148
149
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
150
-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
151
-
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
149
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
150
+
1. Browse to **Protection** > **Authentication methods** > **Certificate-based Authentication**.
152
151
1. Under **Enable and Target**, click **Enable**.
153
152
1. Click **All users**, or click **Add groups** to select specific groups.
154
153
@@ -164,11 +163,10 @@ Once certificate-based authentication is enabled on the tenant, all users in the
164
163
165
164
The authentication binding policy helps determine the strength of authentication to either a single factor or multi factor. An admin can change the default value from single-factor to multifactor and configure custom policy rules by mapping to issuer Subject or policy OID fields in the certificate.
166
165
167
-
To enable Azure AD CBA and configure user bindings in the Azure portal, complete the following steps:
166
+
To enable Azure AD CBA and configure user bindings in the Microsoft Entra admin center, complete the following steps:
168
167
169
-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
170
-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
169
+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
172
170
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
173
171
174
172
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/policy.png" alt-text="Screenshot of Authentication policy.":::
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-additional-context.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use additional context in MFA notifications
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 01/29/2023
7
+
ms.date: 09/13/2023
8
8
ms.author: justinha
9
9
author: mjsantani
10
10
ms.collection: M365-identity-device-management
@@ -17,7 +17,7 @@ This topic covers how to improve the security of user sign-in by adding the appl
17
17
18
18
## Prerequisites
19
19
20
-
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
20
+
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Microsoft Entra admin center or Microsoft Graph API.
21
21
22
22
>[!NOTE]
23
23
>The policy schema for Microsoft Graph APIs has been improved. The older policy schema is now deprecated. Make sure you use the new schema to help prevent errors.
@@ -165,7 +165,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
165
165
#### Example of how to enable application name and geographic location for separate groups
166
166
167
167
In **featureSettings**, change **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** from **default** to **enabled.**
168
-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
168
+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
169
169
170
170
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
171
171
@@ -222,7 +222,7 @@ GET https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationM
222
222
#### Example of how to disable application name and only enable geographic location
223
223
224
224
In **featureSettings**, change the state of **displayAppInformationRequiredState** to **default** or **disabled** and **displayLocationInformationRequiredState** to **enabled.**
225
-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
225
+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
226
226
227
227
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
228
228
@@ -273,9 +273,9 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
273
273
#### Example of how to exclude a group from application name and geographic location
274
274
275
275
In **featureSettings**, change the states of **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** from **default** to **enabled.**
276
-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
276
+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
277
277
278
-
In addition, for each of the features, you'll change the id of the excludeTarget to the ObjectID of the group from the Azure portal. This change excludes that group from seeing application name or geographic location.
278
+
In addition, for each of the features, you'll change the id of the excludeTarget to the ObjectID of the group from the Microsoft Entra admin center. This change excludes that group from seeing application name or geographic location.
279
279
280
280
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
281
281
@@ -408,11 +408,12 @@ To turn off additional context, you'll need to PATCH **displayAppInformationRequ
408
408
}
409
409
```
410
410
411
-
## Enable additional context in the portal
411
+
## Enable additional context in the Microsoft Entra admin center
412
412
413
-
To enable application name or geographic location in the Azure portal, complete the following steps:
413
+
To enable application name or geographic location in the Microsoft Entra admin center, complete the following steps:
414
414
415
-
1. In the Azure portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
415
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
416
+
1. Browse to **Protection** > **Authentication methods** > **Microsoft Authenticator**.
416
417
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone, and change **Authentication mode** to **Any**.
417
418
418
419
Only users who are enabled for Microsoft Authenticator here can be included in the policy to show the application name or geographic location of the sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see application name or geographic location.
0 commit comments