Skip to content

Commit bd0635d

Browse files
authored
Merge pull request #196710 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents bbd6769 + 2373993 commit bd0635d

File tree

128 files changed

+1760
-1066
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

128 files changed

+1760
-1066
lines changed

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ If you are already using Conditional Access to determine when users are prompted
6464
As users are migrated to cloud authentication, they will start using Azure AD MFA as defined by your existing Conditional Access policies.
6565
They won’t be redirected to AD FS and MFA Server anymore.
6666

67-
If your federated domain(s) have the [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta) set to `enforceMfaByFederatedIdp` or **SupportsMfa** flag set to `$True` (the **federatedIdpMfaBehavior** overrides **SupportsMfa** when both are set), you are likely enforcing MFA on AD FS using claims rules.
67+
If your federated domain(s) have the **federatedIdpMfaBehavior** set to `enforceMfaByFederatedIdp` or **SupportsMfa** flag set to `$True` (the **federatedIdpMfaBehavior** overrides **SupportsMfa** when both are set), you are likely enforcing MFA on AD FS using claims rules.
6868
In this case, you will need to analyze your claims rules on the Azure AD relying party trust and create Conditional Access policies that support the same security goals.
6969

7070
If you need to configure Conditional Access policies, you need to do so before enabling staged rollout.
@@ -393,4 +393,4 @@ For more information on migrating applications to Azure, see [Resources for migr
393393

394394
- [Migrate from Microsoft MFA Server to Azure multi-factor authentication (Overview)](how-to-migrate-mfa-server-to-azure-mfa.md)
395395
- [Migrate applications from Windows Active Directory to Azure Active Directory](../manage-apps/migrate-application-authentication-to-azure-active-directory.md)
396-
- [Plan your cloud authentication strategy](../fundamentals/active-directory-deployment-plans.md)
396+
- [Plan your cloud authentication strategy](../fundamentals/active-directory-deployment-plans.md)

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,7 @@ This section covers final steps before migrating user phone numbers.
174174

175175
### Set federatedIdpMfaBehavior to enforceMfaByFederatedIdp
176176

177+
177178
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values).
178179

179180
>[!NOTE]
@@ -418,9 +419,3 @@ Possible considerations when decommissions the MFA Servers include:
418419
- [Deploy password hash synchronization](../hybrid/whatis-phs.md)
419420
- [Learn more about Conditional Access](../conditional-access/overview.md)
420421
- [Migrate applications to Azure AD](../manage-apps/migrate-application-authentication-to-azure-active-directory.md)
421-
422-
423-
424-
425-
426-

articles/active-directory/develop/mobile-app-quickstart-portal-android.md

Lines changed: 468 additions & 461 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)