Skip to content

Commit bfc1d65

Browse files
authored
Merge pull request #101436 from iainfoulds/azuread-securityui
[AzureAD-Authentication] Updating for Security menu in UI
2 parents fcacd08 + 1a1bd92 commit bfc1d65

9 files changed

+14
-14
lines changed

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ If your MFA provider is not linked to an Azure AD tenant, or you link the new MF
4545
> [!CAUTION]
4646
> There is no confirmation when deleting an authentication provider. Selecting **Delete** is a permanent process.
4747
48-
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
48+
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
4949

5050
Before removing an authentication provider, take note of any customized settings configured in your provider. Decide what settings need to be migrated to general MFA settings from your provider and complete the migration of those settings.
5151

52-
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
52+
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
5353

5454
- caCert
5555
- cert
@@ -61,7 +61,7 @@ Azure MFA Servers linked to providers will need to be reactivated using credenti
6161

6262
![Delete an auth provider from the Azure portal](./media/concept-mfa-authprovider/authentication-provider-removal.png)
6363

64-
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
64+
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
6565

6666
> [!WARNING]
6767
> Deleting an authentication provider will delete any reporting information associated with that provider. You may want to save activity reports before deleting your provider.

articles/active-directory/authentication/howto-mfa-adfs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The first thing we need to do is to configure the AD FS claims. Create two claim
8383
Now that the claims are in place, we can configure trusted IPs.
8484

8585
1. Sign in to the [Azure portal](https://portal.azure.com).
86-
2. Select **Azure Active Directory** > **Conditional Access** > **Named locations**.
86+
2. Select **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**.
8787
3. From the **Conditional Access - Named locations** blade, select **Configure MFA trusted IPs**
8888

8989
![Azure AD Conditional Access named locations Configure MFA trusted IPs](./media/howto-mfa-adfs/trustedip6.png)

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ It is important that you prevent being inadvertently locked out of your Azure AD
218218
### Create Conditional Access policy
219219

220220
1. Sign in to the [Azure portal](https://portal.azure.com) using a global administrator account.
221-
1. Browse to **Azure Active Directory**, **Conditional Access**.
221+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
222222
1. Select **New policy**.
223223
![Create a Conditional Access policy to enable MFA for Azure portal users in pilot group](media/howto-mfa-getstarted/conditionalaccess-newpolicy.png)
224224
1. Provide a meaningful name for your policy.

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,8 @@ If you aren't using the Event Confirmation feature, and your users aren't using
9393
Follow these steps to download the Azure Multi-Factor Authentication Server from the Azure portal:
9494

9595
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
96-
2. Search for and select *Azure Active Directory*. Select **MFA Server**.
97-
3. Select **Server settings**.
96+
2. Search for and select *Azure Active Directory*. Select **Security** > **MFA**.
97+
3. Under **Manager MFA Server**, select **Server settings**.
9898
4. Select **Download** and follow the instructions on the download page to save the installer.
9999

100100
![Download MFA Server from the Azure portal](./media/howto-mfaserver-deploy/downloadportal.png)

articles/active-directory/authentication/howto-password-ban-bad-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Many organizations find their users create passwords using common local words su
2323

2424
Configuring the custom banned password list requires an Azure Active Directory Premium P1 or P2 license. For more detailed information about Azure Active Directory licensing, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory/).
2525

26-
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Authentication methods**, then **Password protection**.
26+
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Password protection**.
2727
1. Set the option **Enforce custom list**, to **Yes**.
2828
1. Add strings to the **Custom banned password list**, one string per line
2929
* The custom banned password list can contain up to 1000 terms.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Follow the guidance in the article [Configuring the custom banned password list]
2525

2626
## Enable Password Protection
2727

28-
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Security**,**Authentication methods**, then **Password Protection**.
28+
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Password Protection**.
2929
1. Set **Enable Password Protection on Windows Server Active Directory** to **Yes**
3030
1. As mentioned in the [Deployment guide](howto-password-ban-bad-on-premises-deploy.md#deployment-strategy), it is recommended to initially set the **Mode** to **Audit**
3131
* After you are comfortable with the feature, you can switch the **Mode** to **Enforced**

articles/active-directory/authentication/howto-sspr-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ In the Azure portal experience, we have improved the way that you can view passw
5050

5151
### Converged registration (preview)
5252

53-
If you are participating in the public preview of converged registration, information regarding user activity in the audit logs will be found under the service **Authentication Methods**.
53+
If you are participating in the public preview of converged registration, information regarding user activity in the audit logs will be found under **Security** > **Authentication Methods**.
5454

5555
## Description of the report columns in the Azure portal
5656

articles/active-directory/authentication/quickstart-sspr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Now lets test your SSPR configuration with a test user that's part of the group
6969

7070
## Clean up resources
7171

72-
To disable self-service password reset, search for and select **Azure Active Directory** in the Azure portal. Select **Properties** > **Password Reset**, and then choose **None** under **Self Service Password Reset Enabled**. When ready, select **Save**.
72+
To disable self-service password reset, search for and select **Azure Active Directory** in the Azure portal. Select **Password Reset**, and then choose **None** under **Self Service Password Reset Enabled**. When ready, select **Save**.
7373

7474
## Next steps
7575

articles/active-directory/authentication/tutorial-mfa-applications.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,10 +34,10 @@ In this tutorial, you walk you through configuring a Conditional Access policy e
3434
## Enable Azure Multi-Factor Authentication
3535

3636
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global Administrator account.
37-
1. Browse to **Azure Active Directory**, **Conditional Access**
37+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**
3838
1. Select **New policy**
3939
1. Name your policy **MFA Pilot**
40-
1. Under **users and groups**, select the **Select users and groups** radio button
40+
1. Under **Users and groups**, select the **Select users and groups** radio button
4141
* Select your pilot group created as part of the prerequisites section of this article
4242
* Click **Done**
4343
1. Under **Cloud apps**, select the **Select apps** radio button
@@ -68,7 +68,7 @@ To prove that your Conditional Access policy works, you test logging in to a res
6868
If you decide you no longer want to use the functionality you have configured as part of this tutorial, make the following change.
6969

7070
1. Sign in to the [Azure portal](https://portal.azure.com).
71-
1. Browse to **Azure Active Directory**, **Conditional Access**.
71+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
7272
1. Select the Conditional Access policy you created.
7373
1. Click **Delete**.
7474

0 commit comments

Comments
 (0)