Skip to content

Commit c09a259

Browse files
committed
[AzureAD-MFA] Add steps for Azure Government cloud
1 parent 37ca342 commit c09a259

File tree

1 file changed

+17
-0
lines changed

1 file changed

+17
-0
lines changed

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -190,6 +190,23 @@ If your previous computer certificate has expired, and a new certificate has bee
190190
> [!NOTE]
191191
> If you use your own certificates instead of generating certificates with the PowerShell script, make sure that they align to the NPS naming convention. The subject name must be **CN=\<TenantID\>,OU=Microsoft NPS Extension**.
192192
193+
### Microsoft Azure Government additional steps
194+
195+
For customers that use Azure Government cloud, the following additional configuration steps are required on each NPS server:
196+
197+
1. Open **Registry Editor** on the NPS server.
198+
1. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa`. Set the following key values:
199+
200+
| Registry key | Value |
201+
|--------------------|-----------------------------------|
202+
| AZURE_MFA_HOSTNAME | adnotifications.windowsazure.us |
203+
| STS_URL | https://login.microsoftonline.us/ |
204+
205+
1. Repeat the previous two steps to set the registry key values for each NPS server.
206+
1. Restart the NPS service for each NPS server.
207+
208+
For minimal impact, take each NPS server out of the NLB rotation one at a time and wait for all connections to drain.
209+
193210
### Certificate rollover
194211

195212
With release 1.0.1.32 of the NPS extension, reading multiple certificates is now supported. This capability will help facilitate rolling certificate updates prior to their expiration. If your organization is running a previous version of the NPS extension, you should upgrade to version 1.0.1.32 or higher.

0 commit comments

Comments
 (0)