Skip to content

Commit c40b23f

Browse files
Merge pull request #223261 from Justinha/auth-manage-3
added note from Julia
2 parents 478e8b3 + 4abb879 commit c40b23f

File tree

2 files changed

+10
-5
lines changed

2 files changed

+10
-5
lines changed

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,11 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 12/06/2022
9+
ms.date: 01/07/2023
1010

1111
ms.author: justinha
1212
author: justinha
13+
ms.reviewer: jpettere
1314
manager: amycolannino
1415

1516
ms.collection: M365-identity-device-management
@@ -98,9 +99,12 @@ Tenants are set to either Pre-migration or Migration in Progress by default, dep
9899

99100
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/reason.png" alt-text="Screenshot of reasons for rollback.":::
100101

101-
## Known issues
102-
103-
* Currently, all users must be enabled for at least one MFA method that isn't passwordless and the user can register in interrupt mode. Possible methods include Microsoft Authenticator, SMS, voice calls, and software OATH/mobile app code. The method(s) can be enabled in any policy. If a user is not eligible for at least one of those methods, the user will see an error during registration and when visiting My Security Info. We're working to improve this experience to enable fully passwordless configurations.
102+
>[!NOTE]
103+
>After all authentication methods are fully migrated, the following elements of the legacy SSPR policy remain active:
104+
> - The **Number of methods required to reset** control: admins can continue to change how many authentication methods must be verified before a user can perform SSPR.
105+
> - The SSPR administrator policy: admins can continue to register and use any methods listed under the legacy SSPR administrator policy or methods they're enabled to use in the Authentication methods policy.
106+
>
107+
> In the future, both of these features will be integrated with the Authentication methods policy.
104108
105109
## Next steps
106110

articles/active-directory/authentication/how-to-authentication-methods-manage.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,11 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 12/12/2022
9+
ms.date: 01/07/2023
1010

1111
ms.author: justinha
1212
author: justinha
13+
ms.reviewer: jpettere
1314
manager: amycolannino
1415

1516
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)