Skip to content

Commit ce52252

Browse files
authored
Merge pull request #190540 from Justinha/supports-mfa-2
first draft
2 parents 02b9e31 + 5f6cd3e commit ce52252

5 files changed

+120
-41
lines changed

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/22/2021
9+
ms.date: 04/07/2022
1010

1111
ms.author: BaSelden
1212
author: BarbaraSelden
@@ -64,7 +64,7 @@ If you are already using Conditional Access to determine when users are prompted
6464
As users are migrated to cloud authentication, they will start using Azure AD MFA as defined by your existing Conditional Access policies.
6565
They won’t be redirected to AD FS and MFA Server anymore.
6666

67-
If your federated domain(s) have SupportsMFA set to false, you are likely enforcing MFA on AD FS using claims rules.
67+
If your federated domain(s) have the [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta) set to `enforceMfaByFederatedIdp` or **SupportsMfa** flag set to `$True` (the **federatedIdpMfaBehavior** overrides **SupportsMfa** when both are set), you are likely enforcing MFA on AD FS using claims rules.
6868
In this case, you will need to analyze your claims rules on the Azure AD relying party trust and create Conditional Access policies that support the same security goals.
6969

7070
If you need to configure Conditional Access policies, you need to do so before enabling staged rollout.

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md

Lines changed: 70 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Step-by-step guidance to move from Azure MFA Server on-premises to
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: how-to
7-
ms.date: 06/22/2021
7+
ms.date: 04/07/2022
88
ms.author: BaSelden
99
author: BarbaraSelden
1010
manager: martinco
@@ -168,33 +168,91 @@ Once you've configured the servers, you can add Azure AD MFA as an additional au
168168

169169
![Screen shot showing the Edit authentication methods screen with Azure MFA and Azure Mutli-factor authentication Server selected](./media/how-to-migrate-mfa-server-to-azure-mfa-user-authentication/edit-authentication-methods.png)
170170

171-
## Prepare Azure AD and implement
171+
## Prepare Azure AD and implement migration
172172

173-
### Ensure SupportsMFA is set to True
173+
This section covers final steps before migrating user phone numbers.
174174

175-
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain in Azure AD has a SupportsMFA flag. When the SupportsMFA flag is set to True, Azure AD redirects users to MFA on AD FS or another federation providers. For example, if a user is accessing an application for which a Conditional Access policy that requires MFA has been configured, the user will be redirected to AD FS. Adding Azure AD MFA as an authentication method in AD FS, enables Azure AD MFA to be invoked once your configurations are complete.
175+
### Set federatedIdpMfaBehavior to enforceMfaByFederatedIdp
176176

177-
If the SupportsMFA flag is set to False, you're likely not using Azure MFA; you're probably using claims rules on AD FS relying parties to invoke MFA.
177+
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta&preserve-view=true).
178178

179-
You can check the status of your SupportsMFA flag with the following [Windows PowerShell cmdlet](/powershell/module/msonline/get-msoldomainfederationsettings):
179+
>[!NOTE]
180+
> The **federatedIdpMfaBehavior** setting is an evolved version of the **SupportsMfa** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).
181+
182+
For domains that have already set the **SupportsMfa** property, these rules determine how **federatedIdpMfaBehavior** and **SupportsMfa** work together:
183+
184+
- Switching between **federatedIdpMfaBehavior** and **SupportsMfa** is not supported.
185+
- Once **federatedIdpMfaBehavior** property is set, Azure AD ignores the **SupportsMfa** setting.
186+
- If the **federatedIdpMfaBehavior** property is never set, Azure AD will continue to honor the **SupportsMfa** setting.
187+
- If neither **federatedIdpMfaBehavior** nor **SupportsMfa** is set, Azure AD will default to `acceptIfMfaDoneByFederatedIdp` behavior.
188+
189+
You can check the status of **federatedIdpMfaBehavior** by using [Get-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true).
180190

181191
```powershell
182-
Get-MsolDomainFederationSettings –DomainName yourdomain.com
192+
Get-MgDomainFederationConfiguration –DomainID yourdomain.com
183193
```
184194

185-
If the SupportsMFA flag is set to false or is blank for your federated domain, set it to true using the following Windows PowerShell cmdlet:
195+
You can also check the status of your **SupportsMfa** flag with [Get-MsolDomainFederationSettings](/powershell/module/msonline/get-msoldomainfederationsettings):
186196

187197
```powershell
188-
Set-MsolDomainFederationSettings -DomainName contoso.com -SupportsMFA $true
198+
Get-MsolDomainFederationSettings –DomainName yourdomain.com
199+
```
200+
201+
The following example shows how to set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` by using Graph PowerShell.
202+
203+
#### Request
204+
<!-- {
205+
"blockType": "request",
206+
"name": "update_internaldomainfederation"
207+
}
208+
-->
209+
``` http
210+
PATCH https://graph.microsoft.com/beta/domains/contoso.com/federationConfiguration/6601d14b-d113-8f64-fda2-9b5ddda18ecc
211+
Content-Type: application/json
212+
{
213+
"federatedIdpMfaBehavior": "enforceMfaByFederatedIdp"
214+
}
215+
```
216+
217+
218+
#### Response
219+
>**Note:** The response object shown here might be shortened for readability.
220+
<!-- {
221+
"blockType": "response",
222+
"truncated": true,
223+
"@odata.type": "microsoft.graph.internalDomainFederation"
224+
}
225+
-->
226+
``` http
227+
HTTP/1.1 200 OK
228+
Content-Type: application/json
229+
{
230+
"@odata.type": "#microsoft.graph.internalDomainFederation",
231+
"id": "6601d14b-d113-8f64-fda2-9b5ddda18ecc",
232+
"issuerUri": "http://contoso.com/adfs/services/trust",
233+
"metadataExchangeUri": "https://sts.contoso.com/adfs/services/trust/mex",
234+
"signingCertificate": "MIIE3jCCAsagAwIBAgIQQcyDaZz3MI",
235+
"passiveSignInUri": "https://sts.contoso.com/adfs/ls",
236+
"preferredAuthenticationProtocol": "wsFed",
237+
"activeSignInUri": "https://sts.contoso.com/adfs/services/trust/2005/usernamemixed",
238+
"signOutUri": "https://sts.contoso.com/adfs/ls",
239+
"promptLoginBehavior": "nativeSupport",
240+
"isSignedAuthenticationRequestRequired": true,
241+
"nextSigningCertificate": "MIIE3jCCAsagAwIBAgIQQcyDaZz3MI",
242+
"signingCertificateUpdateStatus": {
243+
"certificateUpdateResult": "Success",
244+
"lastRunDateTime": "2021-08-25T07:44:46.2616778Z"
245+
},
246+
"federatedIdpMfaBehavior": "enforceMfaByFederatedIdp"
247+
}
189248
```
190249

191-
This configuration allows the decision to use MFA Server or Azure MFA to be made on AD FS.
192250

193251
### Configure Conditional Access policies if needed
194252

195253
If you use Conditional Access to determine when users are prompted for MFA, you shouldn't need to change your policies.
196254

197-
If your federated domain(s) have SupportsMFA set to false, analyze your claims rules on the Azure AD relying party trust and create Conditional Access policies that support the same security goals.
255+
If your federated domain(s) have SupportsMfa set to false, analyze your claims rules on the Azure AD relying party trust and create Conditional Access policies that support the same security goals.
198256

199257
After creating conditional access policies to enforce the same controls as AD FS, you can back up and remove your claim rules customizations on the Azure AD Relying Party.
200258

@@ -300,7 +358,7 @@ Detailed Azure MFA registration information can be found on the Registration tab
300358

301359
![Image of Authentication methods activity screen showing user registrations to MFA](./media/how-to-migrate-mfa-server-to-azure-mfa-with-federation/authentication-methods.png)
302360

303-
361+
304362

305363
## Clean up steps
306364

articles/active-directory/authentication/howto-mfa-adfs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 04/29/2021
9+
ms.date: 04/15/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
If your organization is federated with Azure Active Directory, use Azure AD Multi-Factor Authentication or Active Directory Federation Services (AD FS) to secure resources that are accessed by Azure AD. Use the following procedures to secure Azure Active Directory resources with either Azure AD Multi-Factor Authentication or Active Directory Federation Services.
2121

2222
>[!NOTE]
23-
>To secure your Azure AD resource, it is recommended to require MFA through a [Conditional Access policy](../conditional-access/howto-conditional-access-policy-all-users-mfa.md), set the domain setting SupportsMfa to $True and [emit the multipleauthn claim](#secure-azure-ad-resources-using-ad-fs) when a user performs two-step verification successfully.
23+
>Set the domain setting [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta&preserve-view=true) to `enforceMfaByFederatedIdp` (recommended) or **SupportsMFA** to `$True`. The **federatedIdpMfaBehavior** setting overrides **SupportsMFA** when both are set.
2424
2525
## Secure Azure AD resources using AD FS
2626

@@ -50,7 +50,7 @@ To secure your cloud resource, set up a claims rule so that Active Directory Fed
5050

5151
## Trusted IPs for federated users
5252

53-
Trusted IPs allow administrators to by-pass two-step verification for specific IP addresses, or for federated users that have requests originating from within their own intranet. The following sections describe how to configure Azure AD Multi-Factor Authentication Trusted IPs with federated users and by-pass two-step verification when a request originates from within a federated users intranet. This is achieved by configuring AD FS to use a pass-through or filter an incoming claim template with the Inside Corporate Network claim type.
53+
Trusted IPs allow administrators to bypass two-step verification for specific IP addresses, or for federated users who have requests originating from within their own intranet. The following sections describe how to configure the bypass using Trusted IPs. This is achieved by configuring AD FS to use a pass-through or filter an incoming claim template with the Inside Corporate Network claim type.
5454

5555
This example uses Microsoft 365 for our Relying Party Trusts.
5656

0 commit comments

Comments
 (0)