You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# When to use an Azure Multi-Factor Authentication Provider
19
19
20
+
> [!IMPORTANT]
21
+
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
22
+
20
23
Two-step verification is available by default for global administrators who have Azure Active Directory, and Office 365 users. However, if you wish to take advantage of [advanced features](howto-mfa-mfasettings.md) then you should purchase the full version of Azure Multi-Factor Authentication (MFA).
21
24
22
25
An Azure Multi-Factor Auth Provider is used to take advantage of features provided by Azure Multi-Factor Authentication for users who **do not have licenses**.
23
26
24
-
> [!NOTE]
25
-
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
26
-
27
27
## Caveats related to the Azure MFA SDK
28
28
29
29
Note the SDK has been deprecated and will only continue to work until November 14, 2018. After that time, calls to the SDK will fail.
title: Manage users and devices Azure MFA - Azure Active Directory
3
-
description: How can administrators change user settings such as forcing the users to do the proof-up process again.
2
+
title: Manage user settings for Azure Multi-Factor Authentication - Azure Active Directory
3
+
description: Learn how you can configure Azure Active Directory user settings for Azure Multi-Factor Authentication
4
4
5
5
services: multi-factor-authentication
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 11/21/2019
9
+
ms.date: 04/13/2020
10
10
11
11
ms.author: iainfou
12
12
author: iainfoulds
@@ -15,44 +15,40 @@ ms.reviewer: michmcla
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Manage user settings with Azure Multi-Factor Authentication in the cloud
18
+
# Manage user settings for Azure Multi-Factor Authentication
19
19
20
-
As an administrator, you can manage the following user and device settings:
20
+
To help manage the users of Azure Multi-Factor Authentication, you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions. For users that have defined app passwords, you can also choose to delete these passwords, causing legacy authentication to fail in those applications. These actions may be necessary if you need to provide assistance to a user, or want to reset their security status.
21
21
22
-
* Require users to provide contact methods again
23
-
* Delete app passwords
24
-
* Require MFA on all trusted devices
22
+
## Manage user authentication options
25
23
26
-
## Manage authentication methods
27
-
28
-
As an administrator assigned the Authentication Administrator role you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object.
29
-
30
-

24
+
If you're assigned the *Authentication Administrator* role you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object. To manage user settings, complete the following steps:
31
25
32
26
1. Sign in to the [Azure portal](https://portal.azure.com).
33
27
1. On the left, select **Azure Active Directory** > **Users** > **All users**.
34
-
1. Choose the user you wish to perform an action on and select **Authentication methods**.
35
-
-**Reset Password** will reset the user's password and assign a temporary password that must be changed on the next sign in.
36
-
-**Require Re-register MFA** will make it so that when the user signs in next time, they will be requested to setup a new MFA authentication method.
37
-
-**Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it is required by the policy on the device.
28
+
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
29
+
-**Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
30
+
-**Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
31
+
-**Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
32
+
33
+

38
34
39
35
## Delete users existing app passwords
40
36
41
-
This setting deletes all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created. Global administrator permissions are required to perform this action.
37
+
If needed, you can delete all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created. *Global administrator* permissions are required to perform this action.
42
38
43
-
### How to delete users existing app passwords
39
+
To delete a user's app passwords, complete the following steps:
44
40
45
41
1. Sign in to the [Azure portal](https://portal.azure.com).
46
-
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
47
-
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
48
-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
49
-
5. Select **Manage user settings**.
50
-
6. Check the box for **Delete all existing app passwords generated by the selected users**.
42
+
1. On the left-hand side, select **Azure Active Directory** > **Users** > **All users**.
43
+
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
44
+
[](media/howto-mfa-userstates/selectmfa.png#lightbox)
45
+
1. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
46
+
1. Select **Manage user settings**, then check the box for **Delete all existing app passwords generated by the selected users**, as shown in the following example:
51
47

52
-
7. Click **save**.
53
-
8. Click **close**.
48
+
1. Select **save**, then **close**.
54
49
55
50
## Next steps
56
51
57
-
- Get more information about how to [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md)
58
-
- If your users need help, point them towards the [User guide for two-step verification](../user-help/multi-factor-authentication-end-user.md)
52
+
This article helped configure individual user settings. To configure Azure Multi-Factor Authentication service settings, see [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md)
53
+
54
+
If your users need help, see the [User guide for Azure Multi-Factor Authentication](../user-help/multi-factor-authentication-end-user.md).
0 commit comments