Skip to content

Commit d1f6e5c

Browse files
Merge pull request #111227 from iainfoulds/azuread-mfaconcepts
[AzureAD] Concepts and how-to updates
2 parents 628c831 + ee7c197 commit d1f6e5c

9 files changed

+118
-244
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38336,6 +38336,11 @@
3833638336
"redirect_url": "/azure/active-directory/authentication/howto-password-ban-bad-configure",
3833738337
"redirect_document_id": false
3833838338
},
38339+
{
38340+
"source_path": "articles/active-directory/authentication/multi-factor-authentication-security-best-practices.md",
38341+
"redirect_url": "/azure/active-directory/authentication/howto-mfa-getstarted",
38342+
"redirect_document_id": false
38343+
},
3833938344
{
3834038345
"source_path": "articles/active-directory/active-directory-passwords-reset-register.md",
3834138346
"redirect_url": "/azure/active-directory/user-help/active-directory-passwords-reset-register",

articles/active-directory/authentication/TOC.yml

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -42,17 +42,13 @@
4242
items:
4343
- name: How MFA works
4444
href: concept-mfa-howitworks.md
45-
- name: License your users
46-
href: concept-mfa-licensing.md
47-
- name: Manage an Auth Provider
48-
href: concept-mfa-authprovider.md
49-
- name: Security guidance
50-
href: multi-factor-authentication-security-best-practices.md
5145
- name: Data residency
5246
href: concept-mfa-data-residency.md
47+
- name: Licenses
48+
href: concept-mfa-licensing.md
5349
- name: MFA for Office 365
5450
href: https://docs.microsoft.com/office365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide
55-
- name: MFA FAQ
51+
- name: FAQ
5652
href: multi-factor-authentication-faq.md
5753
- name: Azure AD password protection
5854
items:
@@ -72,16 +68,18 @@
7268
href: howto-sspr-authenticationdata.md
7369
- name: SSPR for Windows clients
7470
href: howto-sspr-windows.md
75-
- name: Cloud-based MFA
71+
- name: Azure Multi-Factor Authentication
7672
items:
7773
- name: Deployment guide
7874
href: howto-mfa-getstarted.md
79-
- name: Per user MFA
80-
href: howto-mfa-userstates.md
81-
- name: User and device settings
82-
href: howto-mfa-userdevicesettings.md
8375
- name: Configure settings
8476
href: howto-mfa-mfasettings.md
77+
- name: Configure users
78+
href: howto-mfa-userdevicesettings.md
79+
- name: Enable per-user MFA
80+
href: howto-mfa-userstates.md
81+
- name: Configure authentication providers
82+
href: concept-mfa-authprovider.md
8583
- name: Directory Federation
8684
items:
8785
- name: Windows Server 2016 AD FS Adapter

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ ms.collection: M365-identity-device-management
1717
---
1818
# When to use an Azure Multi-Factor Authentication Provider
1919

20+
> [!IMPORTANT]
21+
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
22+
2023
Two-step verification is available by default for global administrators who have Azure Active Directory, and Office 365 users. However, if you wish to take advantage of [advanced features](howto-mfa-mfasettings.md) then you should purchase the full version of Azure Multi-Factor Authentication (MFA).
2124

2225
An Azure Multi-Factor Auth Provider is used to take advantage of features provided by Azure Multi-Factor Authentication for users who **do not have licenses**.
2326

24-
> [!NOTE]
25-
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
26-
2727
## Caveats related to the Azure MFA SDK
2828

2929
Note the SDK has been deprecated and will only continue to work until November 14, 2018. After that time, calls to the SDK will fail.

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 12/16/2019
9+
ms.date: 04/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ A user who has previously set up at least one method that can be used for Multi-
136136

137137
## Next steps
138138

139-
[Force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-authentication-methods)
139+
[Force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options)
140140

141141
[Enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md)
142142

Lines changed: 24 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Manage users and devices Azure MFA - Azure Active Directory
3-
description: How can administrators change user settings such as forcing the users to do the proof-up process again.
2+
title: Manage user settings for Azure Multi-Factor Authentication - Azure Active Directory
3+
description: Learn how you can configure Azure Active Directory user settings for Azure Multi-Factor Authentication
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/21/2019
9+
ms.date: 04/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -15,44 +15,40 @@ ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Manage user settings with Azure Multi-Factor Authentication in the cloud
18+
# Manage user settings for Azure Multi-Factor Authentication
1919

20-
As an administrator, you can manage the following user and device settings:
20+
To help manage the users of Azure Multi-Factor Authentication, you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions. For users that have defined app passwords, you can also choose to delete these passwords, causing legacy authentication to fail in those applications. These actions may be necessary if you need to provide assistance to a user, or want to reset their security status.
2121

22-
* Require users to provide contact methods again
23-
* Delete app passwords
24-
* Require MFA on all trusted devices
22+
## Manage user authentication options
2523

26-
## Manage authentication methods
27-
28-
As an administrator assigned the Authentication Administrator role you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object.
29-
30-
![Manage authentication methods from the Azure portal](./media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png)
24+
If you're assigned the *Authentication Administrator* role you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object. To manage user settings, complete the following steps:
3125

3226
1. Sign in to the [Azure portal](https://portal.azure.com).
3327
1. On the left, select **Azure Active Directory** > **Users** > **All users**.
34-
1. Choose the user you wish to perform an action on and select **Authentication methods**.
35-
- **Reset Password** will reset the user's password and assign a temporary password that must be changed on the next sign in.
36-
- **Require Re-register MFA** will make it so that when the user signs in next time, they will be requested to setup a new MFA authentication method.
37-
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it is required by the policy on the device.
28+
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
29+
- **Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
30+
- **Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
31+
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
32+
33+
![Manage authentication methods from the Azure portal](./media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png)
3834

3935
## Delete users existing app passwords
4036

41-
This setting deletes all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created. Global administrator permissions are required to perform this action.
37+
If needed, you can delete all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created. *Global administrator* permissions are required to perform this action.
4238

43-
### How to delete users existing app passwords
39+
To delete a user's app passwords, complete the following steps:
4440

4541
1. Sign in to the [Azure portal](https://portal.azure.com).
46-
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
47-
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
48-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
49-
5. Select **Manage user settings**.
50-
6. Check the box for **Delete all existing app passwords generated by the selected users**.
42+
1. On the left-hand side, select **Azure Active Directory** > **Users** > **All users**.
43+
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
44+
[![](media/howto-mfa-userstates/selectmfa-cropped.png "Select Multi-Factor Authentication from the Users window in Azure AD")](media/howto-mfa-userstates/selectmfa.png#lightbox)
45+
1. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
46+
1. Select **Manage user settings**, then check the box for **Delete all existing app passwords generated by the selected users**, as shown in the following example:
5147
![Delete all existing app passwords](./media/howto-mfa-userdevicesettings/deleteapppasswords.png)
52-
7. Click **save**.
53-
8. Click **close**.
48+
1. Select **save**, then **close**.
5449

5550
## Next steps
5651

57-
- Get more information about how to [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md)
58-
- If your users need help, point them towards the [User guide for two-step verification](../user-help/multi-factor-authentication-end-user.md)
52+
This article helped configure individual user settings. To configure Azure Multi-Factor Authentication service settings, see [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md)
53+
54+
If your users need help, see the [User guide for Azure Multi-Factor Authentication](../user-help/multi-factor-authentication-end-user.md).

0 commit comments

Comments
 (0)