Skip to content

Commit db93533

Browse files
committed
acrolinx fixes
1 parent a5658a3 commit db93533

File tree

2 files changed

+24
-24
lines changed

2 files changed

+24
-24
lines changed

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in Microsoft Authenticator notifications - Authentication Methods Policy
14+
# How to use additional context in Microsoft Authenticator notifications - Authentication methods policy
1515

1616
This topic covers how to improve the security of user sign-in by adding the application name and geographic location of the sign-in to Microsoft Authenticator passwordless and push notifications.
1717

1818
## Prerequisites
1919

20-
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure Portal or Microsoft Graph API.
20+
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
2121

2222
>[!NOTE]
2323
>The [policy schema changes](#policy-schema-changes) have been improved. The policy schema for preview is deprecated. Make sure you use the new schema to help prevent errors.
@@ -57,7 +57,7 @@ https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMetho
5757

5858
| Property | Type | Description |
5959
|---------|------|-------------|
60-
| id | String | The authentication method policy identifier. |
60+
| id | String | The Authentication method policy identifier. |
6161
| state | authenticationMethodState | Possible values are: **enabled**<br>**disabled** |
6262

6363
**RELATIONSHIPS**
@@ -87,7 +87,7 @@ https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMetho
8787
| displayAppInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown application name in Microsoft Authenticator notification. |
8888
| displayLocationInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown geographic location context in Microsoft Authenticator notification. |
8989

90-
#### Authentication Method Feature Configuration properties
90+
#### Authentication method feature configuration properties
9191

9292
**PROPERTIES**
9393

@@ -97,7 +97,7 @@ https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMetho
9797
| includeTarget | featureTarget | A single entity that is included in this feature. <br>You can only include one group for each feature.|
9898
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
9999

100-
#### Feature Target properties
100+
#### Feature target properties
101101

102102
**PROPERTIES**
103103

@@ -110,7 +110,7 @@ https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMetho
110110

111111
In **featureSettings**, change **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** from **default** to **enabled**.
112112

113-
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you do not want to allow passwordless, use **push**.
113+
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
114114

115115
You might need to PATCH the entire schema to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example shows how to update **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
116116

@@ -276,7 +276,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
276276
In **featureSettings**, change the states of **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** to from **default** to **enabled.**
277277
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
278278

279-
In addition, for each of the features, you will change the id of the excludeTarget to the ObjectID of the group from the Azure AD portal. This will exclude that group from seeing application name or geographic location.
279+
In addition, for each of the features, you'll change the id of the excludeTarget to the ObjectID of the group from the Azure AD portal. This will exclude that group from seeing application name or geographic location.
280280

281281
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
282282

@@ -434,7 +434,7 @@ To enable application name or geographic location in the Azure AD portal, comple
434434

435435
## Known issues
436436

437-
Additional context is not supported for Network Policy Server (NPS) or Active Directory Federation Services (AD FS).
437+
Additional context isn't supported for Network Policy Server (NPS) or Active Directory Federation Services (AD FS).
438438

439439
## Next steps
440440

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This topic covers how to enable number matching in Microsoft Authenticator push
2121
2222
## Prerequisites
2323

24-
- Your organization needs to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure Portal or Microsoft Graph API.
24+
- Your organization needs to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
2525

2626
>[!NOTE]
2727
>The [policy schema changes](#policy-schema-changes) have been improved. The policy schema for preview is deprecated. Make sure you use the new schema to help prevent errors.
@@ -30,7 +30,7 @@ This topic covers how to enable number matching in Microsoft Authenticator push
3030

3131
## Number matching
3232

33-
Number matching can be targeted to only a single group, which can be dynamic or nested. On-premises synchronized security groups and cloud-only security groups are supported for the Authentication Method Policy.
33+
Number matching can be targeted to only a single group, which can be dynamic or nested. On-premises synchronized security groups and cloud-only security groups are supported for the Authentication methods policy.
3434

3535
Number matching is available for the following scenarios. When enabled, all scenarios support number matching.
3636

@@ -43,11 +43,11 @@ Number matching is available for the following scenarios. When enabled, all scen
4343
>[!NOTE]
4444
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
4545
46-
Number matching is not supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
46+
Number matching isn't supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
4747

4848
### Multifactor authentication
4949

50-
When a user responds to an MFA push notification using the Authenticator app, they will be presented with a number. They need to type that number into the app to complete the approval.
50+
When a user responds to an MFA push notification using the Authenticator app, they'll be presented with a number. They need to type that number into the app to complete the approval.
5151

5252
![Screenshot of user entering a number match.](media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png)
5353

@@ -76,7 +76,7 @@ Make sure you run the latest version of the [NPS extension](https://www.microsof
7676

7777
Because the NPS extension can't show a number, a user who is enabled for number matching will still be prompted to **Approve**/**Deny**. However, you can create a registry key that overrides push notifications to ask a user to enter a One-Time Passcode (OTP). The user must have an OTP authentication method registered to see this behavior. Common OTP authentication methods include the OTP available in the Authenticator app, other software tokens, and so on.
7878

79-
If the user doesn't have an OTP method registered, they will continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
79+
If the user doesn't have an OTP method registered, they'll continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
8080

8181
To create the registry key that overrides push notifications:
8282

@@ -112,7 +112,7 @@ https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMetho
112112

113113
| Relationship | Type | Description |
114114
|--------------|------|-------------|
115-
| includeTargets | [microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget?view=graph-rest-beta) collection | A collection of users or groups who are enabled to use the authentication method |
115+
| includeTargets | [microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of users or groups who are enabled to use the authentication method |
116116
| featureSettings | [microsoftAuthenticatorFeatureSettings](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of Microsoft Authenticator features. |
117117

118118
#### MicrosoftAuthenticator includeTarget properties
@@ -137,17 +137,17 @@ https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMetho
137137
| displayAppInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown application name in Microsoft Authenticator notification. |
138138
| displayLocationInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown geographic location context in Microsoft Authenticator notification. |
139139

140-
#### Authentication Method Feature Configuration properties
140+
#### Authentication method feature configuration properties
141141

142142
**PROPERTIES**
143143

144144
| Property | Type | Description |
145145
|----------|------|-------------|
146-
| excludeTarget | featureTarget | A single entity that is excluded from this feature. <br> Please note: You will be able to only exclude one group for number matching. |
147-
| includeTarget | featureTarget | A single entity that is included in this feature. <br> Please note: You will be able to only set one group for number matching.|
146+
| excludeTarget | featureTarget | A single entity that is excluded from this feature. <br> Please note: You'll be able to only exclude one group for number matching. |
147+
| includeTarget | featureTarget | A single entity that is included in this feature. <br> Please note: You'll be able to only set one group for number matching.|
148148
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
149149

150-
#### Feature Target properties
150+
#### Feature target properties
151151

152152
**PROPERTIES**
153153

@@ -161,9 +161,9 @@ https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationMetho
161161
162162
#### Example of how to enable number matching for all users
163163

164-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** from **default** to **enabled**.
164+
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** from **default** to **enabled**.
165165

166-
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
166+
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you don't want to allow passwordless, use **push**.
167167

168168
>[!NOTE]
169169
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
@@ -216,8 +216,8 @@ GET https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationM
216216

217217
#### Example of how to enable number matching for a single group
218218

219-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
220-
Inside the **includeTarget**, you will need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
219+
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
220+
Inside the **includeTarget**, you'll need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
221221

222222
You need to PATCH the entire configuration to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
223223

@@ -262,7 +262,7 @@ GET https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationM
262262

263263
#### Example of removing the excluded group from number matching
264264

265-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
265+
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
266266
You need to change the **id** of the **excludeTarget** to `00000000-0000-0000-0000-000000000000`.
267267

268268
You need to PATCH the entire configuration to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
@@ -302,7 +302,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
302302

303303
### Turn off number matching
304304

305-
To turn number matching off, you will need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
305+
To turn number matching off, you'll need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
306306

307307
```json
308308
{

0 commit comments

Comments
 (0)