You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
13
13
---
14
-
# How to use additional context in Microsoft Authenticator notifications - Authentication Methods Policy
14
+
# How to use additional context in Microsoft Authenticator notifications - Authentication methods policy
15
15
16
16
This topic covers how to improve the security of user sign-in by adding the application name and geographic location of the sign-in to Microsoft Authenticator passwordless and push notifications.
17
17
18
18
## Prerequisites
19
19
20
-
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure Portal or Microsoft Graph API.
20
+
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
21
21
22
22
>[!NOTE]
23
23
>The [policy schema changes](#policy-schema-changes) have been improved. The policy schema for preview is deprecated. Make sure you use the new schema to help prevent errors.
| displayAppInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown application name in Microsoft Authenticator notification. |
88
88
| displayLocationInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown geographic location context in Microsoft Authenticator notification. |
| includeTarget | featureTarget | A single entity that is included in this feature. <br>You can only include one group for each feature.|
98
98
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
In **featureSettings**, change **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** from **default** to **enabled**.
112
112
113
-
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you do not want to allow passwordless, use **push**.
113
+
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
114
114
115
115
You might need to PATCH the entire schema to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example shows how to update **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
116
116
@@ -276,7 +276,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
276
276
In **featureSettings**, change the states of **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** to from **default** to **enabled.**
277
277
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
278
278
279
-
In addition, for each of the features, you will change the id of the excludeTarget to the ObjectID of the group from the Azure AD portal. This will exclude that group from seeing application name or geographic location.
279
+
In addition, for each of the features, you'll change the id of the excludeTarget to the ObjectID of the group from the Azure AD portal. This will exclude that group from seeing application name or geographic location.
280
280
281
281
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
282
282
@@ -434,7 +434,7 @@ To enable application name or geographic location in the Azure AD portal, comple
434
434
435
435
## Known issues
436
436
437
-
Additional context is not supported for Network Policy Server (NPS) or Active Directory Federation Services (AD FS).
437
+
Additional context isn't supported for Network Policy Server (NPS) or Active Directory Federation Services (AD FS).
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-number-match.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ This topic covers how to enable number matching in Microsoft Authenticator push
21
21
22
22
## Prerequisites
23
23
24
-
- Your organization needs to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure Portal or Microsoft Graph API.
24
+
- Your organization needs to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
25
25
26
26
>[!NOTE]
27
27
>The [policy schema changes](#policy-schema-changes) have been improved. The policy schema for preview is deprecated. Make sure you use the new schema to help prevent errors.
@@ -30,7 +30,7 @@ This topic covers how to enable number matching in Microsoft Authenticator push
30
30
31
31
## Number matching
32
32
33
-
Number matching can be targeted to only a single group, which can be dynamic or nested. On-premises synchronized security groups and cloud-only security groups are supported for the Authentication Method Policy.
33
+
Number matching can be targeted to only a single group, which can be dynamic or nested. On-premises synchronized security groups and cloud-only security groups are supported for the Authentication methods policy.
34
34
35
35
Number matching is available for the following scenarios. When enabled, all scenarios support number matching.
36
36
@@ -43,11 +43,11 @@ Number matching is available for the following scenarios. When enabled, all scen
43
43
>[!NOTE]
44
44
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
45
45
46
-
Number matching is not supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
46
+
Number matching isn't supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
47
47
48
48
### Multifactor authentication
49
49
50
-
When a user responds to an MFA push notification using the Authenticator app, they will be presented with a number. They need to type that number into the app to complete the approval.
50
+
When a user responds to an MFA push notification using the Authenticator app, they'll be presented with a number. They need to type that number into the app to complete the approval.
51
51
52
52

53
53
@@ -76,7 +76,7 @@ Make sure you run the latest version of the [NPS extension](https://www.microsof
76
76
77
77
Because the NPS extension can't show a number, a user who is enabled for number matching will still be prompted to **Approve**/**Deny**. However, you can create a registry key that overrides push notifications to ask a user to enter a One-Time Passcode (OTP). The user must have an OTP authentication method registered to see this behavior. Common OTP authentication methods include the OTP available in the Authenticator app, other software tokens, and so on.
78
78
79
-
If the user doesn't have an OTP method registered, they will continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
79
+
If the user doesn't have an OTP method registered, they'll continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
80
80
81
81
To create the registry key that overrides push notifications:
| includeTargets |[microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget?view=graph-rest-beta) collection | A collection of users or groups who are enabled to use the authentication method |
115
+
| includeTargets |[microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of users or groups who are enabled to use the authentication method |
116
116
| featureSettings |[microsoftAuthenticatorFeatureSettings](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of Microsoft Authenticator features. |
| displayAppInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown application name in Microsoft Authenticator notification. |
138
138
| displayLocationInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown geographic location context in Microsoft Authenticator notification. |
| excludeTarget | featureTarget | A single entity that is excluded from this feature. <br> Please note: You will be able to only exclude one group for number matching. |
147
-
| includeTarget | featureTarget | A single entity that is included in this feature. <br> Please note: You will be able to only set one group for number matching.|
146
+
| excludeTarget | featureTarget | A single entity that is excluded from this feature. <br> Please note: You'll be able to only exclude one group for number matching. |
147
+
| includeTarget | featureTarget | A single entity that is included in this feature. <br> Please note: You'll be able to only set one group for number matching.|
148
148
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
#### Example of how to enable number matching for all users
163
163
164
-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** from **default** to **enabled**.
164
+
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** from **default** to **enabled**.
165
165
166
-
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
166
+
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you don't want to allow passwordless, use **push**.
167
167
168
168
>[!NOTE]
169
169
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
@@ -216,8 +216,8 @@ GET https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationM
216
216
217
217
#### Example of how to enable number matching for a single group
218
218
219
-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
220
-
Inside the **includeTarget**, you will need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
219
+
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
220
+
Inside the **includeTarget**, you'll need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
221
221
222
222
You need to PATCH the entire configuration to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
223
223
@@ -262,7 +262,7 @@ GET https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationM
262
262
263
263
#### Example of removing the excluded group from number matching
264
264
265
-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
265
+
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
266
266
You need to change the **id** of the **excludeTarget** to `00000000-0000-0000-0000-000000000000`.
267
267
268
268
You need to PATCH the entire configuration to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
@@ -302,7 +302,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
302
302
303
303
### Turn off number matching
304
304
305
-
To turn number matching off, you will need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
305
+
To turn number matching off, you'll need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
0 commit comments