You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md
+32-2Lines changed: 32 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,13 +91,21 @@ To update certificate user IDs for federated users, configure Azure AD Connect t
91
91
92
92
### Synchronize X509:\<PN>PrincipalNameValue
93
93
94
-
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<PN>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
94
+
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
95
+
96
+
```
97
+
"X509:\<PN>"&[userPrincipalName]
98
+
```
95
99
96
100
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/pnexpression.png" alt-text="Screenshot of how to sync x509.":::
97
101
98
102
### Synchronize X509:\<RFC822>RFC822Name
99
103
100
-
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<RFC822>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
104
+
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
105
+
106
+
```
107
+
"X509:\<RFC822>"&[userPrincipalName]
108
+
```
101
109
102
110
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/rfc822expression.png" alt-text="Screenshot of how to sync RFC822Name.":::
103
111
@@ -122,11 +130,33 @@ AlternativeSecurityId isn't part of the default attributes. An administrator nee
122
130
123
131
1. Create an inbound synchronization rule to transform from altSecurityIdentities to alternateSecurityId attribute.
124
132
133
+
In the inbound rule, use the following options.
134
+
135
+
|Option | Value |
136
+
|-------|-------|
137
+
|Name | Descriptive name of the rule, such as: In from AD - altSecurityIdentities |
138
+
|Connected System | Your on-premises AD domain |
139
+
|Connected System Object Type | user |
140
+
|Metaverse Object Type | person |
141
+
|Precedence | Choose a random high number not currently used |
142
+
143
+
Then proceed to the Transformations tab and do a direct mapping of the target attribute of **alternativeSecurityId** to **altSecurityIdentities** as shown below.
144
+
125
145
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-inbound.png" alt-text="Screenshot of how to transform from altSecurityIdentities to alternateSecurityId attribute":::
126
146
127
147
1. Create an outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds
128
148
alt-security-identity-add.
129
149
150
+
|Option | Value |
151
+
|-------|-------|
152
+
|Name | Descriptive name of the rule, such as: Out to AAD - certificateUserIds |
153
+
|Connected System | Your Azure AD doamin |
154
+
|Connected System Object Type | user |
155
+
|Metaverse Object Type | person |
156
+
|Precedence | Choose a random high number not currently used |
157
+
158
+
Then proceed to the Transformations tab and change your FlowType option to *Expression*, the target attribute to **certificateUserIds** and then input the below expression in to the Source field.
159
+
130
160
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-outbound.png" alt-text="Screenshot of outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds":::
131
161
132
162
To map the pattern supported by certificateUserIds, administrators must use expressions to set the correct value.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md
@@ -62,13 +62,13 @@ Devices joined to Azure AD using Azure AD Join or Hybrid Azure AD Join receive a
62
62
63
63
### Show option to remain signed-in
64
64
65
-
When a user selects **Yes** on the *Stay signed in?* option during sign-in, a persistent cookie is set on the browser. This persistent cookie remembers both first and second factor, and it applies only for authentication requests in the browser.
65
+
When a user selects **Yes** on the *Stay signed in?*prompt option during sign-in, a persistent cookie is set on the browser. This persistent cookie remembers both first and second factor, and it applies only for authentication requests in the browser.
66
66
67
67

68
68
69
69
If you have an Azure AD Premium 1 license, we recommend using Conditional Access policy for *Persistent browser session*. This policy overwrites the *Stay signed in?* setting and provides an improved user experience. If you don't have an Azure AD Premium 1 license, we recommend enabling the stay signed in setting for your users.
70
70
71
-
For more information on configuring the option to let users remain signed-in, see [Customize your Azure AD sign-in page](../fundamentals/active-directory-users-profile-azure-portal.md#learn-about-the-stay-signed-in-prompt).
71
+
For more information on configuring the option to let users remain signed-in, see [How to manage the 'Stay signed in?' prompt](../fundamentals/how-to-manage-stay-signed-in-prompt.md).
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-number-match.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 02/16/2023
7
+
ms.date: 03/28/2023
8
8
ms.author: justinha
9
9
author: justinha
10
10
ms.collection: M365-identity-device-management
@@ -68,13 +68,13 @@ AD FS adapter will require number matching on supported versions of Windows Serv
68
68
69
69
### NPS extension
70
70
71
-
Although NPS doesn't support number matching, the latest NPS extension does support One-Time Password (OTP) methods such as the OTP available in Microsoft Authenticator, other software tokens, and hardware FOBs. OTP sign-in provides better security than the alternative **Approve**/**Deny** experience. Make sure you run the latest version of the [NPS extension](https://www.microsoft.com/download/details.aspx?id=54688).
71
+
Although NPS doesn't support number matching, the latest NPS extension does support time-based one-time password (TOTP) methods such as the TOTP available in Microsoft Authenticator, other software tokens, and hardware FOBs. TOTP sign-in provides better security than the alternative **Approve**/**Deny** experience. Make sure you run the latest version of the [NPS extension](https://www.microsoft.com/download/details.aspx?id=54688).
72
72
73
-
After May 8, 2023, when number matching is enabled for all users, anyone who performs a RADIUS connection with NPS extension version 1.2.2216.1 or later will be prompted to sign in with an OTP method instead.
73
+
After May 8, 2023, when number matching is enabled for all users, anyone who performs a RADIUS connection with NPS extension version 1.2.2216.1 or later will be prompted to sign in with a TOTP method instead.
74
74
75
-
Users must have an OTP authentication method registered to see this behavior. Without an OTP method registered, users continue to see **Approve**/**Deny**.
75
+
Users must have a TOTP authentication method registered to see this behavior. Without a TOTP method registered, users continue to see **Approve**/**Deny**.
76
76
77
-
Prior to the release of NPS extension version 1.2.2216.1 after May 8, 2023, organizations that run any of these earlier versions of NPS extension can modify the registry to require users to enter an OTP:
77
+
Prior to the release of NPS extension version 1.2.2216.1 after May 8, 2023, organizations that run any of these earlier versions of NPS extension can modify the registry to require users to enter a TOTP:
78
78
79
79
- 1.2.2131.2
80
80
- 1.2.1959.1
@@ -85,29 +85,29 @@ Prior to the release of NPS extension version 1.2.2216.1 after May 8, 2023, orga
85
85
- 1.0.1.40
86
86
87
87
>[!NOTE]
88
-
>NPS extensions versions earlier than 1.0.1.40 don't support OTP enforced by number matching. These versions will continue to present users with **Approve**/**Deny**.
88
+
>NPS extensions versions earlier than 1.0.1.40 don't support TOTP enforced by number matching. These versions will continue to present users with **Approve**/**Deny**.
89
89
90
-
To create the registry entry to override the **Approve**/**Deny** options in push notifications and require an OTP instead:
90
+
To create the registry entry to override the **Approve**/**Deny** options in push notifications and require a TOTP instead:
91
91
92
92
1. On the NPS Server, open the Registry Editor.
93
93
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
94
94
1. Create the following String/Value pair:
95
-
Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
96
-
Value = TRUE
95
+
-Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
96
+
-Value = TRUE
97
97
1. Restart the NPS Service.
98
98
99
99
In addition:
100
100
101
-
- Users who perform OTP must have either Microsoft Authenticator registered as an authentication method, or some other hardware or software OATH token. A user who can't use an OTP method will always see **Approve**/**Deny** options with push notifications if they use a version of NPS extension earlier than 1.2.2216.1.
101
+
- Users who perform TOTP must have either Microsoft Authenticator registered as an authentication method, or some other hardware or software OATH token. A user who can't use an OTP method will always see **Approve**/**Deny** options with push notifications if they use a version of NPS extension earlier than 1.2.2216.1.
102
102
- Users must be [enabled for number matching](#enable-number-matching-in-the-portal).
103
103
- The NPS Server where the NPS extension is installed must be configured to use PAP protocol. For more information, see [Determine which authentication methods your users can use](howto-mfa-nps-extension.md#determine-which-authentication-methods-your-users-can-use).
104
104
105
105
>[!IMPORTANT]
106
-
>MSCHAPv2 doesn't support OTP. If the NPS Server isn't configured to use PAP, user authorization will fail with events in the **AuthZOptCh** log of the NPS Extension server in Event Viewer:<br>
106
+
>MSCHAPv2 doesn't support TOTP. If the NPS Server isn't configured to use PAP, user authorization will fail with events in the **AuthZOptCh** log of the NPS Extension server in Event Viewer:<br>
107
107
>NPS Extension for Azure MFA: Challenge requested in Authentication Ext for User npstesting_ap.
108
108
>You can configure the NPS Server to support PAP. If PAP is not an option, you can set OVERRIDE_NUMBER_MATCHING_WITH_OTP = FALSE to fall back to Approve/Deny push notifications.
109
109
110
-
If your organization uses Remote Desktop Gateway and the user is registered for OTP code along with Microsoft Authenticator push notifications, the user won't be able to meet the Azure AD MFA challenge and Remote Desktop Gateway sign-in will fail. In this case, you can set OVERRIDE_NUMBER_MATCHING_WITH_OTP = FALSE to fall back to **Approve**/**Deny** push notifications with Microsoft Authenticator.
110
+
If your organization uses Remote Desktop Gateway and the user is registered for a TOTP code along with Microsoft Authenticator push notifications, the user won't be able to meet the Azure AD MFA challenge and Remote Desktop Gateway sign-in will fail. In this case, you can set OVERRIDE_NUMBER_MATCHING_WITH_OTP = FALSE to fall back to **Approve**/**Deny** push notifications with Microsoft Authenticator.
111
111
112
112
### Apple Watch supported for Microsoft Authenticator
113
113
@@ -329,24 +329,24 @@ Here are differences in sign-in scenarios that Microsoft Authenticator users wil
329
329
- Authentication flows will require users to do number match when using Microsoft Authenticator. If their version of Microsoft Authenticator doesn’t support number match, their authentication will fail.
330
330
- Self-service password reset (SSPR) and combined registration will also require number match when using Microsoft Authenticator.
331
331
- AD FS adapter will require number matching on [supported versions of Windows Server](#ad-fs-adapter). On earlier versions, users will continue to see the **Approve**/**Deny** experience and won’t see number matching until you upgrade.
332
-
- NPS extension versions beginning 1.2.2131.2 will require users to do number matching. Because the NPS extension can’t show a number, the user will be asked to enter a One-Time Passcode (OTP). The user must have an OTP authentication method such as Microsoft Authenticator or software OATH tokens registered to see this behavior. If the user doesn’t have an OTP method registered, they’ll continue to get the **Approve**/**Deny** experience.
332
+
- NPS extension versions beginning 1.2.2131.2 will require users to do number matching. Because the NPS extension can’t show a number, the user will be asked to enter a TOTP. The user must have a TOTP authentication method such as Microsoft Authenticator or software OATH tokens registered to see this behavior. If the user doesn’t have a TOTP method registered, they’ll continue to get the **Approve**/**Deny** experience.
333
333
334
334
To create a registry entry that overrides this behavior and prompts users with **Approve**/**Deny**:
335
335
336
336
1. On the NPS Server, open the Registry Editor.
337
337
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
338
338
1. Create the following String/Value:
339
-
Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
340
-
Value = FALSE
339
+
-Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
340
+
-Value = FALSE
341
341
1. Restart the NPS Service.
342
342
343
343
- Apple Watch will remain unsupported for number matching. We recommend you uninstall the Microsoft Authenticator Apple Watch app because you have to approve notifications on your phone.
344
344
345
-
### How can users enter an OTP with the NPS extension?
345
+
### How can users enter a TOTP with the NPS extension?
346
346
347
-
The VPN and NPS server must be using PAP protocol for OTP prompts to appear. If they're using a protocol that doesn't support OTP, such as MSCHAPv2, they'll continue to see the **Approve/Deny** notifications.
347
+
The VPN and NPS server must be using PAP protocol for TOTP prompts to appear. If they're using a protocol that doesn't support TOTP, such as MSCHAPv2, they'll continue to see the **Approve/Deny** notifications.
348
348
349
-
### Will users get a prompt similar to a number matching prompt, but will need to enter an OTP?
349
+
### Will users get a prompt similar to a number matching prompt, but will need to enter a TOTP?
350
350
351
351
They'll see a prompt to supply a verification code. They must select their account in Microsoft Authenticator and enter the random generated code that appears there.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ Registration features for passwordless authentication methods rely on the combin
47
47
48
48
1. Sign in to the [Azure portal](https://portal.azure.com).
49
49
1. Browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Authentication method policy**.
50
-
1. Under the method **FIDO2 Security Key**, click **All users**, or click **Add groups** to select specific groups.
50
+
1. Under the method **FIDO2 Security Key**, click **All users**, or click **Add groups** to select specific groups.*Only security groups are supported*.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension-errors.md
+3-28Lines changed: 3 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,37 +98,12 @@ If your users are [Having trouble with two-step verification](https://support.mi
98
98
99
99
### Health check script
100
100
101
-
The [Azure AD MFA NPS Extension health check script](/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/) performs a basic health check when troubleshooting the NPS extension. Run the script and choose option 3.
101
+
The [Azure AD MFA NPS Extension health check script](/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/) performs a basic health check when troubleshooting the NPS extension. Run the script and choose option **1** to isolate the cause of the potential issue.
102
102
103
103
### Contact Microsoft support
104
104
105
105
If you need additional help, contact a support professional through [Azure Multi-Factor Authentication Server support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, the ID of the user who saw the error, and debug logs.
106
106
107
-
To collect debug logs for support diagnostics, use the following steps on the NPS server:
107
+
To collect debug logs for support diagnostics, run the [Azure AD MFA NPS Extension health check script](/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/)on the NPS server and choose option **4** to collect logs.
108
108
109
-
1. Open Registry Editor and browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa set **VERBOSE_LOG** to **TRUE**
110
-
2. Open an Administrator command prompt and run these commands:
0 commit comments