Skip to content

Commit e16f0e3

Browse files
committed
review fixes
1 parent 9be914d commit e16f0e3

File tree

2 files changed

+26
-26
lines changed

2 files changed

+26
-26
lines changed

articles/active-directory/authentication/howto-mfaserver-adfs-2.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Use Azure MFA Server with AD FS 2.0
3-
description: Describes how to get started with Azure MFA and AD FS 2.0.
2+
title: Use Azure Active Directory Multi-Factor Authentication Server with AD FS 2.0
3+
description: Describes how to get started with Azure Active Directory Multi-Factor Authentication and AD FS 2.0.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
@@ -22,7 +22,7 @@ This article is for organizations that are federated with Azure Active Directory
2222
This documentation covers using the Azure Multi-Factor Authentication Server with AD FS 2.0. For information about AD FS, see [Securing cloud and on-premises resources using Azure Multi-Factor Authentication Server with Windows Server](howto-mfaserver-adfs-windows-server.md).
2323

2424
> [!IMPORTANT]
25-
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
25+
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure Active Directory Multi-Factor Authentication service by using the latest Migration Utility included in the most recent [Azure Active Directory Multi-Factor Authentication Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure Active Directory Multi-Factor Authentication Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
2626
>
2727
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
2828
>

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Getting started Azure MFA Server
3-
description: Step-by-step get started with Azure MFA Server on-premises
2+
title: Getting started Azure Active Directory Multi-Factor Authentication Server
3+
description: Step-by-step get started with Azure Active Directory Multi-Factor Authentication Server on-premises
44

55
services: multi-factor-authentication
66
ms.service: active-directory
@@ -24,7 +24,7 @@ ms.collection: M365-identity-device-management
2424
This page covers a new installation of the server and setting it up with on-premises Active Directory. If you already have the MFA server installed and are looking to upgrade, see [Upgrade to the latest Azure Multi-Factor Authentication Server](howto-mfaserver-deploy-upgrade.md). If you're looking for information on installing just the web service, see [Deploying the Azure Multi-Factor Authentication Server Mobile App Web Service](howto-mfaserver-deploy-mobileapp.md).
2525

2626
> [!IMPORTANT]
27-
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
27+
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure Active Directory Multi-Factor Authentication service by using the latest Migration Utility included in the most recent [Azure Active Directory Multi-Factor Authentication Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure Active Directory Multi-Factor Authentication Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
2828
2929
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
3030
@@ -42,9 +42,9 @@ A good guideline for the amount of memory you need is the number of users you ex
4242
| 100,000-200,001 | 16 GB |
4343
| 200,001+ | 32 GB |
4444

45-
Do you need to set up multiple servers for high availability or load balancing? There are many ways to set up this configuration with Azure MFA Server. When you install your first Azure MFA Server, it becomes the master. Any other servers become subordinate, and automatically synchronize users and configuration with the master. Then, you can configure one primary server and have the rest act as backup, or you can set up load balancing among all the servers.
45+
Do you need to set up multiple servers for high availability or load balancing? There are many ways to set up this configuration with Azure Active Directory Multi-Factor Authentication Server. When you install your first Azure Active Directory Multi-Factor Authentication Server, it becomes the master. Any other servers become subordinate, and automatically synchronize users and configuration with the master. Then, you can configure one primary server and have the rest act as backup, or you can set up load balancing among all the servers.
4646

47-
When a master Azure MFA Server goes offline, the subordinate servers can still process two-step verification requests. However, you can't add new users and existing users can't update their settings until the master is back online or a subordinate gets promoted.
47+
When a master Azure Active Directory Multi-Factor Authentication Server goes offline, the subordinate servers can still process two-step verification requests. However, you can't add new users and existing users can't update their settings until the master is back online or a subordinate gets promoted.
4848

4949
### Prepare your environment
5050

@@ -56,17 +56,17 @@ Make sure the server that you're using for Azure Multi-Factor Authentication mee
5656
| Software |<li>Windows Server 2022<sup>1</sup><li>Windows Server 2019<sup>1</sup></li><li>Windows Server 2016</li><li>Windows Server 2012 R2</li><li>Windows Server 2012</li><li>Windows Server 2008/R2 (with [ESU](/lifecycle/faq/extended-security-updates) only)</li><li>Windows 10</li><li>Windows 8.1, all editions</li><li>Windows 8, all editions</li><li>Windows 7, all editions (with [ESU](/lifecycle/faq/extended-security-updates) only)</li><li>Microsoft .NET 4.0 Framework</li><li>IIS 7.0 or greater if installing the user portal or web service SDK</li> |
5757
| Permissions | Domain Administrator or Enterprise Administrator account to register with Active Directory |
5858

59-
<sup>1</sup>If Azure MFA Server fails to activate on an Azure VM that runs Windows Server 2019 or later, try using an earlier version of Windows Server.
59+
<sup>1</sup>If Azure Active Directory Multi-Factor Authentication Server fails to activate on an Azure VM that runs Windows Server 2019 or later, try using an earlier version of Windows Server.
6060

61-
### Azure MFA Server Components
61+
### Azure Active Directory Multi-Factor Authentication Server Components
6262

63-
There are three web components that make up Azure MFA Server:
63+
There are three web components that make up Azure Active Directory Multi-Factor Authentication Server:
6464

65-
* Web Service SDK - Enables communication with the other components and is installed on the Azure MFA application server
65+
* Web Service SDK - Enables communication with the other components and is installed on the Azure Active Directory Multi-Factor Authentication application server
6666
* User portal - An IIS web site that allows users to enroll in Azure Multi-Factor Authentication (MFA) and maintain their accounts.
6767
* Mobile App Web Service - Enables using a mobile app like the Microsoft Authenticator app for two-step verification.
6868

69-
All three components can be installed on the same server if the server is internet-facing. If breaking up the components, the Web Service SDK is installed on the Azure MFA application server and the User portal and Mobile App Web Service are installed on an internet-facing server.
69+
All three components can be installed on the same server if the server is internet-facing. If breaking up the components, the Web Service SDK is installed on the Azure Active Directory Multi-Factor Authentication application server and the User portal and Mobile App Web Service are installed on an internet-facing server.
7070

7171
### Azure Multi-Factor Authentication Server firewall requirements
7272

@@ -108,20 +108,20 @@ If you aren't using the Event Confirmation feature, and your users aren't using
108108

109109
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
110110

111-
Follow these steps to download the Azure AD Multi-Factor Authentication Server from the Azure portal:
111+
Follow these steps to download the Azure AD Multi-Factor Authentication Server:
112112

113113
> [!IMPORTANT]
114-
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
114+
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-mfa-user-authentication.md) to the cloud-based Azure Active Directory Multi-Factor Authentication service by using the latest Migration Utility included in the most recent [Azure Active Directory Multi-Factor Authentication Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure Active Directory Multi-Factor Authentication Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
115115
>
116116
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
117117
>
118118
> Existing customers that activated MFA Server before July 1, 2019 can download the latest version, future updates, and generate activation credentials as usual. The following steps only work if you were an existing MFA Server customer.
119119
120-
11. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
120+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
121121
1. Browse to **Protection** > **Multifactor authentication** > **Server settings**.
122122
4. Select **Download** and follow the instructions on the download page to save the installer.
123123

124-
![Download MFA Server from the Azure portal](./media/howto-mfaserver-deploy/downloadportal.png)
124+
![Download MFA Server](./media/howto-mfaserver-deploy/downloadportal.png)
125125

126126
5. Keep this page open as we will refer to it after running the installer.
127127

@@ -135,7 +135,7 @@ Now that you have downloaded the server you can install and configure it. Be sur
135135
* [Visual C++ Redistributable for Visual Studio 2017 (x64)](https://go.microsoft.com/fwlink/?LinkId=746572)
136136
* [Visual C++ Redistributable for Visual Studio 2017 (x86)](https://go.microsoft.com/fwlink/?LinkId=746571)
137137
3. When the installation finishes, select **Finish**. The configuration wizard starts.
138-
5. Back on the page that you downloaded the server from, click the **Generate Activation Credentials** button. Copy this information into the Azure MFA Server in the boxes provided and click **Activate**.
138+
5. Back on the page that you downloaded the server from, click the **Generate Activation Credentials** button. Copy this information into the Azure Active Directory Multi-Factor Authentication Server in the boxes provided and click **Activate**.
139139

140140
> [!NOTE]
141141
> Only global administrators are able to generate activation credentials in the Microsoft Entra admin center.
@@ -164,7 +164,7 @@ Now that the server is installed you want to add users. You can choose to create
164164

165165
### Manual import from Active Directory
166166

167-
1. In the Azure MFA Server, on the left, select **Users**.
167+
1. In the Azure Active Directory Multi-Factor Authentication Server, on the left, select **Users**.
168168
2. At the bottom, select **Import from Active Directory**.
169169
3. Now you can either search for individual users or search the AD directory for OUs with users in them. In this case, we specify the users OU.
170170
4. Highlight all the users on the right and click **Import**. You should receive a pop-up telling you that you were successful. Close the import window.
@@ -173,15 +173,15 @@ Now that the server is installed you want to add users. You can choose to create
173173

174174
### Automated synchronization with Active Directory
175175

176-
1. In the Azure MFA Server, on the left, select **Directory Integration**.
176+
1. In the Azure Active Directory Multi-Factor Authentication Server, on the left, select **Directory Integration**.
177177
2. Navigate to the **Synchronization** tab.
178178
3. At the bottom, choose **Add**
179179
4. In the **Add Synchronization Item** box that appears choose the Domain, OU **or** security group, Settings, Method Defaults, and Language Defaults for this synchronization task and click **Add**.
180180
5. Check the box labeled **Enable synchronization with Active Directory** and choose a **Synchronization interval** between one minute and 24 hours.
181181

182182
## How the Azure AD Multi-Factor Authentication Server handles user data
183183

184-
When you use the Multi-Factor Authentication (MFA) Server on-premises, a user's data is stored in the on-premises servers. No persistent user data is stored in the cloud. When the user performs a two-step verification, the MFA Server sends data to the Azure MFA cloud service to perform the verification. When these authentication requests are sent to the cloud service, the following fields are sent in the request and logs so that they are available in the customer's authentication/usage reports. Some of the fields are optional so they can be enabled or disabled within the Multi-Factor Authentication Server. The communication from the MFA Server to the MFA cloud service uses SSL/TLS over port 443 outbound. These fields are:
184+
When you use the Multi-Factor Authentication (MFA) Server on-premises, a user's data is stored in the on-premises servers. No persistent user data is stored in the cloud. When the user performs a two-step verification, the MFA Server sends data to the Azure Active Directory Multi-Factor Authentication cloud service to perform the verification. When these authentication requests are sent to the cloud service, the following fields are sent in the request and logs so that they are available in the customer's authentication/usage reports. Some of the fields are optional so they can be enabled or disabled within the Multi-Factor Authentication Server. The communication from the MFA Server to the MFA cloud service uses SSL/TLS over port 443 outbound. These fields are:
185185

186186
* Unique ID - either username or internal MFA server ID
187187
* First and last name (optional)
@@ -199,16 +199,16 @@ In addition to the fields above, the verification result (success/denial) and re
199199
> [!IMPORTANT]
200200
> Starting in March of 2019 the phone call options will not be available to MFA Server users in free/trial Azure AD tenants. SMS messages are not impacted by this change. Phone call will continue to be available to users in paid Azure AD tenants. This change only impacts free/trial Azure AD tenants.
201201
202-
## Back up and restore Azure MFA Server
202+
## Back up and restore Azure Active Directory Multi-Factor Authentication Server
203203

204204
Making sure that you have a good backup is an important step to take with any system.
205205

206-
To back up Azure MFA Server, ensure that you have a copy of the **C:\Program Files\Multi-Factor Authentication Server\Data** folder including the **PhoneFactor.pfdata** file.
206+
To back up Azure Active Directory Multi-Factor Authentication Server, ensure that you have a copy of the **C:\Program Files\Multi-Factor Authentication Server\Data** folder including the **PhoneFactor.pfdata** file.
207207

208208
In case a restore is needed complete the following steps:
209209

210-
1. Reinstall Azure MFA Server on a new server.
211-
2. Activate the new Azure MFA Server.
210+
1. Reinstall Azure Active Directory Multi-Factor Authentication Server on a new server.
211+
2. Activate the new Azure Active Directory Multi-Factor Authentication Server.
212212
3. Stop the **MultiFactorAuth** service.
213213
4. Overwrite the **PhoneFactor.pfdata** with the backed-up copy.
214214
5. Start the **MultiFactorAuth** service.
@@ -222,7 +222,7 @@ Once you have upgraded to or installed MFA Server version 8.x or higher, it is r
222222
## Next steps
223223

224224
- Set up and configure the [User portal](howto-mfaserver-deploy-userportal.md) for user self-service.
225-
- Set up and configure the Azure MFA Server with [Active Directory Federation Service](multi-factor-authentication-get-started-adfs.md), [RADIUS Authentication](howto-mfaserver-dir-radius.md), or [LDAP Authentication](howto-mfaserver-dir-ldap.md).
225+
- Set up and configure the Azure Active Directory Multi-Factor Authentication Server with [Active Directory Federation Service](multi-factor-authentication-get-started-adfs.md), [RADIUS Authentication](howto-mfaserver-dir-radius.md), or [LDAP Authentication](howto-mfaserver-dir-ldap.md).
226226
- Set up and configure [Remote Desktop Gateway and Azure Multi-Factor Authentication Server using RADIUS](howto-mfaserver-nps-rdg.md).
227227
- [Deploy the Azure Multi-Factor Authentication Server Mobile App Web Service](howto-mfaserver-deploy-mobileapp.md).
228228
- [Advanced scenarios with Azure Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md).

0 commit comments

Comments
 (0)