Skip to content

Commit e19bd41

Browse files
Merge pull request #253206 from Justinha/ado88607
Update how-to-migrate-mfa-server-to-azure-mfa.md
2 parents 9a35d78 + 4f1f53c commit e19bd41

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: how-to
10-
ms.date: 01/29/2023
10+
ms.date: 09/28/2023
1111

1212
ms.author: justinha
1313
author: Gargi-Sinha
@@ -46,7 +46,7 @@ If you can't move your user authentication, see the step-by-step guidance for [M
4646
- Upgrade to AD FS for Windows Server 2019, Farm behavior level (FBL) 4. This upgrade enables you to select authentication provider based on group membership for a more seamless user transition. While it's possible to migrate while on AD FS for Windows Server 2016 FBL 3, it isn't as seamless for users. During the migration, users are prompted to select an authentication provider (MFA Server or Microsoft Entra multifactor authentication) until the migration is complete.
4747
- Permissions
4848
- Enterprise administrator role in Active Directory to configure AD FS farm for Microsoft Entra multifactor authentication
49-
- Global administrator role in Microsoft Entra ID to perform configuration of Microsoft Entra ID using Azure AD PowerShell
49+
- Global administrator role in Microsoft Entra ID to configure Microsoft Entra ID by using PowerShell
5050

5151

5252
## Considerations for all migration paths

0 commit comments

Comments
 (0)