Skip to content

Commit e3e1232

Browse files
Merge pull request #231365 from Justinha/sys-mfa-2
added links to methods and revised list
2 parents 3e0419b + db7f322 commit e3e1232

File tree

1 file changed

+12
-20
lines changed

1 file changed

+12
-20
lines changed

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 12 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 03/16/2023
7+
ms.date: 03/20/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -94,25 +94,17 @@ Content-Type: application/json
9494

9595
### How does system-preferred MFA determine the most secure method?
9696

97-
When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign-in with the most secure method according to the following order. The order of authentication methods is dynamic. It's updated as the security landscape changes, and as better authentication methods emerge.
98-
99-
1. Temporary Access Pass
100-
1. Certificate-based authentication
101-
1. FIDO2 security key
102-
1. Microsoft Authenticator notification
103-
1. Companion app notification
104-
1. Microsoft Authenticator time-based one-time password (TOTP)
105-
1. Companion app TOTP
106-
1. Hardware token based TOTP
107-
1. Software token based TOTP
108-
1. SMS over mobile
109-
1. OnewayVoiceMobileOTP
110-
1. OnewayVoiceAlternateMobileOTP
111-
1. OnewayVoiceOfficeOTP
112-
1. TwowayVoiceMobile
113-
1. TwowayVoiceAlternateMobile
114-
1. TwowayVoiceOffice
115-
1. TwowaySMSOverMobile
97+
When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign-in with the most secure method according to the following order. The order of authentication methods is dynamic. It's updated as the security landscape changes, and as better authentication methods emerge. Click the link for information about each method.
98+
99+
1. [Temporary Access Pass](howto-authentication-temporary-access-pass.md)
100+
1. [Certificate-based authentication](concept-certificate-based-authentication.md)
101+
1. [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
102+
1. [Time-based one-time password (TOTP)](concept-authentication-oath-tokens.md)<sup>1</sup>
103+
1. [Telephony](concept-authentication-phone-options.md)<sup>2</sup>
104+
105+
<sup>1</sup> Includes hardware or software TOTP from Microsoft Authenticator, Authenticator Lite, or third-party applications.
106+
<sup>2</sup> Includes SMS and voice calls.
107+
116108

117109
### How does system-preferred MFA affect AD FS or NPS extension?
118110

0 commit comments

Comments
 (0)