Skip to content

Commit e58055d

Browse files
committed
acrolinx and added Note from Michael
1 parent 77247a7 commit e58055d

File tree

2 files changed

+9
-8
lines changed

2 files changed

+9
-8
lines changed

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,8 @@ To manage the Authentication methods policy, click **Security** > **Authenticati
4141

4242
Only the [converged registration experience](concept-registration-mfa-sspr-combined.md) is aware of the Authentication methods policy. Users in scope of the Authentication methods policy but not the converged registration experience won't see the correct methods to register.
4343

44-
Management of some methods in the Authentication methods policy is currently in preview and management of the rest is generally available as noted in the portal. Registration and usage of the methods is considered general availability unless otherwise noted.
44+
>[!NOTE]
45+
>Some pieces of the Authentication methods policy experience are in preview. This includes management of Email OTP, third party software OATH tokens, SMS, and voice call as noted in the portal. Also, use of the authentication methods policy alone with the legacy MFA and SSPR polices disabled is a preview experience.
4546
4647
## Legacy MFA and SSPR policies
4748

@@ -104,7 +105,7 @@ Tenants are set to either Pre-migration or Migration in Progress by default, dep
104105
## Known issues
105106

106107
* Currently, all users must be enabled for at least one MFA method that isn't passwordless and the user can register in interrupt mode. Possible methods include Microsoft Authenticator, SMS, voice call, and software OATH/mobile app code. The method(s) can be enabled in any policy. If a user is not eligible for at least one of those methods, the user will see an error during registration and when visiting My Security Info. We're working to improve this experience to enable fully passwordless configurations.
107-
108+
108109
## Next steps
109110

110111
- [How to migrate MFA and SSPR policy settings to the Authentication methods policy](how-to-authentication-methods-manage.md)

articles/active-directory/authentication/how-to-authentication-methods-manage.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ If you've enabled other methods in the Authentication methods policy, write down
6969

7070
## Start the migration
7171

72-
After you capture available authentication methods from the policies you are currently using, you can start the migration. Open the Authentication methods policy, click **Manage migration**, and click **Migration in progress**. You'll want to set this option before you make any changes as it will apply your new policy to both sign-in and password reset scenarios.
72+
After you capture available authentication methods from the policies you're currently using, you can start the migration. Open the Authentication methods policy, click **Manage migration**, and click **Migration in progress**. You'll want to set this option before you make any changes as it will apply your new policy to both sign-in and password reset scenarios.
7373

7474
:::image type="content" border="true" source="./media/how-to-authentication-methods-manage/manage-migration.png" alt-text="Screenshot of Migration in progress.":::
7575

@@ -81,7 +81,7 @@ If your tenant is using both MFA and SSPR, you'll need to consider each method:
8181
- If the method is off in both legacy policies, leave it off for all users in the Authentication methods policy.
8282
- If the method is enabled only in one policy, you'll need to decide whether or not it should be available in all situations.
8383

84-
Where the policies match, you can easily match your current state. Where there is a mismatch, you will need to decide whether to enable or disable the method altogether. For example, suppose **Notification through mobile app** is enabled to allow push notifications for MFA. In the legacy SSPR policy, the **Mobile app notification** method isn't enabled. In that case, the legacy policies allow push notifications for MFA but not SSPR.
84+
Where the policies match, you can easily match your current state. Where there's a mismatch, you will need to decide whether to enable or disable the method altogether. For example, suppose **Notification through mobile app** is enabled to allow push notifications for MFA. In the legacy SSPR policy, the **Mobile app notification** method isn't enabled. In that case, the legacy policies allow push notifications for MFA but not SSPR.
8585

8686
In the Authentication methods policy, you'll then need to choose whether to enable **Microsoft Authenticator** for both SSPR and MFA or disable it (we recommend enabling Microsoft Authenticator).
8787

@@ -97,7 +97,7 @@ There are two controls for **Email one-time passcode**:
9797

9898
Targeting using include and exclude in the configuration's **Enable and target** section is used to enable email OTP for members of a tenant for use in **Password reset**.
9999

100-
There is a separate **Allow external users to use email OTP** control in the **Configure** section that controls use of email OTP for sign-in by B2B users. The authentication method cannot be disabled if this is enabled.
100+
There's a separate **Allow external users to use email OTP** control in the **Configure** section that controls use of email OTP for sign-in by B2B users. The authentication method can't be disabled if this control is enabled.
101101

102102
### Microsoft Authenticator
103103

@@ -109,7 +109,7 @@ If **Verification code from mobile app or hardware token** is enabled in the leg
109109

110110
### SMS and phone calls
111111

112-
In the legacy MFA policy, there are separate controls for **SMS** and **Phone calls**. In the legacy SSPR policy, however, there's a **Mobile phone** control that enables mobile phones for both SMS and voice calls. Another control for **Office phone** enables an office phone only for voice call.
112+
The legacy MFA policy has separate controls for **SMS** and **Phone calls**. But there's also a **Mobile phone** control that enables mobile phones for both SMS and voice calls. And another control for **Office phone** enables an office phone only for voice call.
113113

114114
The Authentication methods policy has controls for **SMS** and **Phone calls**, matching the legacy MFA policy. If your tenant is using SSPR and **Mobile phone** is enabled, you'll want to enable both **SMS** and **Phone calls** in the Authentication methods policy. If your tenant is using SSPR and **Office phone** is enabled, you'll want to enable **Phone calls** in the Authentication methods policy, and ensure that the **Office phone** option is enabled.
115115

@@ -119,11 +119,11 @@ The OATH token controls in the legacy MFA and SSPR policies were single controls
119119

120120
The Authentication methods policy has granular control with separate controls for each type of OATH token. Use of OTP from Microsoft Authenticator is controlled by the **Allow use of Microsoft Authenticator OTP** control in the **Microsoft Authenticator** section of the policy. Third-party apps are controlled by the **Third party software OATH tokens** section of the policy.
121121

122-
Another control for **Hardware OATH tokens** is coming soon. If you are using hardware OATH tokens, now in public preview, you should hold off on migrating OATH tokens and do not complete the migration process.
122+
Another control for **Hardware OATH tokens** is coming soon. If you're using hardware OATH tokens, now in public preview, you should hold off on migrating OATH tokens and don't complete the migration process.
123123

124124
### Security questions
125125

126-
A control for **Security questions** is coming soon. If you are using security questions, and don't want to disable them, make sure to keep them enabled in the legacy SSPR policy until the new control is available. You _can_ finish migration as described in the next section with security questions enabled.
126+
A control for **Security questions** is coming soon. If you're using security questions, and don't want to disable them, make sure to keep them enabled in the legacy SSPR policy until the new control is available. You _can_ finish migration as described in the next section with security questions enabled.
127127

128128
## Finish the migration
129129

0 commit comments

Comments
 (0)