Skip to content

Commit e5e8f8f

Browse files
committed
[AzureAD-SSPR] Draft of new tutorial
1 parent e47ffe8 commit e5e8f8f

File tree

1 file changed

+132
-0
lines changed

1 file changed

+132
-0
lines changed
Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
---
2+
title: Enable Azure Active Directory self-service password reset
3+
description: In this tutorial, you learn how to enable Azure Active Directory self-service password reset for a group of users and test the password reset process.
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: 02/03/2020
9+
10+
ms.author: iainfou
11+
author: iainfoulds
12+
ms.reviewer: rhicock
13+
14+
ms.collection: M365-identity-device-management
15+
16+
# Customer intent: As an Azure AD Administrator, I want to learn how to enable and use self-service password reset so that my end-users can unlock their accounts or reset their passwords through a web browser.
17+
---
18+
# Tutorial: Enable users to unlock their account or reset passwords using Azure Active Directory self-service password reset
19+
20+
Azure Active Directory (Azure AD) self-service password reset (SSPR) gives users the ability to change or reset their password, with no administrator or help desk involvement. If a user's account is locked or they forget their password, they can follow prompts to unblock themselves and get. This ability reduces help desk calls and loss of productivity when a user can't sign in to their device or an application.
21+
22+
In this tutorial you learn how to:
23+
24+
> [!div class="checklist"]
25+
> * Enable self-service password reset for a group of Azure AD users
26+
> * Configure authentication methods and registration options
27+
> * Test the SSPR process as a user
28+
29+
## Prerequisites
30+
31+
To complete this tutorial, you need the following resources and privileges:
32+
33+
* A working Azure AD tenant with at least a trial license enabled.
34+
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
35+
* An account with *Global Administrator* privileges.
36+
* A non-administrator test user with a password you know, such as *testuser*.
37+
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../add-users-azure-active-directory.md).
38+
* A pilot group to test with that the non-administrator test user is a member of, such as *SSPR-Test-Group*.
39+
* If you need to create a group, see how to [Create a group and add members in Azure Active Directory](../active-directory-groups-create-azure-portal.md).
40+
41+
## Enable self-service password reset
42+
43+
You enable SSPR for *None*, *Selected*, or *All* users. These granular controls let you choose a subset of users to test the SSPR registration process and workflow. When you're comfortable with the process and can communicate with a broader set of users, you can select additional groups of use that can SSPR. Or, you can then enable SSPR for everyone in the Azure AD tenant.
44+
45+
In this tutorial, configure SSPR for a set of users in a test group. In the following example, the test group *SSPR-Test-Group* is used. Provide your own Azure AD group as needed:
46+
47+
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
48+
1. Search for and select **Azure Active Directory**, then choose **Password reset** from the menu on the left-hand side.
49+
1. From the **Properties** page, under the option *Self service password reset enabled*, choose **Select group**
50+
1. Browse for and select your Azure AD group, such as *SSPR-Test-Group*, then choose *Select*.
51+
52+
As part of a wider deployment of SSPR, nesting of groups are supported. Make sure that the users in the group(s) you choose have the appropriate licenses assigned. There's currently no validation process of these licensing requirements.
53+
1. To enable SSPR for the select users, select **Save**.
54+
55+
## Select authentication methods and registration options
56+
57+
When users need to unlock their account or reset their password, they're prompted for an additional confirmation method. This additional authentication factor makes sure that only approved SSPR events are completed. You can choose which authentication methods to allow, based on the registration information the user provides.
58+
59+
1. On the **Authentication methods** page from the menu in the left-hand side, set the **Number of methods required to reset** to *1*.
60+
1. Choose the **Methods available to users** your organization wants to allow. For this tutorial, check the boxes to enable the following methods:
61+
62+
* *Mobile app notification*
63+
* *Mobile app code*
64+
* *Email*
65+
* *Mobile phone*
66+
* *Office phone*
67+
68+
1. To apply the authentication methods, select **Save**.
69+
70+
Before users can unlock their account or reset a password, they must register their contact information. This contact information is for the different authentication methods configured in the previous steps. A user account enabled for SSPR can't use the feature without this authentication method contact information provided.
71+
72+
An administrator can manually provided contact information, or users can go to a registration portal to provide the information themselves. In this tutorial, configure the users to be prompted for registration when they next sign-in.
73+
74+
1. On the **Registration** page from the menu in the left-hand side, select *Yes* for **Require users to register when signing in**.
75+
1. It's important that contact information is kept up to date. If the contact information is outdated when an SSPR event is started, the user won't be able to unlock their account or reset their password.
76+
77+
Set **Number of days before users are asked to reconfirm their authentication information** to *180*.
78+
1. To apply the registration settings, select **Save**.
79+
80+
## Configure notifications and customizations
81+
82+
To keeps users informed, you can configure notifications to be sent when an SSPR event happens. These notifications can cover both regular user accounts and admin accounts. For admin accounts, this notification provides an additional layer of awareness when a privileged administrator account password is reset using SSPR.
83+
84+
1. On the **Notifications** page from the menu in the left-hand side, configure the following options:
85+
86+
* Set **Notify users on password resets** option to *Yes*.
87+
* Set **Notify all admins when other admins reset their password** to *Yes*.
88+
89+
1. To apply the notification preferences, select **Save**.
90+
91+
If users need additional help with the SSPR process, you can customize the link for "Contact your administrator". This link is used in the SSPR registration process and when a user unlocks their account of resets their password. To make sure your users get the support needed, it's highly recommended to provide a custom helpdesk email or URL.
92+
93+
1. On the **Customization** page from the menu in the left-hand side, set *Customize helpdesk link* to **Yes**.
94+
1. In the **Custom helpdesk email or URL** field, provide an email address or web page URL where your users can get additional help from your organization, such as *https://support.contoso.com/*.
95+
1. To apply the custom link, select **Save**.
96+
97+
## Test self-service password reset
98+
99+
Now test your SSPR configuration with a test user that's part of the group you selected in the previous section, such as *Test-SSPR-Group*. In the following example, the *testuser* account is used. Provide your own user account that's part of the group you enabled for SSPR in the first section of this tutorial.
100+
101+
> [!NOTE]
102+
> When you test the self-service password reset, use a non-administrator account. Admins are always enabled for self-service password reset and are required to use two authentication methods to reset their password.
103+
104+
1. To see the manual registration process, open a new browser window in InPrivate or incognito mode, and browse to [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup). Users should be directed to this registration portal when they next sign-in.
105+
1. Sign in with a non-administrator test user, such as *testuser*, and register your authentication methods contact information.
106+
1. Once complete, select the button marked **Looks good** and close the browser window.
107+
1. Open a new browser window in InPrivate or incognito mode, and browse to [https://aka.ms/sspr](https://aka.ms/sspr).
108+
1. Enter your non-administrator test users' User ID, such as *testuser*, the characters from the CAPTCHA, and then select **Next**.
109+
1. Follow the verification steps to reset your password. When complete, you should receive an e-mail notification that your password was reset.
110+
111+
## Clean up resources
112+
113+
In an additional tutorial in this series, you configure password writeback. This feature lets the Azure platform write password changes from Azure AD back to an on-premises AD environment.
114+
115+
If you no longer want to use the SSPR functionality you have configured as part of this tutorial, set the SSPR status to **None**.
116+
117+
1. Sign in to the [Azure portal](https://portal.azure.com).
118+
1. Search for and select **Azure Active Directory**, then choose **Password reset** from the menu on the left-hand side.
119+
1. From the **Properties** page, under the option *Self service password reset enabled*, choose **None**.
120+
1. To apply the SSPR change, select **Save**.
121+
122+
## Next steps
123+
124+
In this tutorial, you enabled Azure AD self-service password reset for a selected group of users. You learned how to:
125+
126+
> [!div class="checklist"]
127+
> * Enable self-service password reset for a group of Azure AD users
128+
> * Configure authentication methods and registration options
129+
> * Test the SSPR process as a user
130+
131+
> [!div class="nextstepaction"]
132+
> [Enable Azure Multi-Factor Authentication](tutorial-mfa-applications.md)

0 commit comments

Comments
 (0)