Skip to content

Commit eca9024

Browse files
Update mfaselfenforcement.md
1 parent 2c8efcf commit eca9024

File tree

1 file changed

+9
-13
lines changed

1 file changed

+9
-13
lines changed

articles/governance/policy/tutorials/mfaselfenforcement.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -18,29 +18,25 @@ Navigate to the [Azure Portal](https://www.portal.azure.com)
1818
### 2. Access Azure Policy Service
1919
Select Policy under Azure services. If you don't see it, type 'Policy' in the search bar at the top and select it from the results.
2020

21-
:::image type="content" source="../media/multifactor-enforcement/image1.png" alt-text="Screenshot of Azure Policy Assignment View." border="false":::
21+
:::image type="content" source="../media/multifactor-enforcement/policy-assignment-view.png" alt-text="Screenshot of Azure Policy Assignment View." border="false":::
2222

2323
### 3. Choose the Scope for Assignment
2424
- In the Policy dashboard, click on Assignments in the left pane.
2525
- Click Assign policy at the top of the assignments page.
2626
- In the Scope section, click Select scope.
2727
- Choose the appropriate resource group, subscription, or management group where you want to apply the policy. Click Select to confirm your choice.
2828

29-
30-
:::image type="content" source="../media/multifactor-enforcement/image2.png" alt-text="Screenshot of Azure Policy Assignment Scope View." border="false":::
31-
32-
3329
### 4. Configure Selectors for gradual rollout of policy enforcement
3430
> [!NOTE]
3531
> To enable safe rollout of policy enforcement, we recommend using Azure Policy’s resource selectors to gradually rollout policy enforcement across your resources.
3632
- In the 'Basics' tab, you see 'Resource Selectors'. Click expand.
3733
- Click 'Add a resource selector'
38-
:::image type="content" source="../media/multifactor-enforcement/image2.png" alt-text="Screenshot of Azure Policy Assignment Creation View." border="false":::
34+
:::image type="content" source="../media/multifactor-enforcement/policy-resource-selectors.png" alt-text="Screenshot of Azure Policy Assignment Creation View." border="false":::
3935
- In your resource selector, add a name for your selector.
4036
- Toggle resourceLocation to enable it. Pick a few low-risk regions that you’d like to enforce on. The policy assignment will evaluate Azure resources in those regions.
4137
- You can update this assignment later to add more regions by adding more resourceLocation selectors or updating the existing resourceLocation selector to add more regions.
4238

43-
:::image type="content" source="../media/multifactor-enforcement/image3.png" alt-text="Screenshot of Azure Policy Selector Creation View." border="false":::
39+
:::image type="content" source="../media/multifactor-enforcement/resource-selector-creation.png" alt-text="Screenshot of Azure Policy Selector Creation View." border="false":::
4440

4541
### 5. Select a Policy Definition
4642
- Under 'Basics', click on Policy definition.
@@ -49,7 +45,7 @@ Select Policy under Azure services. If you don't see it, type 'Policy' in the se
4945
- [[Preview]: Users must authenticate with multifactor authentication to create or update resources - Microsoft Azure](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetail.ReactView/id/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F4e6c27d5-a6ee-49cf-b2b4-d8fe90fa2b8b/version/1.0.0-preview/scopes/%5B%22%2Fsubscriptions%2F12015272-f077-4945-81de-a5f607d067e1%22%2C%22%2Fsubscriptions%2F0ba674a6-9fde-43b4-8370-a7e16fdf0641%22%5D/contextRender/)
5046
- Select the policy definition from the list.
5147

52-
:::image type="content" source="../media/multifactor-enforcement/image4.png" alt-text="Screenshot of Azure Policy Definition Search View." border="false":::
48+
:::image type="content" source="../media/multifactor-enforcement/policy-definition-selection.png" alt-text="Screenshot of Azure Policy Definition Search View." border="false":::
5349

5450
### 6. Configure More Assignment Details
5551
- Under 'Basics', enter a Name for your policy assignment. Optionally, you may add a Description to help others understand the purpose of this assignment.
@@ -59,7 +55,7 @@ Select Policy under Azure services. If you don't see it, type 'Policy' in the se
5955

6056
_Sample Text: To resolve this error, you must set up MFA, following the process outlined at aka.ms/setupMFA. If you set up MFA and are still receiving this error, reach out to your Entra administrator to restore the security default for Azure by following the process outlined at aka.ms/loginMFAForAzure._
6157

62-
:::image type="content" source="../media/multifactor-enforcement/image11.png" alt-text="Screenshot of Azure Policy Message Tab." border="false":::
58+
:::image type="content" source="../media/multifactor-enforcement/azpolicy-non-compliance-message.png" alt-text="Screenshot of Azure Policy Message Tab." border="false":::
6359

6460

6561
### 7. Review and Create Assignment
@@ -72,7 +68,7 @@ _Sample Text: To resolve this error, you must set up MFA, following the process
7268
### 9. Verify existence of the policy assignment
7369
- Under the 'Assignments' tab, confirm that the policy assignment was successfully created. You can use the search bar and scope bar to easily filter.
7470

75-
:::image type="content" source="../media/multifactor-enforcement/image6.png" alt-text="Screenshot of Azure Policy Assignment List View." border="false":::
71+
:::image type="content" source="../media/multifactor-enforcement/assignment-list-view.png" alt-text="Screenshot of Azure Policy Assignment List View." border="false":::
7672

7773

7874
## Update the policy assignment to enforcement
@@ -108,17 +104,17 @@ The next section shows the experience from some select clients when the policy a
108104
### Azure Portal
109105
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure Portal may return:
110106

111-
:::image type="content" source="../media/multifactor-enforcement/image8.png" alt-text="Screenshot of Azure Portal View When User Gets Blocked By Policy." border="false":::
107+
:::image type="content" source="../media/multifactor-enforcement/portal-enforcement-sample.png" alt-text="Screenshot of Azure Portal View When User Gets Blocked By Policy." border="false":::
112108

113109
### Azure CLI
114110
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure CLI may return:
115111

116-
:::image type="content" source="../media/multifactor-enforcement/image9.png" alt-text="Screenshot of Azure CLI View When User Gets Blocked By Policy." border="false":::
112+
:::image type="content" source="../media/multifactor-enforcement/azure-cli-policy-enforcement.png" alt-text="Screenshot of Azure CLI View When User Gets Blocked By Policy." border="false":::
117113

118114
### Azure PowerShell
119115
When you attempt to perform a create, update, or delete operation without an MFA-authenticated token, Azure PowerShell may return:
120116

121-
:::image type="content" source="../media/multifactor-enforcement/image10.png" alt-text="Screenshot of Azure PS View When User Gets Blocked By Policy." border="false":::
117+
:::image type="content" source="../media/multifactor-enforcement/azure-ps-policy-enforcement.png" alt-text="Screenshot of Azure PS View When User Gets Blocked By Policy." border="false":::
122118

123119
## Limitations in the Preview Timeframe
124120
- In some cases, you may not be prompted to complete MFA after receiving an error. In such cases, re-authenticate with MFA before retrying the operation (for example, through Azure Portal).

0 commit comments

Comments
 (0)