Skip to content

Commit ee6056b

Browse files
authored
Merge pull request #207264 from MicrosoftDocs/main
8/8/2022 Out of Band Publishing
2 parents bbd5d24 + 0cab38f commit ee6056b

File tree

196 files changed

+1791
-713
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

196 files changed

+1791
-713
lines changed

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 06/23/2022
7+
ms.date: 08/08/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -13,7 +13,7 @@ ms.collection: M365-identity-device-management
1313
---
1414
# How to use additional context in Microsoft Authenticator app notifications (Preview) - Authentication Methods Policy
1515

16-
This topic covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
16+
This article covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
1717

1818
## Prerequisites
1919

@@ -50,7 +50,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
5050

5151
| Property | Type | Description |
5252
|---------|------|-------------|
53-
| id | String | The authentication method policy identifier. |
53+
| ID | String | The authentication method policy identifier. |
5454
| state | authenticationMethodState | Possible values are: **enabled**<br>**disabled** |
5555

5656
**RELATIONSHIPS**
@@ -67,7 +67,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
6767
| Property | Type | Description |
6868
|----------|------|-------------|
6969
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
70-
| id | String | Object ID of an Azure AD user or group. |
70+
| ID | String | Object ID of an Azure AD user or group. |
7171
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>You can only set one group or user for additional context. |
7272
| displayAppInformationRequiredState | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
7373

@@ -78,7 +78,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
7878

7979
Change the **displayAppInformationRequiredState** from **default** to **enabled**.
8080

81-
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you do not want to allow passwordless, use **push**.
81+
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
8282

8383
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **displayAppInformationRequiredState**.
8484

@@ -182,18 +182,24 @@ To turn off additional context, you'll need to PATCH remove **displayAppInformat
182182

183183
To enable additional context in the Azure AD portal, complete the following steps:
184184

185-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
186-
1. Select the target users, click the three dots on the right, and click **Configure**.
185+
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
186+
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
187+
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
188+
1. From the list of available authentication methods, select **Microsoft Authenticator**.
189+
190+
![Screenshot that shows how to select the Microsoft Authenticator policy.](./media/how-to-mfa-additional-context/select-microsoft-authenticator-policy.png)
191+
192+
1. Select the target users, select the three dots on the right, and choose **Configure**.
187193

188-
![Screenshot of how to configure number match.](media/howto-authentication-passwordless-phone/configure.png)
194+
![Screenshot of configuring Microsoft authenticator additional context.](./media/how-to-mfa-additional-context/configure-microsoft-authenticator.png)
189195

190-
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, click **Enable**, and then click **Done**.
196+
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, select **Enable**, and then select **Done**.
191197

192198
![Screenshot of enabling additional context.](media/howto-authentication-passwordless-phone/enable-additional-context.png)
193199

194200
## Known issues
195201

196-
Additional context is not supported for Network Policy Server (NPS).
202+
Additional context isn't supported for Network Policy Server (NPS).
197203

198204
## Next steps
199205

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 27 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 06/23/2022
7+
ms.date: 08/08/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -13,7 +13,7 @@ ms.collection: M365-identity-device-management
1313
---
1414
# How to use number matching in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
1515

16-
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
16+
This article covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
1717

1818
>[!NOTE]
1919
>Number matching is a key security upgrade to traditional second factor notifications in the Authenticator app that will be enabled by default for all tenants a few months after general availability (GA).<br>
@@ -42,7 +42,7 @@ Number matching is available for the following scenarios. When enabled, all scen
4242
4343
### Multifactor authentication
4444

45-
When a user responds to an MFA push notification using the Authenticator app, they will be presented with a number. They need to type that number into the app to complete the approval.
45+
When a user responds to an MFA push notification using the Authenticator app, they'll be presented with a number. They need to type that number into the app to complete the approval.
4646

4747
![Screenshot of user entering a number match.](media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png)
4848

@@ -71,7 +71,7 @@ Make sure you run the latest version of the [NPS extension](https://www.microsof
7171

7272
Because the NPS extension can't show a number, a user who is enabled for number matching will still be prompted to **Approve**/**Deny**. However, you can create a registry key that overrides push notifications to ask a user to enter a One-Time Passcode (OTP). The user must have an OTP authentication method registered to see this behavior. Common OTP authentication methods include the OTP available in the Authenticator app, other software tokens, and so on.
7373

74-
If the user doesn't have an OTP method registered, they will continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
74+
If the user doesn't have an OTP method registered, they'll continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
7575

7676
To create the registry key that overrides push notifications:
7777

@@ -98,7 +98,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
9898

9999
| Property | Type | Description |
100100
|---------|------|-------------|
101-
| id | String | The authentication method policy identifier. |
101+
| ID | String | The authentication method policy identifier. |
102102
| state | authenticationMethodState | Possible values are: **enabled**<br>**disabled** |
103103

104104
**RELATIONSHIPS**
@@ -115,18 +115,18 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
115115
| Property | Type | Description |
116116
|----------|------|-------------|
117117
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
118-
| id | String | Object ID of an Azure AD user or group. |
119-
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>Please note: You will be able to only set one group or user for number matching. |
118+
| ID | String | Object ID of an Azure AD user or group. |
119+
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>Note: You'll be able to only set one group or user for number matching. |
120120
| numberMatchingRequiredState | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
121121

122122
>[!NOTE]
123123
>Number matching can only be enabled for a single group.
124124
125125
#### Example of how to enable number matching for all users
126126

127-
You will need to change the **numberMatchingRequiredState** from **default** to **enabled**.
127+
You'll need to change the **numberMatchingRequiredState** from **default** to **enabled**.
128128

129-
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
129+
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
130130

131131
>[!NOTE]
132132
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
@@ -157,14 +157,14 @@ You might need to patch the entire includeTarget to prevent overwriting any prev
157157

158158
```
159159

160-
To confirm this has applied, please run the GET request below using the endpoint below.
160+
To confirm this update has applied, please run the GET request below using the endpoint below.
161161
GET - https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
162162

163163

164164
#### Example of how to enable number matching for a single group
165165

166-
We will need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
167-
You will need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
166+
We'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
167+
You'll need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
168168

169169
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
170170

@@ -208,7 +208,7 @@ See the end user experience of an Authenticator MFA push notification with numbe
208208

209209
### Turn off number matching
210210

211-
To turn number matching off, you will need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
211+
To turn number matching off, you'll need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
212212

213213
```json
214214
{
@@ -231,22 +231,28 @@ To turn number matching off, you will need to PATCH remove **numberMatchingRequi
231231

232232
## Enable number matching in the portal
233233

234-
To enable number matching in the Azure AD portal, complete the following steps:
234+
To enable number matching in the Azure portal, complete the following steps:
235235

236-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
237-
1. Select the target users, click the three dots on the right, and click **Configure**.
236+
1. Sign-in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
237+
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
238+
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
239+
1. From the list of available authentication methods, select **Microsoft Authenticator**.
240+
241+
![Screenshot that shows how to select the Microsoft Authenticator policy.](./media/how-to-mfa-number-match/select-microsoft-authenticator-policy.png)
242+
243+
1. Select the target users, select the three dots on the right, and choose **Configure**.
238244

239-
![Screenshot of configuring number match.](media/howto-authentication-passwordless-phone/configure.png)
245+
![Screenshot of configuring number match.](./media/how-to-mfa-number-match/configure-microsoft-authenticator.png)
240246

241-
1. Select the **Authentication mode**, and then for **Require number matching (Preview)**, click **Enable**, and then click **Done**.
247+
1. Select the **Authentication mode**, and then for **Require number matching (Preview)**, select **Enable**, and then select **Done**.
242248

243-
![Screenshot of enabling number match.](media/howto-authentication-passwordless-phone/enable-number-matching.png)
249+
![Screenshot of enabling number match configuration.](media/howto-authentication-passwordless-phone/enable-number-matching.png)
244250

245251
>[!NOTE]
246252
>[Least privileged role in Azure Active Directory - Multifactor authentication](../roles/delegate-by-task.md#multi-factor-authentication)
247253
248-
Number matching is not supported for Apple Watch notifications. Apple Watch need to use their phone to approve notifications when number matching is enabled.
254+
Number matching isn't supported for Apple Watch notifications. Apple Watch need to use their phone to approve notifications when number matching is enabled.
249255

250256
## Next steps
251257

252-
[Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)
258+
[Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)

0 commit comments

Comments
 (0)