You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -92,7 +92,8 @@ GET https://graph.microsoft.com/beta/identity/conditionalAccess/authenticationSt
92
92
93
93
In addition to the three built-in authentication strengths, administrators can create up to 15 of their own custom authentication strengths to exactly suit their requirements. A custom authentication strength can contain any of the supported combinations in the preceding table.
94
94
95
-
1. In the Azure portal, browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Authentication strengths**.
95
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
96
+
1. Browse to **Protection** > **Authentication methods** > **Authentication strengths**.
96
97
1. Select **New authentication strength**.
97
98
1. Provide a descriptive **Name** for your new authentication strength.
98
99
1. Optionally provide a **Description**.
@@ -193,7 +194,7 @@ The following authentication methods can't be registered as part of combined reg
193
194
### Federated user experience
194
195
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider by setting the federatedIdpMfaBehavior. If the federatedIdpMfaBehavior setting is set to enforceMfaByFederatedIdp, the user must authenticate on their federated IdP and can only satisfy the **Federated Multi-Factor** combination of the authentication strength requirement. For more information about the federation settings, see [Plan support for MFA](../hybrid/connect/migrate-from-federation-to-cloud-authentication.md#plan-support-for-mfa).
195
196
196
-
If a user from a federated domain has multifactor authentication settings in scope for Staged Rollout, the user can complete multifactor authentication in the cloud and satisfy any of the **Federated single-factor + something you have** combinations. For more information about staged rollout, see [Enable Staged Rollout using Azure portal](how-to-mfa-server-migration-utility.md#enable-staged-rollout-using-azure-portal).
197
+
If a user from a federated domain has multifactor authentication settings in scope for Staged Rollout, the user can complete multifactor authentication in the cloud and satisfy any of the **Federated single-factor + something you have** combinations. For more information about staged rollout, see [Enable Staged Rollout](how-to-mfa-server-migration-utility.md#enable-staged-rollout).
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,11 +40,11 @@ For cloud-only users, only users with roles **Global Administrators**, **Privile
40
40
>[!NOTE]
41
41
>Active Directory Administrators (including accounts with delegated administrative privilege over synched user accounts as well as administrative rights over the Azure >AD Connect Servers) can make changes that impact the certificateUserIds value in Azure AD for any synched accounts.
42
42
43
-
## Update certificate user IDs in the Azure portal
43
+
## Update certificate user IDs
44
44
45
-
Tenant admins can use the following steps Azure portal to update certificate user IDs for a user account:
45
+
Tenant admins can use the following steps to update certificate user IDs for a user account:
46
46
47
-
1.In the Azure portal, click **All users (preview)**.
47
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator). Search for and select **All users**.
48
48
49
49
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/user.png" alt-text="Screenshot of test user account.":::
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-migration.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 01/29/2023
9
+
ms.date: 09/13/2023
10
10
11
11
12
12
ms.author: justinha
@@ -32,9 +32,8 @@ This article explains how to migrate from running federated servers such as Acti
32
32
33
33
To configure Staged Rollout, follow these steps:
34
34
35
-
1. Sign in to the [Azure portal](https://portal.azure.com) in the User Administrator role for the organization.
36
-
1. Search for and select **Azure Active Directory**.
37
-
1. From the left menu, select **Azure AD Connect**.
35
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [User Administrator](../roles/permissions-reference.md#user-administrator).
36
+
1. Search for and select **Azure AD Connect**.
38
37
1. On the Azure AD Connect page, under the Staged Rollout of cloud authentication, click **Enable Staged Rollout for managed user sign-in**.
39
38
1. On the **Enable Staged Rollout** feature page, click **On** for the option [Certificate-based authentication](./certificate-based-authentication-federation-get-started.md)
40
39
1. Click **Manage groups** and add groups you want to be part of cloud authentication. To avoid a time-out, ensure that the security groups contain no more than 200 members initially.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 10/10/2022
9
+
ms.date: 09/13/2023
10
10
11
11
12
12
ms.author: justinha
@@ -112,14 +112,14 @@ Users need to have another way to get MFA and register passwordless sign-in or F
112
112
113
113
For passwordless sign-in to work, users should disable legacy notification through mobile app.
114
114
115
-
1. Sign in to the [Azure portal](https://portal.azure.com).
115
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
116
116
117
117
1. Follow the steps at [Enable passwordless phone sign-in authentication](../authentication/howto-authentication-passwordless-phone.md#enable-passwordless-phone-sign-in-authentication-methods)
118
118
119
119
>[!IMPORTANT]
120
120
>In the above configuration under step 4, please choose **Passwordless** option. Change the mode for each groups added for PSI for **Authentication mode**, choose **Passwordless** for passwordless sign-in to work with CBA. If the admin configures "Any", CBA + PSI will not work.
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/configure.png" alt-text="Screenshot of how to configure multifactor authentication settings.":::
125
125
@@ -295,8 +295,8 @@ For the first test scenario, configure the authentication policy where the Issue
295
295
296
296
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/single-factor.png" alt-text="Screenshot of the Authentication policy configuration showing single-factor authentication required." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/single-factor.png":::
297
297
298
-
1. Sign in to the [Azure portal](https://portal.azure.com) as the test user by using CBA. The authentication policy is set where Issuer subject rule satisfies single-factor authentication.
299
-
1.After sign-in was succeeds, click **Azure Active Directory** >**Sign-in logs**.
298
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as the test user by using CBA. The authentication policy is set where Issuer subject rule satisfies single-factor authentication.
299
+
1.Search for and select**Sign-in logs**.
300
300
301
301
Let's look closer at some of the entries you can find in the **Sign-in logs**.
302
302
@@ -322,8 +322,8 @@ For the next test scenario, configure the authentication policy where the **poli
322
322
323
323
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/multifactor.png" alt-text="Screenshot of the Authentication policy configuration showing multifactor authentication required." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/multifactor.png":::
324
324
325
-
1. Sign in to the [Azure portal](https://portal.azure.com) using CBA. Since the policy was set to satisfy multifactor authentication, the user sign-in is successful without a second factor.
326
-
1.Click **Azure Active Directory** >**Sign-ins**.
325
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) using CBA. Since the policy was set to satisfy multifactor authentication, the user sign-in is successful without a second factor.
326
+
1.Search for and select**Sign-ins**.
327
327
328
328
You'll see several entries in the Sign-in logs, including an entry with **Interrupted** status.
||[Complete user migration](#complete-user-migration)|
55
55
|Finalize |[Migrate MFA Server dependencies](#migrate-mfa-server-dependencies)|
@@ -180,7 +180,7 @@ You'll also need access to the following URLs:
180
180
-`https://graph.microsoft.com/*` (or `https://graph.microsoft.us/*` for government cloud customers)
181
181
-`https://login.microsoftonline.com/*` (or `https://login.microsoftonline.us/*` for government cloud customers)
182
182
183
-
The script will instruct you to grant admin consent to the newly created application. Navigate to the URL provided, or within the Azure portal, click **Application Registrations**, find and select the **MFA Server Migration Utility** app, click on **API permissions** and then granting the appropriate permissions.
183
+
The script will instruct you to grant admin consent to the newly created application. Navigate to the URL provided, or within the Microsoft Entra admin center, click **Application Registrations**, find and select the **MFA Server Migration Utility** app, click on **API permissions** and then granting the appropriate permissions.
184
184
185
185
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/permissions.png" alt-text="Screenshot of permissions.":::
186
186
@@ -342,9 +342,9 @@ AuditLogs
342
342
343
343
### Validate and test
344
344
345
-
Once you've successfully migrated user data, you can validate the end-user experience using Staged Rollout before making the global tenant change. The following process will allow you to target specific Azure AD group(s) for Staged Rollout for MFA. Staged Rollout tells Azure AD to perform MFA by using Azure AD MFA for users in the targeted groups, rather than sending them on-premises to perform MFA. You can validate and test—we recommend using the Azure portal, but if you prefer, you can also use Microsoft Graph.
345
+
Once you've successfully migrated user data, you can validate the end-user experience using Staged Rollout before making the global tenant change. The following process will allow you to target specific Azure AD group(s) for Staged Rollout for MFA. Staged Rollout tells Azure AD to perform MFA by using Azure AD MFA for users in the targeted groups, rather than sending them on-premises to perform MFA. You can validate and test—we recommend using the Microsoft Entra admin center, but if you prefer, you can also use Microsoft Graph.
346
346
347
-
#### Enable Staged Rollout using Azure portal
347
+
#### Enable Staged Rollout
348
348
349
349
1. Navigate to the following url: [Enable staged rollout features - Microsoft Azure](https://portal.azure.com/?mfaUIEnabled=true%2F#view/Microsoft_AAD_IAM/StagedRolloutEnablementBladeV2).
0 commit comments