Skip to content

Commit f8eb149

Browse files
Merge pull request #251578 from Justinha/steps-auth-11
fixed references to Azure portal
2 parents 3db4528 + c19678f commit f8eb149

5 files changed

+22
-22
lines changed

articles/active-directory/authentication/concept-authentication-strengths.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/28/2023
9+
ms.date: 09/14/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -92,7 +92,8 @@ GET https://graph.microsoft.com/beta/identity/conditionalAccess/authenticationSt
9292

9393
In addition to the three built-in authentication strengths, administrators can create up to 15 of their own custom authentication strengths to exactly suit their requirements. A custom authentication strength can contain any of the supported combinations in the preceding table.
9494

95-
1. In the Azure portal, browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Authentication strengths**.
95+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
96+
1. Browse to **Protection** > **Authentication methods** > **Authentication strengths**.
9697
1. Select **New authentication strength**.
9798
1. Provide a descriptive **Name** for your new authentication strength.
9899
1. Optionally provide a **Description**.
@@ -193,7 +194,7 @@ The following authentication methods can't be registered as part of combined reg
193194
### Federated user experience
194195
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider by setting the federatedIdpMfaBehavior. If the federatedIdpMfaBehavior setting is set to enforceMfaByFederatedIdp, the user must authenticate on their federated IdP and can only satisfy the **Federated Multi-Factor** combination of the authentication strength requirement. For more information about the federation settings, see [Plan support for MFA](../hybrid/connect/migrate-from-federation-to-cloud-authentication.md#plan-support-for-mfa).
195196

196-
If a user from a federated domain has multifactor authentication settings in scope for Staged Rollout, the user can complete multifactor authentication in the cloud and satisfy any of the **Federated single-factor + something you have** combinations. For more information about staged rollout, see [Enable Staged Rollout using Azure portal](how-to-mfa-server-migration-utility.md#enable-staged-rollout-using-azure-portal).
197+
If a user from a federated domain has multifactor authentication settings in scope for Staged Rollout, the user can complete multifactor authentication in the cloud and satisfy any of the **Federated single-factor + something you have** combinations. For more information about staged rollout, see [Enable Staged Rollout](how-to-mfa-server-migration-utility.md#enable-staged-rollout).
197198

198199
## External users
199200

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,11 @@ For cloud-only users, only users with roles **Global Administrators**, **Privile
4040
>[!NOTE]
4141
>Active Directory Administrators (including accounts with delegated administrative privilege over synched user accounts as well as administrative rights over the Azure >AD Connect Servers) can make changes that impact the certificateUserIds value in Azure AD for any synched accounts.
4242
43-
## Update certificate user IDs in the Azure portal
43+
## Update certificate user IDs
4444

45-
Tenant admins can use the following steps Azure portal to update certificate user IDs for a user account:
45+
Tenant admins can use the following steps to update certificate user IDs for a user account:
4646

47-
1. In the Azure portal, click **All users (preview)**.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator). Search for and select **All users**.
4848

4949
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/user.png" alt-text="Screenshot of test user account.":::
5050

articles/active-directory/authentication/concept-certificate-based-authentication-migration.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 09/13/2023
1010

1111

1212
ms.author: justinha
@@ -32,9 +32,8 @@ This article explains how to migrate from running federated servers such as Acti
3232

3333
To configure Staged Rollout, follow these steps:
3434

35-
1. Sign in to the [Azure portal](https://portal.azure.com) in the User Administrator role for the organization.
36-
1. Search for and select **Azure Active Directory**.
37-
1. From the left menu, select **Azure AD Connect**.
35+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [User Administrator](../roles/permissions-reference.md#user-administrator).
36+
1. Search for and select **Azure AD Connect**.
3837
1. On the Azure AD Connect page, under the Staged Rollout of cloud authentication, click **Enable Staged Rollout for managed user sign-in**.
3938
1. On the **Enable Staged Rollout** feature page, click **On** for the option [Certificate-based authentication](./certificate-based-authentication-federation-get-started.md)
4039
1. Click **Manage groups** and add groups you want to be part of cloud authentication. To avoid a time-out, ensure that the security groups contain no more than 200 members initially.

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/10/2022
9+
ms.date: 09/13/2023
1010

1111

1212
ms.author: justinha
@@ -112,14 +112,14 @@ Users need to have another way to get MFA and register passwordless sign-in or F
112112

113113
For passwordless sign-in to work, users should disable legacy notification through mobile app.
114114

115-
1. Sign in to the [Azure portal](https://portal.azure.com).
115+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
116116

117117
1. Follow the steps at [Enable passwordless phone sign-in authentication](../authentication/howto-authentication-passwordless-phone.md#enable-passwordless-phone-sign-in-authentication-methods)
118118

119119
>[!IMPORTANT]
120120
>In the above configuration under step 4, please choose **Passwordless** option. Change the mode for each groups added for PSI for **Authentication mode**, choose **Passwordless** for passwordless sign-in to work with CBA. If the admin configures "Any", CBA + PSI will not work.
121121
122-
1. Select **Azure Active Directory** > **Security** > **Multifactor authentication** > **Additional cloud-based multifactor authentication settings**.
122+
1. Select **Protection** > **Multifactor authentication** > **Additional cloud-based multifactor authentication settings**.
123123

124124
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/configure.png" alt-text="Screenshot of how to configure multifactor authentication settings.":::
125125

@@ -295,8 +295,8 @@ For the first test scenario, configure the authentication policy where the Issue
295295

296296
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/single-factor.png" alt-text="Screenshot of the Authentication policy configuration showing single-factor authentication required." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/single-factor.png":::
297297

298-
1. Sign in to the [Azure portal](https://portal.azure.com) as the test user by using CBA. The authentication policy is set where Issuer subject rule satisfies single-factor authentication.
299-
1. After sign-in was succeeds, click **Azure Active Directory** > **Sign-in logs**.
298+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as the test user by using CBA. The authentication policy is set where Issuer subject rule satisfies single-factor authentication.
299+
1. Search for and select **Sign-in logs**.
300300

301301
Let's look closer at some of the entries you can find in the **Sign-in logs**.
302302

@@ -322,8 +322,8 @@ For the next test scenario, configure the authentication policy where the **poli
322322

323323
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/multifactor.png" alt-text="Screenshot of the Authentication policy configuration showing multifactor authentication required." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/multifactor.png":::
324324

325-
1. Sign in to the [Azure portal](https://portal.azure.com) using CBA. Since the policy was set to satisfy multifactor authentication, the user sign-in is successful without a second factor.
326-
1. Click **Azure Active Directory** > **Sign-ins**.
325+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) using CBA. Since the policy was set to satisfy multifactor authentication, the user sign-in is successful without a second factor.
326+
1. Search for and select **Sign-ins**.
327327

328328
You'll see several entries in the Sign-in logs, including an entry with **Interrupted** status.
329329

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 08/22/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -49,7 +49,7 @@ Take a look at our video for an overview of the MFA Server Migration Utility and
4949
||[Configure MFA Server Migration Utility](#configure-the-mfa-server-migration-utility) |
5050
|Migrations |[Migrate user data](#migrate-user-data)|
5151
||[Validate and test](#validate-and-test)|
52-
||[Staged Rollout](#enable-staged-rollout-using-azure-portal) |
52+
||[Staged Rollout](#enable-staged-rollout) |
5353
||[Educate users](#educate-users)|
5454
||[Complete user migration](#complete-user-migration)|
5555
|Finalize |[Migrate MFA Server dependencies](#migrate-mfa-server-dependencies)|
@@ -180,7 +180,7 @@ You'll also need access to the following URLs:
180180
- `https://graph.microsoft.com/*` (or `https://graph.microsoft.us/*` for government cloud customers)
181181
- `https://login.microsoftonline.com/*` (or `https://login.microsoftonline.us/*` for government cloud customers)
182182

183-
The script will instruct you to grant admin consent to the newly created application. Navigate to the URL provided, or within the Azure portal, click **Application Registrations**, find and select the **MFA Server Migration Utility** app, click on **API permissions** and then granting the appropriate permissions.
183+
The script will instruct you to grant admin consent to the newly created application. Navigate to the URL provided, or within the Microsoft Entra admin center, click **Application Registrations**, find and select the **MFA Server Migration Utility** app, click on **API permissions** and then granting the appropriate permissions.
184184

185185
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/permissions.png" alt-text="Screenshot of permissions.":::
186186

@@ -342,9 +342,9 @@ AuditLogs
342342

343343
### Validate and test
344344

345-
Once you've successfully migrated user data, you can validate the end-user experience using Staged Rollout before making the global tenant change. The following process will allow you to target specific Azure AD group(s) for Staged Rollout for MFA. Staged Rollout tells Azure AD to perform MFA by using Azure AD MFA for users in the targeted groups, rather than sending them on-premises to perform MFA. You can validate and test—we recommend using the Azure portal, but if you prefer, you can also use Microsoft Graph.
345+
Once you've successfully migrated user data, you can validate the end-user experience using Staged Rollout before making the global tenant change. The following process will allow you to target specific Azure AD group(s) for Staged Rollout for MFA. Staged Rollout tells Azure AD to perform MFA by using Azure AD MFA for users in the targeted groups, rather than sending them on-premises to perform MFA. You can validate and test—we recommend using the Microsoft Entra admin center, but if you prefer, you can also use Microsoft Graph.
346346

347-
#### Enable Staged Rollout using Azure portal
347+
#### Enable Staged Rollout
348348

349349
1. Navigate to the following url: [Enable staged rollout features - Microsoft Azure](https://portal.azure.com/?mfaUIEnabled=true%2F#view/Microsoft_AAD_IAM/StagedRolloutEnablementBladeV2).
350350

0 commit comments

Comments
 (0)