You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -45,11 +45,11 @@ If your MFA provider isn't linked to an Azure AD tenant, or you link the new MFA
45
45
> [!CAUTION]
46
46
> There is no confirmation when deleting an authentication provider. Selecting **Delete** is a permanent process.
47
47
48
-
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
48
+
Authentication providers can be found in the [Microsoft Entra admin center](https://entra.microsoft.com). Sign in as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator). Browse to **Protection** > **Multifactor authentication** > **Providers**. Click the listed providers to see details and configurations associated with that provider.
49
49
50
50
Before removing an authentication provider, take note of any customized settings configured in your provider. Decide what settings need to be migrated to general MFA settings from your provider and complete the migration of those settings.
51
51
52
-
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
52
+
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
53
53
54
54
- caCert
55
55
- cert
@@ -59,9 +59,9 @@ Azure MFA Servers linked to providers will need to be reactivated using credenti
59
59
- licenseKey
60
60
- pkey
61
61
62
-

62
+

63
63
64
-
After you confirm that all settings are migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** >**Providers** and select the ellipses **...** and select **Delete**.
64
+
After you confirm that all settings are migrated, browse to **Providers** and select the ellipses **...** and select **Delete**.
65
65
66
66
> [!WARNING]
67
67
> Deleting an authentication provider will delete any reporting information associated with that provider. You may want to save activity reports before deleting your provider.
@@ -78,14 +78,14 @@ If you use MFA Server, the following personal data is stored.
78
78
79
79
## Organizational data stored by Azure AD multifactor authentication
80
80
81
-
Organizational data is tenant-level information that can expose configuration or environment setup. Tenant settings from the following Azure portal multifactor authentication pages might store organizational data such as lockout thresholds or caller ID information for incoming phone authentication requests:
81
+
Organizational data is tenant-level information that can expose configuration or environment setup. Tenant settings from the Multifactor authentication pages might store organizational data such as lockout thresholds or caller ID information for incoming phone authentication requests:
82
82
83
83
* Account lockout
84
84
* Fraud alert
85
85
* Notifications
86
86
* Phone call settings
87
87
88
-
For MFA Server, the following Azure portal pages might contain organizational data:
88
+
For MFA Server, the following pages might contain organizational data:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 05/03/2023
9
+
ms.date: 09/13/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -130,7 +130,7 @@ To secure when and how users register for Azure AD Multi-Factor Authentication a
130
130
131
131
An admin has enforced registration.
132
132
133
-
A user has not set up all required security info and goes to the Azure portal. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for multifactor authentication. To complete the setup process, the user confirms the info and continues to the Azure portal.
133
+
A user has not set up all required security info and goes to the Microsoft Entra admin center. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for multifactor authentication. To complete the setup process, the user confirms the info and continues to the Microsoft Entra admin center.
134
134
135
135
### Set up security info from My Account
136
136
@@ -161,7 +161,7 @@ For example, a user sets Microsoft Authenticator app push notification as the pr
161
161
This user is also configured with SMS/Text option on a resource tenant.
162
162
If this user removes SMS/Text as one of the authentication options on their home tenant, they get confused when access to the resource tenant asks them to respond to SMS/Text message.
163
163
164
-
To switch the directory in the Azure portal, click the user account name in the upper right corner and click **Switch directory**.
164
+
To switch the directory in the Microsoft Entra admin center, click the user account name in the upper right corner and click **Switch directory**.
165
165
166
166

Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-sspr-howitworks.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 04/19/2023
9
+
ms.date: 09/14/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -71,14 +71,14 @@ To get started with SSPR, complete the following tutorial:
71
71
You can enable the option to require a user to complete the SSPR registration if they use modern authentication or web browser to sign in to any applications using Azure AD. This workflow includes the following applications:
72
72
73
73
* Microsoft 365
74
-
*Azure portal
74
+
*Microsoft Entra admin center
75
75
* Access Panel
76
76
* Federated applications
77
77
* Custom applications using Azure AD
78
78
79
79
When you don't require registration, users aren't prompted during sign-in, but they can manually register. Users can either visit [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup) or select the **Register for password reset** link under the **Profile** tab in the Access Panel.
80
80
81
-
![Registration options for SSPR in the Azure portal][Registration]
81
+
![Registration options for SSPR in the Microsoft Entra admin center][Registration]
82
82
83
83
> [!NOTE]
84
84
> Users can dismiss the SSPR registration portal by selecting **cancel** or by closing the window. However, they're prompted to register each time they sign in until they complete their registration.
@@ -109,7 +109,7 @@ Users can only reset their password if they have registered an authentication me
109
109
> [!WARNING]
110
110
> Accounts assigned Azure *administrator* roles are required to use methods as defined in the section [Administrator reset policy differences](concept-sspr-policy.md#administrator-reset-policy-differences).
111
111
112
-
![Authentication methods selection in the Azure portal][Authentication]
112
+
![Authentication methods selection in the Microsoft Entra admin center][Authentication]
113
113
114
114
### Number of authentication methods required
115
115
@@ -186,7 +186,7 @@ If you have a hybrid environment, you can configure Azure AD Connect to write pa
186
186
187
187
![Validating password writeback is enabled and working][Writeback]
188
188
189
-
Azure AD checks your current hybrid connectivity and provides one of the following messages in the Azure portal:
189
+
Azure AD checks your current hybrid connectivity and provides one of the following messages in the Microsoft Entra admin center:
190
190
191
191
* Your on-premises writeback client is up and running.
192
192
* Azure AD is online and is connected to your on-premises writeback client. However, it looks like the installed version of Azure AD Connect is out-of-date. Consider [Upgrading Azure AD Connect](../hybrid/connect/how-to-upgrade-previous-version.md) to ensure that you have the latest connectivity features and important bug fixes.
@@ -202,7 +202,7 @@ To get started with SSPR writeback, complete the following tutorial:
202
202
203
203
### Write back passwords to your on-premises directory
204
204
205
-
You can enable password writeback using the Azure portal. You can also temporarily disable password writeback without having to reconfigure Azure AD Connect.
205
+
You can enable password writeback using the Microsoft Entra admin center. You can also temporarily disable password writeback without having to reconfigure Azure AD Connect.
206
206
207
207
* If the option is set to **Yes**, then writeback is enabled. Federated, pass-through authentication, or password hash synchronized users are able to reset their passwords.
208
208
* If the option is set to **No**, then writeback is disabled. Federated, pass-through authentication, or password hash synchronized users aren't able to reset their passwords.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-sspr-writeback.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: active-directory
5
5
ms.service: active-directory
6
6
ms.subservice: authentication
7
7
ms.topic: conceptual
8
-
ms.date: 01/29/2023
8
+
ms.date: 09/14/2023
9
9
ms.author: justinha
10
10
author: justinha
11
11
manager: amycolannino
@@ -33,7 +33,7 @@ Password writeback provides the following features:
33
33
***Enforcement of on-premises Active Directory Domain Services (AD DS) password policies**: When a user resets their password, it's checked to ensure it meets your on-premises AD DS policy before committing it to that directory. This review includes checking the history, complexity, age, password filters, and any other password restrictions that you define in AD DS.
34
34
***Zero-delay feedback**: Password writeback is a synchronous operation. Users are notified immediately if their password doesn't meet the policy or can't be reset or changed for any reason.
35
35
***Supports password changes from the access panel and Microsoft 365**: When federated or password hash synchronized users come to change their expired or non-expired passwords, those passwords are written back to AD DS.
36
-
***Supports password writeback when an admin resets them from the Azure portal**: When an admin resets a user's password in the [Azure portal](https://portal.azure.com), if that user is federated or password hash synchronized, the password is written back to on-premises. This functionality is currently not supported in the Office admin portal.
36
+
***Supports password writeback when an admin resets them from the Microsoft Entra admin center**: When an admin resets a user's password in the [Microsoft Entra admin center](https://entra.microsoft.com), if that user is federated or password hash synchronized, the password is written back to on-premises. This functionality is currently not supported in the Office admin portal.
37
37
***Doesn't require any inbound firewall rules**: Password writeback uses an Azure Service Bus relay as an underlying communication channel. All communication is outbound over port 443.
38
38
***Supports side-by-side domain-level deployment** using [Azure AD Connect](tutorial-enable-sspr-writeback.md) or [cloud sync](tutorial-enable-cloud-sync-sspr-writeback.md) to target different sets of users depending on their needs, including users who are in disconnected domains.
39
39
@@ -139,7 +139,7 @@ Passwords are written back in all the following situations:
139
139
* Any administrator self-service voluntary change password operation.
140
140
* Any administrator self-service force change password operation, for example, password expiration.
141
141
* Any administrator self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com).
142
-
* Any administrator-initiated end-user password reset from the [Azure portal](https://portal.azure.com).
142
+
* Any administrator-initiated end-user password reset from the Microsoft Entra admin center.
143
143
* Any administrator-initiated end-user password reset from the [Microsoft Graph API](/graph/api/passwordauthenticationmethod-resetpassword).
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 06/28/2023
7
+
ms.date: 09/13/2023
8
8
ms.author: justinha
9
9
author: justinha
10
10
manager: amycolannino
@@ -28,11 +28,12 @@ After system-preferred MFA is enabled, the authentication system does all the wo
28
28
>[!NOTE]
29
29
>System-preferred MFA is an important security enhancement for users authenticating by using telecom transports. Starting July 07, 2023, the Microsoft managed value of system-preferred MFA will change from **Disabled** to **Enabled**. If you don't want to enable system-preferred MFA, change the state from **Default** to **Disabled**, or exclude users and groups from the policy.
30
30
31
-
## Enable system-preferred MFA in the Azure portal
31
+
## Enable system-preferred MFA in the Microsoft Entra admin center
32
32
33
33
By default, system-preferred MFA is Microsoft managed and disabled for all users.
34
34
35
-
1. In the Azure portal, click **Security** > **Authentication methods** > **Settings**.
35
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
36
+
1. Browse to **Protection** > **Authentication methods** > **Settings**.
36
37
1. For **System-preferred multifactor authentication**, choose whether to explicitly enable or disable the feature, and include or exclude any users. Excluded groups take precedence over include groups.
37
38
38
39
For example, the following screenshot shows how to make system-preferred MFA explicitly enabled for only the Engineering group.
0 commit comments