You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-mfasettings.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,11 +36,11 @@ The following Azure AD Multi-Factor Authentication settings are available in the
36
36
37
37
## Account lockout
38
38
39
-
To prevent repeated multi-factor authentication attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the multi-factor authentication prompt.
39
+
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt.
40
40
41
41
The following settings are available:
42
42
43
-
* Number of multi-factor authentication denials that trigger account lockout
43
+
* Number of MFA denials that trigger account lockout
44
44
* Minutes until account lockout counter is reset
45
45
* Minutes until account is automatically unblocked
46
46
@@ -78,7 +78,7 @@ To unblock a user, complete the following steps:
78
78
79
79
## Fraud alert
80
80
81
-
The fraud alert feature lets users report fraudulent attempts to access their resources. When an unknown and suspicious multi-factor authentication prompt is received, users can report the fraud attempt by using the Microsoft Authenticator app or through their phone.
81
+
The fraud alert feature lets users report fraudulent attempts to access their resources. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using the Microsoft Authenticator app or through their phone.
82
82
83
83
The following fraud alert configuration options are available:
84
84
@@ -148,9 +148,9 @@ Users can have a combination of up to five OATH hardware tokens or authenticator
148
148
149
149
## Phone call settings
150
150
151
-
If users receive phone calls for multi-factor authentication prompts, you can configure their experience, such as caller ID or the voice greeting they hear.
151
+
If users receive phone calls for MFA prompts, you can configure their experience, such as caller ID or the voice greeting they hear.
152
152
153
-
In the United States, if you haven't configured multi-factor authentication caller ID, voice calls from Microsoft come from the following number. Uses with spam filters should exclude this number.
153
+
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following number. Uses with spam filters should exclude this number.
154
154
155
155
**+1 (855) 330-8653*
156
156
@@ -224,7 +224,7 @@ To use your own custom messages, complete the following steps:
224
224
1. Browse for and select an .mp3 or .wav sound file to upload.
225
225
1. Select **Add** and then **Save**.
226
226
227
-
## Multi-factor authentication service settings
227
+
## MFA service settings
228
228
229
229
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure AD portal.
230
230
@@ -239,7 +239,7 @@ The trusted IPs feature of Azure AD Multi-Factor Authentication bypasses multi-f
239
239
>
240
240
> IPv6 ranges are supported only in the [Named locations (preview)](../conditional-access/location-condition.md) interface.
241
241
242
-
If your organization uses the NPS extension to provide multi-factor authentication to on-premises applications, the source IP address will always appear to be the NPS server that the authentication attempt flows through.
242
+
If your organization uses the NPS extension to provide MFA to on-premises applications, the source IP address will always appear to be the NPS server that the authentication attempt flows through.
243
243
244
244
| Azure AD tenant type | Trusted IP feature options |
245
245
|:--- |:--- |
@@ -335,16 +335,16 @@ To enable or disable verification methods, complete the following steps:
335
335
336
336
### Remember multi-factor authentication
337
337
338
-
The **remember multi-factor authentication** feature lets users bypass subsequent verifications for a specified number of days, after they've successfully signed in to a device by using multi-factor authentication. To enhance usability and minimize the number of times a user has to perform multi-factor authentication on a given device, select a duration of 90 days or more.
338
+
The **remember multi-factor authentication** feature lets users bypass subsequent verifications for a specified number of days, after they've successfully signed in to a device by using MFA. To enhance usability and minimize the number of times a user has to perform MFA on a given device, select a duration of 90 days or more.
339
339
340
340
> [!IMPORTANT]
341
-
> If an account or device is compromised, remembering multi-factor authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke MFA Sessions](howto-mfa-userdevicesettings.md).
341
+
> If an account or device is compromised, remembering MFA for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke MFA Sessions](howto-mfa-userdevicesettings.md).
342
342
>
343
-
> The revoke action revokes the trusted status from all devices, and the user is required to perform multi-factor authentication again. You can also instruct your users to restore the original multi-factor authentication status on their own devices as noted in [Manage your settings for multi-factor authentication](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7#turn-on-two-factor-verification-prompts-on-a-trusted-device).
343
+
> The revoke action revokes the trusted status from all devices, and the user is required to perform multi-factor authentication again. You can also instruct your users to restore the original MFA status on their own devices as noted in [Manage your settings for multi-factor authentication](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7#turn-on-two-factor-verification-prompts-on-a-trusted-device).
344
344
345
345
#### How the feature works
346
346
347
-
The **remember multi-factor authentication** feature sets a persistent cookie on the browser when a user selects the **Don't ask again for *X* days** option at sign-in. The user isn't prompted again for multi-factor authentication from that browser until the cookie expires. If the user opens a different browser on the same device or clears the cookies, they're prompted again to verify.
347
+
The **remember multi-factor authentication** feature sets a persistent cookie on the browser when a user selects the **Don't ask again for *X* days** option at sign-in. The user isn't prompted again for MFA from that browser until the cookie expires. If the user opens a different browser on the same device or clears the cookies, they're prompted again to verify.
348
348
349
349
The **Don't ask again for *X* days** option isn't shown on non-browser applications, regardless of whether the app supports modern authentication. These apps use _refresh tokens_ that provide new access tokens every hour. When a refresh token is validated, Azure AD checks that the last multi-factor authentication occurred within the specified number of days.
350
350
@@ -353,14 +353,14 @@ The feature reduces the number of authentications on web apps, which normally pr
353
353
> [!IMPORTANT]
354
354
> The **remember multi-factor authentication** feature isn't compatible with the **keep me signed in** feature of AD FS, when users perform multi-factor authentication for AD FS through MFA Server or a third-party multi-factor authentication solution.
355
355
>
356
-
> If your users select **keep me signed in** on AD FS and also mark their device as trusted for multi-factor authentication, the user isn't automatically verified after the **remember multi-factor authentication** number of days expires. Azure AD requests a fresh multi-factor authentication, but AD FS returns a token with the original multi-factor authentication claim and date, rather than performing multi-factor authentication again. *This reaction sets off a verification loop between Azure AD and AD FS.*
356
+
> If your users select **keep me signed in** on AD FS and also mark their device as trusted for MFA, the user isn't automatically verified after the **remember multi-factor authentication** number of days expires. Azure AD requests a fresh multi-factor authentication, but AD FS returns a token with the original MFA claim and date, rather than performing multi-factor authentication again. *This reaction sets off a verification loop between Azure AD and AD FS.*
357
357
>
358
358
> The **remember multi-factor authentication** feature isn't compatible with B2B users and won't be visible for B2B users when they sign in to the invited tenants.
359
359
>
360
360
361
361
#### Enable remember multi-factor authentication
362
362
363
-
To enable and configure the option to allow users to remember their multi-factor authentication status and bypass prompts, complete the following steps:
363
+
To enable and configure the option to allow users to remember their MFA status and bypass prompts, complete the following steps:
364
364
365
365
1. In the Azure portal, search for and select **Azure Active Directory**, and then select **Users**.
0 commit comments