Skip to content

Commit ff1a5d1

Browse files
committed
revert MFA
1 parent 1e12ad6 commit ff1a5d1

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,11 @@ The following Azure AD Multi-Factor Authentication settings are available in the
3636

3737
## Account lockout
3838

39-
To prevent repeated multi-factor authentication attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the multi-factor authentication prompt.
39+
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt.
4040

4141
The following settings are available:
4242

43-
* Number of multi-factor authentication denials that trigger account lockout
43+
* Number of MFA denials that trigger account lockout
4444
* Minutes until account lockout counter is reset
4545
* Minutes until account is automatically unblocked
4646

@@ -78,7 +78,7 @@ To unblock a user, complete the following steps:
7878

7979
## Fraud alert
8080

81-
The fraud alert feature lets users report fraudulent attempts to access their resources. When an unknown and suspicious multi-factor authentication prompt is received, users can report the fraud attempt by using the Microsoft Authenticator app or through their phone.
81+
The fraud alert feature lets users report fraudulent attempts to access their resources. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using the Microsoft Authenticator app or through their phone.
8282

8383
The following fraud alert configuration options are available:
8484

@@ -148,9 +148,9 @@ Users can have a combination of up to five OATH hardware tokens or authenticator
148148

149149
## Phone call settings
150150

151-
If users receive phone calls for multi-factor authentication prompts, you can configure their experience, such as caller ID or the voice greeting they hear.
151+
If users receive phone calls for MFA prompts, you can configure their experience, such as caller ID or the voice greeting they hear.
152152

153-
In the United States, if you haven't configured multi-factor authentication caller ID, voice calls from Microsoft come from the following number. Uses with spam filters should exclude this number.
153+
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following number. Uses with spam filters should exclude this number.
154154

155155
* *+1 (855) 330-8653*
156156

@@ -224,7 +224,7 @@ To use your own custom messages, complete the following steps:
224224
1. Browse for and select an .mp3 or .wav sound file to upload.
225225
1. Select **Add** and then **Save**.
226226

227-
## Multi-factor authentication service settings
227+
## MFA service settings
228228

229229
Settings for app passwords, trusted IPs, verification options, and remembering multi-factor authentication on trusted devices are available in the service settings. This is a legacy portal. It isn't part of the regular Azure AD portal.
230230

@@ -239,7 +239,7 @@ The trusted IPs feature of Azure AD Multi-Factor Authentication bypasses multi-f
239239
>
240240
> IPv6 ranges are supported only in the [Named locations (preview)](../conditional-access/location-condition.md) interface.
241241
242-
If your organization uses the NPS extension to provide multi-factor authentication to on-premises applications, the source IP address will always appear to be the NPS server that the authentication attempt flows through.
242+
If your organization uses the NPS extension to provide MFA to on-premises applications, the source IP address will always appear to be the NPS server that the authentication attempt flows through.
243243

244244
| Azure AD tenant type | Trusted IP feature options |
245245
|:--- |:--- |
@@ -335,16 +335,16 @@ To enable or disable verification methods, complete the following steps:
335335

336336
### Remember multi-factor authentication
337337

338-
The **remember multi-factor authentication** feature lets users bypass subsequent verifications for a specified number of days, after they've successfully signed in to a device by using multi-factor authentication. To enhance usability and minimize the number of times a user has to perform multi-factor authentication on a given device, select a duration of 90 days or more.
338+
The **remember multi-factor authentication** feature lets users bypass subsequent verifications for a specified number of days, after they've successfully signed in to a device by using MFA. To enhance usability and minimize the number of times a user has to perform MFA on a given device, select a duration of 90 days or more.
339339

340340
> [!IMPORTANT]
341-
> If an account or device is compromised, remembering multi-factor authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke MFA Sessions](howto-mfa-userdevicesettings.md).
341+
> If an account or device is compromised, remembering MFA for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke MFA Sessions](howto-mfa-userdevicesettings.md).
342342
>
343-
> The revoke action revokes the trusted status from all devices, and the user is required to perform multi-factor authentication again. You can also instruct your users to restore the original multi-factor authentication status on their own devices as noted in [Manage your settings for multi-factor authentication](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7#turn-on-two-factor-verification-prompts-on-a-trusted-device).
343+
> The revoke action revokes the trusted status from all devices, and the user is required to perform multi-factor authentication again. You can also instruct your users to restore the original MFA status on their own devices as noted in [Manage your settings for multi-factor authentication](https://support.microsoft.com/account-billing/change-your-two-step-verification-method-and-settings-c801d5ad-e0fc-4711-94d5-33ad5d4630f7#turn-on-two-factor-verification-prompts-on-a-trusted-device).
344344
345345
#### How the feature works
346346

347-
The **remember multi-factor authentication** feature sets a persistent cookie on the browser when a user selects the **Don't ask again for *X* days** option at sign-in. The user isn't prompted again for multi-factor authentication from that browser until the cookie expires. If the user opens a different browser on the same device or clears the cookies, they're prompted again to verify.
347+
The **remember multi-factor authentication** feature sets a persistent cookie on the browser when a user selects the **Don't ask again for *X* days** option at sign-in. The user isn't prompted again for MFA from that browser until the cookie expires. If the user opens a different browser on the same device or clears the cookies, they're prompted again to verify.
348348

349349
The **Don't ask again for *X* days** option isn't shown on non-browser applications, regardless of whether the app supports modern authentication. These apps use _refresh tokens_ that provide new access tokens every hour. When a refresh token is validated, Azure AD checks that the last multi-factor authentication occurred within the specified number of days.
350350

@@ -353,14 +353,14 @@ The feature reduces the number of authentications on web apps, which normally pr
353353
> [!IMPORTANT]
354354
> The **remember multi-factor authentication** feature isn't compatible with the **keep me signed in** feature of AD FS, when users perform multi-factor authentication for AD FS through MFA Server or a third-party multi-factor authentication solution.
355355
>
356-
> If your users select **keep me signed in** on AD FS and also mark their device as trusted for multi-factor authentication, the user isn't automatically verified after the **remember multi-factor authentication** number of days expires. Azure AD requests a fresh multi-factor authentication, but AD FS returns a token with the original multi-factor authentication claim and date, rather than performing multi-factor authentication again. *This reaction sets off a verification loop between Azure AD and AD FS.*
356+
> If your users select **keep me signed in** on AD FS and also mark their device as trusted for MFA, the user isn't automatically verified after the **remember multi-factor authentication** number of days expires. Azure AD requests a fresh multi-factor authentication, but AD FS returns a token with the original MFA claim and date, rather than performing multi-factor authentication again. *This reaction sets off a verification loop between Azure AD and AD FS.*
357357
>
358358
> The **remember multi-factor authentication** feature isn't compatible with B2B users and won't be visible for B2B users when they sign in to the invited tenants.
359359
>
360360
361361
#### Enable remember multi-factor authentication
362362

363-
To enable and configure the option to allow users to remember their multi-factor authentication status and bypass prompts, complete the following steps:
363+
To enable and configure the option to allow users to remember their MFA status and bypass prompts, complete the following steps:
364364

365365
1. In the Azure portal, search for and select **Azure Active Directory**, and then select **Users**.
366366
1. Select **Per-user MFA**.

0 commit comments

Comments
 (0)