lfo38hgf
My feedback
-
780 votes
Hi everyone,
Thanks for your interest on this feature. This capability is still in the pipeline. The initial estimate was obviously off and we are looking at a new timeline. We are aware of the benefit of having this rollover made automatic and the interest you have on the feature, and that’s how we are looking at it while prioritizing it against other capabilities requests.
Thanks for your patience!Jairo Cadena
Principal Program Manager
Microsoft Identitylfo38hgf supported this idea ·
-
1,116 votes98 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
For requiring additional factors with Windows Hello for Business, please see – https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock
For why PIN is better than a password, please see https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password
For Authenticator app sign in to Azure AD, please see https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-phone-sign-in
As always, other feedback is welcome
/Ravi
lfo38hgf supported this idea ·
An error occurred while saving the comment -
681 votes
We’re working on a solution and will update you when we know more.
An error occurred while saving the comment lfo38hgf commented
Update?
lfo38hgf supported this idea ·
-
19 votes3 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
An error occurred while saving the comment lfo38hgf commented
Would be great.
lfo38hgf supported this idea ·
-
209 votesstarted · 32 comments · Azure Active Directory » Conditional Access · Flag idea as inappropriate… · Admin →
lfo38hgf supported this idea ·
-
2 votes1 comment · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
An error occurred while saving the comment -
65 votes
This is currently possible. Could you please elaborate more on what you’re looking to achieve?
If you mark a user as an User Administrator, you can control all fields for the users in the directory.
lfo38hgf supported this idea ·
-
279 votes38 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
We are currently working on a method to allow users to sign in while their authentication methods are temporarily unavailable.
lfo38hgf supported this idea ·
-
59 votes7 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
lfo38hgf supported this idea ·
An error occurred while saving the comment lfo38hgf commented
Hey Doug,
can you tell us how do you set up your nps to bypass mfa authentication by ad group?
Thank you in advance
-
1 vote0 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
lfo38hgf shared this idea ·
-
146 votes17 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
We are planning to provide a migration path to customers from MFA server to cloud MFA.
If you are using voice and SMS, you can already use the Authentication methods APIs to migrate the data: https://docs.microsoft.com/graph/api/resources/authenticationmethods-overview
If you are using the Authenticator app, users can enable Phone Sign-in to authenticate without passwords in the cloud: https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-phone#azure-mfa-server
lfo38hgf supported this idea ·
-
436 votes54 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
Hey folks! Thank you for your feedback. We are reviewing this ask and will keep you up to date on our findings. We have also added information about this limitation in our documentation. Thank you!
lfo38hgf supported this idea ·
-
16 votes0 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
lfo38hgf supported this idea ·
-
173 votes21 comments · Azure Active Directory » Self-Service Password Reset · Flag idea as inappropriate… · Admin →
We are planning to re-design the self-service password reset experience. The new experience will be mobile-friendly! We’ll keep you up to date as we make progress.
lfo38hgf supported this idea ·
-
8 votes1 comment · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
lfo38hgf supported this idea ·
-
25 votes1 comment · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
lfo38hgf supported this idea ·
-
83 votes11 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
lfo38hgf supported this idea ·
-
20 votes1 comment · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
lfo38hgf shared this idea ·
-
41 votes10 comments · Azure Active Directory » Multi-factor Authentication · Flag idea as inappropriate… · Admin →
Azure AD Team responded
Our recommended approach to this situation is to not install MFA Server on premise. You can install the MFA adapter for NPS, which will proxy RADIUS request to Azure MFA in the cloud. This will support VPN or other RADIUS needs on-premise. https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-nps-extension
Richard
An error occurred while saving the comment lfo38hgf commented
Azure AD Team Solution is ****
lfo38hgf supported this idea ·
-
1,962 votes
Hey folks, sorry for the late update. Some backend changes were made to alleviate this issue but I believe it doesn’t solve it for everyone yet. Let me go get some details and come back with a better update. Thanks!
John
lfo38hgf supported this idea ·
WHFB sucks... We need real MFA.