Azure-Multi-Factor-Authentication
Azure-Multi-Factor-Authentication
Overview
What is Azure Multi-Factor Authentication?
How it Works
Get started
Choose where to deploy
MFA in the cloud
MFA on-premises
MFA for O365 users
Security best practices
How to
Deploy and use
Create an Auth Provider
Configure settings
Reports in MFA
Azure MFA on-premises
Manage users
Assign licenses
Enable or disable MFA
User and device settings
Integrate
Federation Services
Directories
IIS web apps
Remote Desktop Gateway
Develop
Building into Custom Apps (SDK)
Troubleshoot
FAQ
Ask a question
What is Azure Multi-Factor Authentication?
1/30/2017 • 6 min to read • Edit on GitHub
Two-step verification is a method of authentication that requires more than one verification method and adds a
critical second layer of security to user sign-ins and transactions. It works by requiring any two or more of the
following verification methods:
Something you know (typically a password)
Something you have (a trusted device that is not easily duplicated, like a phone)
Something you are (biometrics)
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard
access to data and applications while meeting user demand for a simple sign-in process. It delivers strong
authentication via a range of verification methods, including phone call, text message, or mobile app verification.
Easy to Use - Azure Multi-Factor Authentication is simple to set up and use. The extra protection that comes
with Azure Multi-Factor Authentication allows users to manage their own devices. Best of all, in many instances
it can be set up with just a few simple clicks.
Scalable - Azure Multi-Factor Authentication uses the power of the cloud and integrates with your on-premises
AD and custom apps. This protection is even extended to your high-volume, mission-critical scenarios.
Always Protected - Azure Multi-Factor Authentication provides strong authentication using the highest
industry standards.
Reliable - We guarantee 99.9% availability of Azure Multi-Factor Authentication. The service is considered
unavailable when it is unable to receive or process verification requests for the two-step verification.
Phone call A call is placed to a user’s phone asking them to verify that
they are signing. Press the # key to complete the verification
process. This option is configurable and can be changed to a
code that you specify.
Text message A text message is sent to a user’s smart phone with a 6-digit
code. Enter this code in to complete the verification process.
Mobile app notification A verification request is sent to a user’s smart phone asking
them complete the verification by selecting Verify from the
mobile app. This occurs if app notification is the primary
verification method. If they receive this notification when they
are not signing in, they can report it as fraud.
Verification code with mobile app The mobile app on a user’s device generates a verification
code. This occurs if you selected a verification code as your
primary verification method.
For the mobile app verification methods, Azure Multi-Factor Authentication works with third-party authentication
apps for smart phones. However, we recommend the Microsoft Authenticator app, which is available for Windows
Phone, Android, and IOS.
Available versions of Azure Multi-Factor Authentication
Azure Multi-Factor Authentication is available in three different versions.
VERSION DESCRIPTION
Multi-Factor Authentication for Office 365 This version works exclusively with Office 365 applications and
is managed from the Office 365 portal. So administrators can
now help secure their Office 365 resources with two-step
verification. This version is part of an Office 365 subscription.
Multi-Factor Authentication for Azure Administrators The same subset of two-step verification capabilities for Office
365 is available at no cost to all Azure administrators. Every
administrative account of an Azure subscription can enable
this functionality for additional protection. An administrator
that wants to access Azure portal to create a VM or web site,
manage storage, or use any other Azure service can add MFA
to his administrator account.
Azure Multi-Factor Authentication Also referred to as the "full" version, Azure Multi-Factor
Authentication offers the richest set of capabilities. It provides
additional configuration options via the Azure classic portal,
advanced reporting, and support for a range of on-premises
and cloud applications. Azure Multi-Factor Authentication
comes as part of Azure Active Directory Premium and
Enterprise Mobility Suite, and can be deployed either in the
cloud or on premises. See below for other ways to get Azure
Multi-Factor Authentication.
NOTE
This comparison table discusses the features that are part of each version of Multi-Factor Authentication. If you have the full
Azure Multi-Factor Authentication service, some features may not be available depending on whether you use MFA in the
cloud or MFA on-premises.
MULTI-FACTOR MULTI-FACTOR
AUTHENTICATION FOR OFFICE AUTHENTICATION FOR AZURE AZURE MULTI-FACTOR
FEATURE 365 ADMINISTRATORS AUTHENTICATION
PIN mode ●
Fraud alert ●
MFA Reports ●
One-Time Bypass ●
Event Confirmation ●
Trusted IPs ●
The security of multi-factor authentication lies in its layered approach. Compromising multiple authentication
factors presents a significant challenge for attackers. Even if an attacker manages to learn the user's password, it is
useless without also having possession of the trusted device. Should the user lose the device, the person who finds
it won't be able to use it unless he or she also knows the user's password.
Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for
a simple sign-in process. It provides additional security by requiring a second form of authentication and delivers
strong authentication via a range of easy verification options:
phone call
text message
mobile app notification—allowing users to choose the method they prefer
mobile app verification code
3rd party OATH tokens
For additional information oh how it works see the following video.
Methods available for multi-factor authentication
When a user signs in, an additional verification is sent to the user. The following are a list of methods that can be
used for this second verification.
Phone Call A call is placed to a user’s smart phone asking them to verify
that they are signing in by pressing the # sign. This will
complete the verification process. This option is configurable
and can be changed to a code that you specify.
Text Message A text message will be sent to a user’s smart phone with a 6
digit code. Enter this code in to complete the verification
process.
Mobile App Notification A verification request will be sent to a user’s smart phone
asking them complete the verification by selecting Verify from
the mobile app. This will occur if you selected app notification
as your primary verification method. If they receive this when
they are not signing in, they can choose to report it as fraud.
Verification code with Mobile App A verification code will be sent to the mobile app that is
running on a user’s smart phone. This will occur if you selected
a verification code as your primary verification method.
VERSION DESCRIPTION
Multi-Factor Authentication for Office 365 This version works exclusively with Office 365 applications and
is managed from the Office 365 portal. So administrators can
now help secure their Office 365 resources by using multi-
factor authentication. This version comes with an Office 365
subscription.
Multi-Factor Authentication for Azure Administrators The same subset of Multi-Factor Authentication capabilities for
Office 365 will be available at no cost to all Azure
administrators. Every administrative account of a Azure
subscription can now get additional protection by enabling
this core multi-factor authentication functionality. So an
administrator that wants to access Azure portal to create a
VM, a web site, manage storage, mobile services or any other
Azure Service can add multi-factor authentication to his
administrator account.
VERSION DESCRIPTION
Azure Multi-Factor Authentication Azure Multi-Factor Authentication offers the richest set of
capabilities.
PIN mode *
Fraud alert *
MFA Reports *
One-Time Bypass *
Customization of caller ID *
for phone calls
MULTI-FACTOR MULTI-FACTOR AZURE MULTI-FACTOR
AUTHENTICATION FOR OFFICE AUTHENTICATION FOR AZURE AUTHENTICATION (INCLUDED
365 (INCLUDED IN OFFICE 365 ADMINISTRATORS (INCLUDED IN AZURE AD PREMIUM AND
FEATURE SKUS) WITH AZURE SUBSCRIPTION) ENTERPRISE MOBILITY SUITE)
Event Confirmation *
Trusted IPs *
MFA SDK *
Because there are several flavors of Azure Multi-Factor Authentication (MFA), we must answer a few questions to
figure out which version is the proper one to use. Those questions are:
What am I trying to secure
Where are the users located
What features do I need?
The following sections provide guidance on determining each of these answers.
WHAT ARE YOU TRYING TO SECURE MFA IN THE CLOUD MFA SERVER
PIN mode ●
Fraud alert ● ●
MFA Reports ● ●
One-Time Bypass ●
Trusted IPs ● ●
Conditional access ● ●
FEATURE MFA IN THE CLOUD MFA SERVER
Cache ●
Now that we have determined whether to use cloud multi-factor authentication or the MFA Server on-premises, we
can get started setting up and using Azure Multi-Factor Authentication. Select the icon that represents your
scenario!
Getting started with Azure Multi-Factor
Authentication in the cloud
1/17/2017 • 3 min to read • Edit on GitHub
This article walks through how to get started using Azure Multi-Factor Authentication in the cloud.
NOTE
The following documentation provides information on how to enable users using the Azure Classic Portal. If you are
looking for information on how to set up Azure Multi-Factor Authentication for O365 users, see Set up multi-factor
authentication for Office 365.
Prerequisites
The following prerequisites are required before you can enable Azure Multi-Factor Authentication for your users.
1. Sign up for an Azure subscription - If you do not already have an Azure subscription, you need to sign-up for
one. If you are just starting out and using Azure MFA you can use a trial subscription
2. Create a Multi-Factor Auth Provider and assign it to your directory or assign licenses to users
NOTE
Licenses are available for users who have Azure MFA, Azure AD Premium, or Enterprise Mobility Suite (EMS). MFA is included
in Azure AD Premium and the EMS. If you have enough licenses, you do not need to create an Auth Provider.
Turn on two-step verification for users
To start requiring two-start verification on for a user, change the user's state from disabled to enabled. For more
information on user states, see User States in Azure Multi-Factor Authentication
Use the following procedure to enable MFA for your users.
To turn on multi-factor authentication
1. Sign in to the Azure classic portal as an administrator.
2. On the left, click Active Directory.
3. Under Directory, select the directory for the user you wish to enable.
6. Find the user that you wish to enable for two-step verification. You may need to change the view at the top.
Ensure that the status is disabled.
10. Notice that the user's state has changed from disabled to enabled.
After you have enabled your users, you should notify them via email. The next time they try to sign in, they'll be
asked to enroll their account for two-step verification. Once they start using two-step verification, they'll also need
to set up app passwords to avoid being locked out of non-browser apps.
IMPORTANT
We discourage against moving users directly from the Disable state to the Enforced state. Non-browser-based apps will stop
working because the user has not gone through MFA registration and obtained an app password. If you have non-browser-
based apps and require app passwords, we recommend that you go from a Disabled state to Enabled. This allows users to
register and obtain their app passwords. After that, you can move them to Enforced.
Using PowerShell would be an option for bulk enabling users. Currently there is no bulk enable feature in the
Azure portal and you need to select each user individually. This can be quite a task if you have many users. By
creating a PowerShell script using the following, you can loop through a list of users and enable them.
$st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
$st.RelyingParty = "*"
$st.State = “Enabled”
$sta = @($st)
Set-MsolUser -UserPrincipalName [email protected] -StrongAuthenticationRequirements $sta
Here is an example:
$users = "[email protected]","[email protected]","[email protected]"
foreach ($user in $users)
{
$st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
$st.RelyingParty = "*"
$st.State = “Enabled”
$sta = @($st)
Set-MsolUser -UserPrincipalName $user -StrongAuthenticationRequirements $sta
}
Next Steps
Now that you have set up Azure Multi-Factor Authentication in the cloud, you can configure and set up your
deployment. See Configuring Azure Multi-Factor Authentication for more details.
Getting started with the Azure Multi-Factor
Authentication Server
1/17/2017 • 7 min to read • Edit on GitHub
Now that we have determined to use on-premises Multi-Factor Authentication Server, let’s get going. This page
covers a new installation of the server and setting it up with on-premises Active Directory. If you already have the
PhoneFactor server installed and are looking to upgrade, see Upgrading to the Azure Multi-Factor Server or if you
are looking for information on installing just the web service see Deploying the Azure Multi-Factor Authentication
Server Mobile App Web Service.
IMPORTANT
These two options seem similar, but it is important to know which one to use. If your users have licenses that come with
MFA, don't create a Multi-Factor Auth Provider to get to the server download. Instead, use option 2 to download the server
from the service settings page.
Option 1: Download Azure Multi-Factor Authentication Server from the Azure classic portal
Use this download option if you already have a Multi-Factor Auth Provider because you pay for MFA on a per-
enabled user or per-authentication basis.
1. Sign in to the Azure classic portal as an administrator.
2. On the left, select Active Directory.
3. On the Active Directory page, click Multi-Factor Auth Providers
If you aren't using the Event Confirmation feature, and users aren't using mobile apps to verify from devices on the
corporate network, the IP addresses can be reduced to the following ranges:
5. Back on the page that we downloaded the server from, click the Generate Activation Credentials button.
Copy this information into the Azure MFA Server in the boxes provided and click Activate.
The above steps show an express setup with the configuration wizard. You can rerun the authentication wizard by
selecting it from the Tools menu on the server.
Next steps
For additional information on advanced setup and configuration information, use the links in the following table:
METHOD DESCRIPTION
RADIUS Authentication Information on setup and configuring the Azure MFA Server
with RADIUS. Using RADIUS allows you to integrate various
third-party systems with Azure MFA Server.
IIS Authentication Information on setup and configuring the Azure MFA Server
with IIS. Using IIS allows you to integrate various third-party
systems with Azure MFA Server.
Windows Authentication Information on setup and configuring the Azure MFA Server
with Windows Authentication.
LDAP Authentication Information on setup and configuring the Azure MFA Server
with LDAP Authentication. Using LDAP allows you to integrate
various third-party systems with Azure MFA Server.
Remote Desktop Gateway and Azure Multi-Factor Information on setup and configuring the Azure MFA Server
Authentication Server using RADIUS with Remote Desktop Gateway using RADIUS.
Sync with Windows Server Active Directory Information on setup and configuring synchronization
between Active Directory and the Azure MFA Server.
METHOD DESCRIPTION
Deploying the Azure Multi-Factor Authentication Server Information on setup and configuring the Azure MFA server
Mobile App Web Service web service.
Advanced scenarios with Azure Multi-Factor Authentication Step-by-step configuration guides for Cisco, Citrix, and Juniper
and third-party VPNs VPN appliances.
Security Best Practices for using Azure Multi-Factor
Authentication with Azure AD accounts
1/17/2017 • 8 min to read • Edit on GitHub
When enhancing your authentication process, two-step verification is the preferred choice for most organizations.
Azure Multi-Factor Authentication (MFA) enables companies to meet their security and compliance requirements
while providing a simple sign-in experience for their users. This article covers some best practices that you should
consider when planning for the adoption of Azure MFA.
The first step for adopting Azure MFA in the cloud using Azure AD Premium or the Enterprise Mobility Suite is to
assign licenses to your users. Azure Multi-Factor Authentication is part of these suites and as such your
organization doesn't need anything additional to extend the two-step verification capability to all users. You only
need to assign a license to a user, and then you can turn on MFA.
When setting up Multi-Factor Authentication, consider the following:
You do not need to create a Multi-Factor Auth Provider. Azure AD Premium and the Enterprise Mobility Suite
both come with Azure Multi-Factor Authentication.
Azure AD Connect is only a requirement if you are synchronizing your on-premises Active Directory
environment with an Azure AD directory. If you use an Azure AD directory that is not synchronized with an on-
premises instance of Active Directory, you do not need Azure AD Connect.
Multi-Factor Auth Provider
If you don't have Azure AD Premium or the Enterprise Mobility Suite, then the first step for adopting Azure MFA in
the cloud is to create an MFA Auth Provider. Although MFA is available by default for global administrators who
have Azure Active Directory, when you are deploying MFA for your organization you need to extend the two-step
verification capability to all users. To do that you need a Multi-Factor Auth Provider. When selecting the Auth
Provider, you need to select a directory and consider the following:
You do not need an Azure AD directory to create a Multi-Factor Auth Provider. However, you need to associate
the Multi-Factor Auth Provider with an Azure AD directory if you want the following functionalities:
Extend two-step verification to all your users
Offer your global administrators additional features, such as the management portal, custom greetings,
and reports.
DirSync or AAD Sync are only required if you are synchronizing your on-premises Active Directory environment
with an Azure AD directory. If you use an Azure AD directory that is not synchronized with an on-premises
instance of Active Directory, you do not need DirSync or AAD Sync.
Make sure to choose the right usage model for your business (per auth or per enabled user). Once you select
the usage model, you can’t change it.
Per auth: charges you for each verification. Use this model if you want two-step verification for anyone
that accesses a certain app, not for specific users.
Per enabled user: charges you for each user that you enable for Azure MFA. Use this model if you have
some users with Azure AD Premium or Enterprise Mobility Suite licenses, and some without.
User Account
When enabling Azure MFA for your users, user accounts can be in one of three core states: disabled, enabled, or
enforced. Use the following guidelines to ensure you are using the most appropriate option for your deployment:
When the user’s state is set to disabled, that user is not performing two-step verification. This is the default
state.
When the user’s state is set to enabled, it means that the user is enabled but has not completed the registration
process. They will be prompted to complete the process at next sign-in. This setting doesn’t affect non-browser
apps. All apps continue to work until the registration process is completed.
When the user’s state is set to enforced, it means that the user may or may not have completed registration. If
they have completed the registration process, then they are performing two-step verification. Otherwise, the
user will be prompted to complete the registration process at next sign-in. This setting does affect non-browser
apps. These apps will not work until app passwords are created and used.
Use the User Notification Template available in the article Getting started with Azure Multi-Factor Authentication in
the cloud to send an email to your users regarding MFA adoption.
Supportability
Since most users are accustomed to using only passwords to authenticate, it is important that your company brings
awareness to all users regarding this process. This awareness can reduce the likelihood that users will call your help
desk for minor issues related to MFA. However, there are some scenarios where temporarily disabling MFA is
necessary. Use the following guidelines to understand how to handle those scenarios:
Make sure your technical support personnel are trained to handle scenarios where the mobile app or phone is
not receiving a notification or phone call and for this reason the user is unable to sign in. Technical support can
enable a one-time bypass option to allow a user to authenticate a single time by "bypassing" two-step
verification. The bypass is temporary and expires after the specified number of seconds.
If necessary, you can leverage the Trusted IPs capability in Azure MFA. This feature allows administrators of a
managed or federated tenant the ability to bypass two-step verification for users that are signing in from the
company’s local intranet. The features are available for Azure AD tenants that have Azure AD Premium,
Enterprise Mobility Suite, or Azure Multi-Factor Authentication licenses.
Additional Considerations
Use the list below to understand some additional considerations and best practices for each component that will be
deployed on-premises:
METHOD DESCRIPTION
RADIUS Authentication Information on setup and configuring the Azure MFA Server
with RADIUS.
IIS Authentication Information on setup and configuring the Azure MFA Server
with IIS.
Windows Authentication Information on setup and configuring the Azure MFA Server
with Windows Authentication.
LDAP Authentication Information on setup and configuring the Azure MFA Server
with LDAP Authentication.
Remote Desktop Gateway and Azure Multi-Factor Information on setup and configuring the Azure MFA Server
Authentication Server using RADIUS with Remote Desktop Gateway using RADIUS.
Sync with Windows Server Active Directory Information on setup and configuring synchronization
between Active Directory and the Azure MFA Server.
Deploying the Azure Multi-Factor Authentication Server Information on setup and configuring the Azure MFA server
Mobile App Web Service web service.
Advanced VPN Configuration with Azure Multi-Factor Information on configuring Cisco ASA, Citrix Netscaler, and
Authentication Juniper/Pulse Secure VPN appliances using LDAP or RADIUS.
Additional Resources
While this article highlights some best practices for Azure MFA, there are other resources that you can also use
while planning your MFA deployment. The list below has some key articles that can assist you during this process:
Reports in Azure Multi-Factor Authentication
Setup experience for Azure Multi-Factor Authentication
Azure Multi-Factor Authentication FAQ
Getting started with an Azure Multi-Factor Auth
Provider
1/17/2017 • 2 min to read • Edit on GitHub
Two-step verification is available by default for global administrators who have Azure Active Directory, and Office
365 users. However, if you wish to take advantage of advanced features then you should purchase the full version
of Azure Multi-Factor Authentication (MFA).
NOTE
An Azure Multi-Factor Auth Provider is used to take advantage of features provided by the full version of Azure MFA. It is for
users who do not have licenses through Azure MFA, Azure AD Premium, or EMS. Azure MFA, Azure AD Premium, and
EMS include the full version of Azure MFA by default. If you have licenses, then you do not need an Azure Multi-Factor Auth
Provider.
IMPORTANT
To download the SDK, create an Azure Multi-Factor Auth Provider even if you have Azure MFA, AAD Premium, or EMS
licenses. If you create an Azure Multi-Factor Auth Provider for this purpose and already have licenses, be sure to create the
Provider with the Per Enabled User model. Then, link the Provider to the directory that contains the Azure MFA, Azure AD
Premium, or EMS licenses. This ensures that you are only billed if you have more unique users using the SDK than the
number of licenses you own.
This article helps you manage Azure Multi-Factor Authentication now that you are up and running. It covers a
variety of topics that help you to get the most out of Azure Multi-Factor Authentication. Not all of these features
are available in every version of Azure Multi-Factor Authentication.
The configuration for some of the features below is found in the Azure Multi-Factor Authentication Management
Portal. There are two different ways that you can access the MFA management portal, which are both done via the
Azure portal. The first is by managing a Multi-Factor Auth Provider if using consumption-based MFA. The second
is via the MFA service settings. The second option requires either a Multi-Factor Auth Provider or an Azure MFA,
Azure AD Premium or Enterprise Mobility Suite license.
To access the MFA Management Portal via an Azure Multi-Factor Auth Provider, sign into the Azure portal as an
administrator and select the Active Directory option. Click the Multi-Factor Auth Providers tab, then select your
directory and click the Manage button at the bottom.
To access the MFA Management Portal via the MFA Service Settings page, sign into the Azure portal as an
administrator and select the Active Directory option. Click on your directory and then click the Configure tab.
Under the multi-factor authentication section, select Manage service settings. At the bottom of the MFA Service
Settings page, click the Go to the portal link.
Fraud alert Fraud alert can be configured and set How to set up, configure and report
up so that your users can report fraud
fraudulent attempts to access their
resources.
One-time bypass A one-time bypass allows a user to How to set up and configure a one-
authenticate a single time by time bypass
"bypassing" multi-factor authentication.
Custom Voice Messages Custom voice messages allow you to How to set up and configure custom
use your own recordings or greetings greetings and messages
with multi-factor authentication.
Caching Caching allows you to set a specific How to set up and configure
time period so that subsequent authentication caching.
authentication attempts succeed
automatically.
Trusted IPs Trusted IPs is a feature of multi-factor Configure and set up IP addresses that
authentication that allows are exempt for multi-factor
administrators of a managed or authentication
federated tenant the ability to bypass
multi-factor authentication for users
that are signing in from the company’s
local intranet.
FEATURE DESCRIPTION WHAT IS COVERED
App Passwords An app password allows an application Information about app passwords.
that is not MFA-aware to bypass multi-
factor authentication and continue
working.
Remember Multi-Factor Authentication Allows you to remember devices for a Information about enabling this feature
for remembered devices and browsers set number of days after a user has and setting up the number of days.
successfully signed in using MFA.
Selectable Verification Methods Allows you to choose the Information about enabling or disabling
authentication methods that are specific authentication methods such as
available for users to use. call or text messages.
Fraud Alert
Fraud alert can be configured and set up so that your users can report fraudulent attempts to access their
resources. Users can report fraud either with the mobile app or through their phone.
To set up and configure fraud alert
1. Log on to http://azure.microsoft.com
2. Navigate to the MFA Management Portal per the instructions at the top of this page.
3. In the Azure Multi-Factor Authentication Management Portal, click Settings under the Configure section.
4. Under the Fraud Alert section of the Settings page, check the Allow users to submit Fraud Alerts checkbox.
5. If you want users to be blocked when fraud is reported, place a check in Block user when fraud is reported.
6. In the Code To Report Fraud During Initial Greeting textbox, enter a number code that can be used during
call verification. If a user enters this code plus # instead of just the # sign, then a fraud alert will be reported.
7. At the bottom, click Save.
NOTE
Microsoft’s default voice greetings instruct users to press 0# to submit a fraud alert. If you want to use a code other than 0,
you should record and upload your own custom voice greetings with appropriate instructions.
To report fraud alert
Fraud alert can be reported two ways. Either through the mobile app or through the phone.
To report fraud alert with the mobile app
1. When a verification is sent to your phone, select it to start the Microsoft Authenticator app.
2. To report fraud, click the Cancel and Report Fraud. This brings up a box that says your organization's IT Support
staff will be notified.
3. Click report fraud.
4. On the app, click Close.
To report fraud alert with the phone
1. When a verification call comes in to your phone, answer it.
2. To report fraud, enter the code that has been configured to correspond with reporting fraud via the phone and
then the # sign. You will be notified that a fraud alert has been submitted.
3. End the call.
To view the fraud report
1. Log on to http://azure.microsoft.com
2. On the left, select Active Directory.
3. At the top select Multi-Factor Auth Providers. This brings up a list of your Multi-Factor Auth Providers.
4. If you have more than one Multi-Factor Auth Provider, select the one you wish to view the fraud alert report
and click Manage at the bottom of the page. If you have only one, click Manage. This opens the Azure Multi-
Factor Authentication Management Portal.
5. On the Azure Multi-Factor Authentication Management Portal, on the left, under View A Report, click Fraud
Alert.
6. Specify the date range that you wish to view in the report. Also you can specify any specific usernames, phone
numbers, and the user's status.
7. Click Run. This brings up a report similar to the one below. You can also click Export to CSV if you wish to
export the report.
One-time bypass
A one-time bypass allows a user to authenticate a single time by "bypassing" multi-factor authentication. The
bypass is temporary and expires after the specified number of seconds. So in situations where the mobile app or
phone is not receiving a notification or phone-call, you can enable a one-time bypass so the user can access the
desired resource.
To create a one -time bypass
1. Log on to http://azure.microsoft.com
2. Navigate to the MFA Management Portal per the instructions at the top of this page.
3. In the Azure Multi-Factor Authentication Management Portal, if you see the name of your tenant or Azure MFA
Provider on the left with a + next to it, click the + see different MFA Server replication groups and the Azure
Default group. Click on the appropriate group.
4. Under User Administration, click One-Time Bypass.
5. On the One-Time Bypass page, click New One-Time Bypass.
6. Enter the user’s username, the number of seconds that the bypass will exist, the reason for the bypass and click
Bypass.
7. At this point, the user must sign in before the one-time bypass expires.
To view the one -time bypass report
1. Log on to http://azure.microsoft.com
2. On the left, select Active Directory.
3. At the top select Multi-Factor Auth Providers. This brings up a list of your Multi-Factor Auth Providers.
4. If you have more than one Multi-Factor Auth Provider, select the one you wish to view the fraud alert report
and click Manage at the bottom of the page. If you have only one, click Manage. This opens the Azure Multi-
Factor Authentication Management Portal.
5. On the Azure Multi-Factor Authentication Management Portal, on the left, under View A Report, click One-Time
Bypass.
6. Specify the date range that you wish to view in the report. Also you can specify any specific usernames, phone
numbers, and the user's status.
7. Click Run. This brings up a report similar to the one below. You can also click Export to CSV if you wish to
export the report.
Federated All Federated Users - All federated users who are signing-in
from inside the organization will bypass multi-factor
authentication using a claim issued by AD FS.
Specific IP address ranges – Administrators can specify a
range of IP addresses that can bypass multi-factor
authentication for users that are signing in from the
company’s intranet.
This bypass only works from inside a company’s intranet. So for example, if you only selected all federated users,
and a user signs in from outside the company’s intranet, that user has to authenticate using multi-factor
authentication even if the user presents an AD FS claim. The following table describes when multi-factor
authentication and app passwords are required inside your corpnet and outside your corpnet when Trusted IPs is
enabled.
For rich client apps, regular passwords work if the user has For rich client apps, app passwords required
not created any app passwords. Once an app password has
been created, app passwords are required.
For rich client apps, app passwords required. For rich client apps, app passwords required.
App Passwords
In some apps, like Office 2010 or older and Apple Mail you can't use multi-factor authentication. To use these
apps, you'll need to use "app passwords" in place of your traditional password. The app password allows the
application to bypass multi-factor authentication and continue working.
NOTE
Modern Authentication for the Office 2013 Clients
Office 2013 clients (including Outlook) now support new Authentication Protocols and can be enabled to support Multi-
Factor Authentication. This means that once enabled, app passwords are not required for use with Office 2013 clients. For
more information, see Office 2013 modern authentication public preview announced.
WARNING
App passwords don't work in hybrid environments where clients communicate with both on-premises and cloud
autodiscover endpoints. This is because domain passwords are required to authenticate on-premises and app passwords are
required to authenticate with the cloud.
To create app passwords if you do not have an Office 365 or Azure subscription
1. Sign in to https://myapps.microsoft.com
2. At the top, select profile.
3. Click on your user name and select Additional Security Verification.
4. On the proofup page, at the top, select app passwords
5. Click Create
6. Enter a name for the app password and click Next
7. Copy the app password to the clipboard and paste it into your app.
NOTE
This feature is implemented as a browser cookie cache. It doesn't work if your browser cookies are not enabled.
METHOD DESCRIPTION
Text message to phone Sends a text message containing a verification code to the
user. The user is prompted to either reply to the text message
with the verification code or to enter the verification code into
the sign-in interface.
Notification through mobile app In this mode, the Microsoft Authenticator app prevents
unauthorized access to accounts and stops fraudulent
transactions. This is done using a push notification to your
phone or registered device. Simply view the notification and if
it is legitimate you tap Verify. Otherwise you may choose
Deny or choose to deny and report the fraudulent
notification. For information on reporting fraudulent
notifications see How to use the Deny and Report Fraud
Feature for Multi-Factor Authentication.
The Microsoft Authenticator app is available for Windows
Phone, Android, and IOS.
Verification code from mobile app In this mode, the Microsoft Authenticator app can be used as
a software token to generate an OATH verification code. This
verification code can then be entered along with the
username and password to provide the second form of
authentication.
The Microsoft Authenticator app is available for Windows
Phone, Android, and IOS.
7. Click save.
8. Click close.
Reports in Azure Multi-Factor Authentication
1/23/2017 • 1 min to read • Edit on GitHub
Azure Multi-Factor Authentication provides several reports that can be used by you and your organization. These
reports can be accessed through the Multi-Factor Authentication Management Portal, which requires that you have
an Azure MFA Provider, or an Azure MFA, Azure AD Premium or Enterprise Mobility Suite license. The following is a
list of the available reports.
You can access reports through the Azure Management portal.
NAME DESCRIPTION
Blocked User History These reports show the history of requests to block or
unblock users.
Fraud Alert Shows a history of fraud alerts submitted during the date
range you specified.
Queued Lists reports queued for processing and their status. A link to
download or view the report is provided when the report is
complete.
To view reports
1. Log on to http://azure.microsoft.com
2. On the left, select Active Directory.
3. Select one of the following options:
Option 1: Click the Multi-Factor Auth Providers tab. Select your MFA provider and click the Manage
button at the bottom.
Option 2: Select your directory and click the Configure tab. Under the multi-factor authentication section,
select Manage service settings. At the bottom of the MFA Service Settings page, click the Go to the portal
link.
4. In the Azure Multi-Factor Authentication Management Portal, you will see the View a Report section in the left
navigation. From here you can select the reports described above.
Additional Resources
For Users
Azure Multi-Factor Authentication on MSDN
Deploy the user portal for the Azure Multi-Factor
Authentication Server
1/17/2017 • 12 min to read • Edit on GitHub
The user portal allows the administrator to install and configure the Azure Multi-Factor Authentication User Portal.
The user portal is an IIS web site that allows users to enroll in Azure Multi-Factor Authentication and maintain their
accounts. A user may change their phone number, change their PIN, or choose to bypass two-step verification
during their next sign-on.
Users sign in to the User Portal using their normal username and password, then either complete a two-step
verification call or answer security questions to complete their authentication. If user enrollment is allowed, users
configure their phone number and PIN the first time they sign in to the user portal.
User Portal Administrators may be set up and granted permission to add new users and update existing users.
Deploy the user portal on the same server as the Azure Multi-Factor
Authentication Server
The following pre-requisites are required to install the users portal on the same server as the Azure Multi-Factor
Authentication Server:
IIS, including asp.net and IIS 6 meta base compatibility (for IIS 7 or higher)
Logged in user must have admin rights for the computer and Domain if applicable. This is because the account
needs permissions to create Active Directory security groups.
To deploy the user portal
1. Within the Azure Multi-Factor Authentication Server, click the User Portal icon in the left menu, then click
Install User Portal.
2. Click Next.
3. Click Next.
4. If the computer is domain-joined, and Active Directory is not configured to secure communication between the
user portal and the Azure Multi-Factor Authentication service, then the Active Directory step is displayed. Click
the Next button to automatically complete this configuration.
5. Click Next.
6. Click Next.
7. Click Close.
8. Open a web browser from any computer and navigate to the URL where the user portal was installed (e.g.
https://www.publicwebsite.com/MultiFactorAuth). Ensure that no certificate warnings or errors are displayed.
User Portal URL Enter the URL of where the portal is being hosted.
USER PORTAL SETTINGS DESCRIPTION
Allow users to log in Allow users to enter a username and password on the sign-in
page for the User portal. If this is not selected, the boxes are
grayed out.
Allow users to initiate One-Time Bypass Allow users to initiate a one-time bypass. If a user sets this up,
it will take effect the next time the user signs in. Prompt for
bypass seconds provides the user with a box so they can
change the default of 300 seconds. Otherwise, the one-time
bypass is only good for 300 seconds.
Allow users to select method Allow users to specify their primary contact method. This can
be phone call, text message, mobile app, or OATH token.
Allow users to select language Allow users to change the language that is used for the phone
call, text message, mobile app, or OATH token.
Allow users to activate mobile app Allow users to generate an activation code to complete the
mobile app activation process that is used with the server. You
can also set the number of devices they can activate the app
on, between 1 and 10.
Use security questions for fallback Allow security questions in case two-step verification fails. You
can specify the number of security questions that must be
successfully answered.
Allow users to associate third-party OATH token Allow users to specify a third-party OATH token.
Use OATH token for fallback Allow for the use of an OATH token in case two-step
verification is not successful. You can also specify the session
timeout in minutes.
Enable logging Enable logging on the user portal. The log files are located at:
C:\Program Files\Multi-Factor Authentication Server\Logs.
The majority of these settings are visible to the user once they are enabled and signed in to the user portal.
To configure the user portal settings in the Azure Multi-Factor Authentication Server
1. In the Azure Multi-Factor Authentication Server, click the User Portal icon. On the Settings tab, enter the URL to
the user portal in the User Portal URL textbox. This URL is included in the emails that are sent to users when
they are imported into the Azure Multi-Factor Authentication Server if the email functionality has been enabled.
2. Choose the settings that you want to use in the User Portal. For example, if users are allowed to control their
authentication methods, ensure that Allow users to select method is checked, along with the methods they
can choose from.
3. Click the Help link in the top right corner for help understanding any of the settings displayed.
Administrators tab
This tab simply allows you to add users who will have administrative privileges. When adding an administrator, you
can fine-tune the permissions that they receive. Click the Add button, select a user and their permissions, and then
click Add.
Security Questions
This tab allows you to specify the security questions that users will need answer if the Use security questions for
fallback option is selected. Azure Multi-Factor Authentication Server comes with default questions that you can
use. You can change the order or add your own questions. When adding your own questions, you can specify the
language you would like those questions to appear in as well.
SAML
Use this tab to configure the user portal to accept claims from an identity provider using SAML. You can specify the
timeout session, the verification certificate, and the Log out redirect URL.
Trusted IPs
This tab allows you to specify either single IP addresses or IP address ranges that can be added so that users who
sign in from one of these address don't have to complete two-step verification.
Self-Service User Enrollment
If you want your users to sign in and enroll, you must select the Allow users to log in and Allow user
enrollment options under the Settings tab. Remember that the settings you select affect the user sign-in
experience.
For example, when a user signs in to the user portal for the first time, they are then taken to the Azure Multi-Factor
Authentication User Setup page. Depending on how you have configured Azure Multi-Factor Authentication, the
user may be able to select their authentication method.
If they select the Voice Call verification method or have been pre-configured to use that method, the page will
prompt the user to enter their primary phone number and extension if applicable. They may also be allowed to
enter a backup phone number.
If the user is required to use a PIN when they authenticate, the page will also prompt them to create a PIN. After
entering their phone number(s) and PIN (if applicable), the user clicks the Call Me Now to Authenticate button.
Azure Multi-Factor Authentication will perform a phone call verification to the user’s primary phone number. The
user must answer the phone call and enter their PIN (if applicable) and press # to move on to the next step of the
self-enrollment process.
If the user selects the Text Message verification method or has been pre-configured to use that method, the page
will prompt the user for their mobile phone number. If the user is required to use a PIN when they authenticate, the
page will also prompt them to enter a PIN. After entering their phone number and PIN (if applicable), the user clicks
the Text Me Now to Authenticate button. Azure Multi-Factor Authentication will perform an SMS verification to
the user’s mobile phone. The user receives the text message with a one-time-passcode (OTP), then replies to the
message with that OTP plus their PIN (if applicable).
If the user selects the Mobile App verification method, the page will prompt the user to install the Microsoft
Authenticator app on their device and generate an activation code. After installing the app, the user clicks the
Generate Activation Code button.
NOTE
To use the Microsoft Authenticator app, the user must enable push notifications for their device.
The page then displays an activation code and a URL along with a barcode picture. If the user is required to use a
PIN when they authenticate, the page will also prompt them to enter a PIN. The user enters the activation code and
URL into the Microsoft Authenticator app or uses the barcode scanner to scan the barcode picture and clicks the
Activate button.
After the activation is complete, the user clicks the Authenticate Me Now button. Azure Multi-Factor
Authentication will perform a verification to the user’s mobile app. The user must enter their PIN (if applicable) and
press the Authenticate button in their mobile app to move on to the next step of the self-enrollment process.
If the administrators have configured the Azure Multi-Factor Authentication Server to collect security questions and
answers, the user is then taken to the Security Questions page. The user must select four security questions and
provide answers to their selected questions.
The user self-enrollment is now complete and the user is signed in to the user portal. Users can sign back in to the
user portal at any time in the future to change their phone numbers, PINs, authentication methods, and security
questions if allowed by their administrators.
Advanced scenarios with Azure Multi-Factor
Authentication and third-party VPN solutions
1/17/2017 • 1 min to read • Edit on GitHub
Azure Multi-Factor Authentication can be used to seamlessly connect with various third-party VPN solutions. This
article focuses on Cisco® ASA VPN appliance, Citrix NetScaler SSL VPN appliance, and the Juniper Networks
Secure Access/Pulse Secure Connect Secure SSL VPN appliance. We created configuration guides for these three
common appliances, but Multi-Factor Authentication Server can integrate with most systems that use RADIUS,
LDAP, IIS, or claims-based authentication to AD FS. You can find more details in MFA Server configurations.
Cisco ASA with Anyconnect VPN and Azure MFA Seamlessly integrate your Cisco ASA VPN appliance with Azure
Configuration for LDAP MFA using LDAP
Cisco ASA with Anyconnect VPN and Azure MFA Seamlessly integrate your Cisco ASA VPN appliance with Azure
Configuration for RADIUS MFA using RADIUS
Citrix NetScaler SSL VPN and Azure MFA Configuration for Seamlessly integrate your Citrix NetScaler SSL VPN with Azure
LDAP MFA appliance using LDAP
Citrix NetScaler SSL VPN and Azure MFA Configuration for Seamlessly integrate your Citrix NetScaler SSL VPN appliance
RADIUS with Azure MFA using RADIUS
Juniper/Pulse Secure SSL VPN and Azure MFA Configuration Seamlessly integrate your Juniper/Pulse Secure SSL VPN with
for LDAP Azure MFA appliance using LDAP
Juniper/Pulse Secure SSL VPN and Azure MFA Configuration Seamlessly integrate your Juniper/Pulse Secure SSL VPN
for RADIUS appliance with Azure MFA using RADIUS
Getting started the MFA Server Mobile App Web
Service
1/17/2017 • 6 min to read • Edit on GitHub
The Azure Multi-Factor Authentication App offers an additional out-of-band authentication option. Instead of
placing an automated phone call or SMS to the user during login, Azure Multi-Factor Authentication pushes a
notification to the Azure Multi-Factor Authentication App on the user’s smartphone or tablet. The user simply taps
“Authenticate” (or enters a PIN and taps “Authenticate”) in the app to log in.
In order to use the Azure Multi-Factor Authentication App, the following are required so that the app can
successfully communicate with Mobile App Web Service:
Please see Hardware and Software Requirements for hardware and software requirements
You must be using v6.0 or higher of the Azure Multi-Factor Authentication Server
Mobile App Web Service must be installed on an Internet-facing web server running Microsoft® Internet
Information Services (IIS) IIS 7.x or higher. For more information on IIS see IIS.NET.
Ensure ASP.NET v4.0.30319 is installed, registered and set to Allowed
Required role services include ASP.NET and IIS 6 Metabase Compatibility
Mobile App Web Service must be accessible via a public URL
Mobile App Web Service must be secured with an SSL certificate.
The Azure Multi-Factor Authentication Web Service SDK must be installed in IIS 7.x or higher on the server that
the Azure Multi-Factor Authentication Server
The Azure Multi-Factor Authentication Web Service SDK must be secured with an SSL certificate.
Mobile App Web Service must be able to connect to the Azure Multi-Factor Authentication Web Service SDK
over SSL
Mobile App Web Service must be able to authenticate to the Azure Multi-Factor Authentication Web Service
SDK using the credentials of a service account that is a member of a security group called “PhoneFactor
Admins”. This service account and group exist in Active Directory if the Azure Multi-Factor Authentication
Server is running on a domain-joined server. This service account and group exist locally on the Azure Multi-
Factor Authentication Server if it is not joined to a domain.
Installing the user portal on a server other than the Azure Multi-Factor Authentication Server requires the
following three steps:
1. Install the web service SDK
2. Install the mobile app web service
3. Configure the mobile app settings in the Azure Multi-Factor Authentication Server
4. Activate the Azure Multi-Factor Authentication App for end users
The Windows Authentication section allows the administrator to enable and configure Windows authentication for
one or more applications. The following is a list of things to keep in mind prior to setting up Windows
Authentication.
reboot is needed before the Azure Multi-Factor Authentication for Terminal Services will be in effect.
If ‘Require Azure Multi-Factor Authentication user match’ is checked and you are not in the user list, you will not
be able to log into the machine after reboot.
Trusted IPs is dependent on whether the application can provide the client IP with the authentication. Currently
only Terminal Services is supported.
NOTE
This feature is not supported to secure Terminal Services on Windows Server 2012 R2.
2. Check the Enable Windows authentication checkbox. By default, this box is unchecked.
3. The Applications tab allows the administrator to configure one or more applications for Windows
Authentication.
4. Select a server or application – specify whether the server/application is enabled. Click OK.
5. Click Add… button.
6. The Trusted IPs tab allows you to skip Azure Multi-Factor Authentication for Windows sessions originating from
specific IPs. For example, if employees use the application from the office and from home, you may decide you
don't want their phones ringing for Azure Multi-Factor Authentication while at the office. For this, you would
specify the office subnet as Trusted IPs entry.
7. Click Add… button.
8. Select Single IP if you would like to skip a single IP address.
9. Select IP Range if you would like to skip an entire IP range. Example 10.63.193.1-10.63.193.100.
10. Select Subnet if you would like to specify a range of IPs using subnet notation. Enter the subnet's starting IP and
pick the appropriate netmask from the drop-down list.
11. Click the OK button.
Upgrading the PhoneFactor Agent to Azure Multi-
Factor Authentication Server
1/17/2017 • 4 min to read • Edit on GitHub
Upgrading from the PhoneFactor Agent v5.x or older to the Azure Multi-Factor Authentication Server requires the
PhoneFactor Agent and affiliated components to be uninstalled before the Multi-Factor Authentication Server and
its affiliated components can be installed.
If you have purchased Azure MFA, Azure AD Premium, or Enterprise Mobility Suite licenses, you do not need to
create a Multi-Factor Auth provider. Once you assign the licenses to your users, you can begin enabling them for
MFA.
To assign a license
1. Sign in to the Azure classic portal as an administrator.
2. On the left, select Active Directory.
3. On the Active Directory page, double-click the directory that has the users you wish to enable.
4. At the top of the directory page, select Licenses.
5. On the Licenses page, select Azure Multi-Factor Authentication, Active Directory Premium, or Enterprise
Mobility Suite. If you only have one, then it should be selected automatically.
6. At the bottom of the page, click Assign.
7. In the box that comes up, click next to the users or groups you want to assign licenses to. You should see a
green check mark appear.
8. Click the check mark icon to save the changes.
9. You should see a message saying how many licenses were assigned and how many may have failed. Click Ok.
User States in Azure Multi-Factor Authentication
1/17/2017 • 2 min to read • Edit on GitHub
User accounts in Azure Multi-Factor Authentication have the following three distinct states:
NON-BROWSER APPS
STATE DESCRIPTION AFFECTED NOTES
Disabled The default state for a new No The user is not using multi-
user not enrolled in multi- factor authentication.
factor authentication.
Enabled The user has been enrolled No. They continue to work The user is enabled but has
in multi-factor until the registration process not completed the
authentication. is completed. registration process. They
will be prompted to
complete the process at next
sign-in.
Enforced The user has been enrolled Yes. Apps require app The user may or may not
and has completed the passwords. have completed registration.
registration process for If they have completed the
using multi-factor registration process, then
authentication. they are using multi-factor
authentication. Otherwise,
the user will be prompted to
complete the process at next
sign-in.
6. This will open a new browser tab. Find the user that you wish to enable for multi-factor authentication. You may
need to change the view at the top. Ensure that the status is disabled.
7. Place a check in the box next to their name.
8. On the right, click Enable.
10. You should notice the user's state has changed from disabled to enabled.
11. After you have enabled your users, it is recommended that you notify them via email. It should also inform
them how they can use their non-browser apps to avoid being locked out.
To change the state from enabled/enforced to disabled
1. Sign in to the Azure classic portal as an Administrator.
2. On the left, click Active Directory.
3. Under, Directory click on the directory for the user you wish to enable.
6. This will open a new browser tab. Find the user that you wish to disable. You may need to change the view at
the top. Ensure that the status is either enabled or enforced.
7. Place a check in the box next to their name.
8. On the right, click Disable.
10. You should then see that it was successful. Click close.
Managing user settings with Azure Multi-Factor
Authentication in the cloud
1/23/2017 • 2 min to read • Edit on GitHub
As an administrator, you can manage the following user and device settings.
Require selected users to provide contact methods again
Delete users existing app passwords
Restore MFA on all suspended devices for a user
This is helpful if a computer or device is lost or stolen or you need to remove a users access.
9. Click save.
10. Click close
9. Click save.
10. Click close.
If your organization has federated your on-premises Active Directory with Azure Active Directory using AD FS,
there are two options for using Azure Multi-Factor Authentication.
Secure cloud resources using Azure Multi-Factor Authentication or Active Directory Federation Services
Secure cloud and on-premises resources using Azure Multi-Factor Authentication Server
The following table summarizes the verification experience between securing resources with Azure Multi-Factor
Authentication and AD FS
Securing Azure AD resources using Azure Multi-Factor The first verification step is performed on-premises using
Authentication AD FS.
The second step is a phone-based method carried out
using cloud authentication.
Securing Azure AD resources using Active Directory The first verification step is performed on-premises using
Federation Services AD FS.
The second step is performed on-premises by honoring the
claim.
Next steps
For information on setting up either Azure Multi-Factor Authentication or the Azure Multi-Factor Authentication
Server with AD FS see the following articles:
Secure cloud resources using Azure Multi-Factor Authentication and AD FS
Secure cloud and on-premises resources using Azure Multi-Factor Authentication Server with Windows Server
2012 R2 AD FS
Secure cloud and on-premises resources using Azure Multi-Factor Authentication Server with AD FS 2.0
Securing cloud resources with Azure Multi-Factor
Authentication and AD FS
1/17/2017 • 2 min to read • Edit on GitHub
If your organization is federated with Azure Active Directory, use Azure Multi-Factor Authentication or Active
Directory Federation Services to secure resources that are accessed by Azure AD. Use the following procedures to
secure Azure Active Directory resources with either Azure Multi-Factor Authentication or Active Directory
Federation Services.
3. Navigate to Relying Party Trusts and right-click on the Relying Party Trust. Select Edit Claim Rules…
4. Click Add Rule…
5. From the drop-down, select Send Claims Using a Custom Rule and click Next.
6. Enter a name for the claim rule.
7. Under Custom rule: add the following text:
<saml:Attribute AttributeName="authnmethodsreferences"
AttributeNamespace="http://schemas.microsoft.com/claims">
<saml:AttributeValue>http://schemas.microsoft.com/claims/multipleauthn</saml:AttributeValue>
</saml:Attribute>
6. In the box next to Claim rule name, give your rule a name. For example: InsideCorpNet.
7. From the drop-down, next to Incoming claim type, select Inside Corporate Network.
8. Click Finish.
9. On Issuance Transform Rules, click Add Rule.
10. On the Add Transform Claim Rule Wizard, select Send Claims Using a Custom Rule from the drop-down and
click Next.
11. In the box under Claim rule name: enter Keep Users Signed In.
12. In the Custom rule box, enter:
c:[Type == "http://schemas.microsoft.com/2014/03/psso"]
=> issue(claim = c);
13. Click Finish.
14. Click Apply.
15. Click Ok.
16. Close AD FS Management.
Configure Azure Multi-Factor Authentication Trusted IPs with Federated Users
Now that the claims are in place, we can configure trusted IPs.
1. Sign in to the Azure classic portal.
2. On the left, click Active Directory.
3. Under Directory, select the directory where you want to set up trusted IPs.
4. On the Directory you have selected, click Configure.
5. In the multi-factor authentication section, click Manage service settings.
6. On the Service Settings page, under trusted IPs, select Skip multi-factor-authentication for requests from
federated users on my intranet.
7. Click save.
8. Once the updates have been applied, click close.
That’s it! At this point, federated Office 365 users should only have to use MFA when a claim originates from
outside the corporate intranet.
Secure cloud and on-premises resources using Azure
Multi-Factor Authentication Server with AD FS 2.0
1/17/2017 • 6 min to read • Edit on GitHub
This article is for organizations that are federated with Azure Active Directory, and want to secure resources that are
on-premises or in the cloud. Protect your resources by using the Azure Multi-Factor Authentication Server and
configuring it to work with AD FS so that two-step verification is triggered for high value end points.
This documentation covers using the Azure Multi-Factor Authentication Server with AD FS 2.0. Get more
information on Securing cloud and on-premises resources using Azure Multi-Factor Authentication Server with
Windows Server 2012 R2 AD FS.
4. To detect username, password, and domain variables automatically, enter the Login URL (like
https://sso.contoso.com/adfs/ls) within the Auto-Configure Form-Based Website dialog box and click OK.
5. Check the Require Azure Multi-Factor Authentication user match box if all users have been or will be
imported into the Server and subject to two-step verification. If a significant number of users have not yet been
imported into the Server and/or will be exempt from two-step verification, leave the box unchecked. For
additional information on this feature, see the help file.
6. If the page variables cannot be detected automatically, click the Specify Manually… button in the Auto-
Configure Form-Based Website dialog box.
7. In the Add Form-Based Website dialog box, enter the URL to the ADFS login page in the Submit URL field (like
https://sso.contoso.com/adfs/ls) and enter an Application name (optional). The Application name appears in
Azure Multi-Factor Authentication reports and may be displayed within SMS or Mobile App authentication
messages. See the help file for more information on the Submit URL.
8. Set the Request format to “POST or GET.”
9. Enter the Username variable (ctl00$ContentPlaceHolder1$UsernameTextBox) and Password variable
(ctl00$ContentPlaceHolder1$PasswordTextBox). If your form-based login page displays a domain textbox, enter
the Domain variable as well. You may need to navigate to the login page in a web browser, right-click on the
page and select View Source to find the names of the input boxes within the login page.
10. Check the Require Azure Multi-Factor Authentication user match box if all users have been or will be
imported into the Server and subject to two-step verification. If a significant number of users have not yet been
imported into the Server and/or will be exempt from two-step verification, leave the box unchecked.
11. Click the Advanced… button to review advanced settings. You can configure settings including the ability to
select a custom denial page file, to cache successful authentications to the website using cookies, and to select
how to authenticate the primary credentials.
12. Since the ADFS proxy server is not likely to be joined to the domain, you can use LDAP to connect to your
domain controller for user import and pre-authentication. In the Advanced Form-Based Website dialog box, click
the Primary Authentication tab and select LDAP Bind for the Pre-authentication Authentication type.
13. When complete, click the OK button to return to the Add Form-Based Website dialog box. See the help file for
more information on the advanced settings.
14. Click the OK button to close the dialog box.
15. Once the URL and page variables have been detected or entered, the website data displays in the Form-Based
panel.
16. Click the Native Module tab and select the server, the website that the ADFS proxy is running under (like
“Default Web Site”) or the ADFS proxy application (like “ls” under “adfs”) to enable the IIS plug-in at the desired
level.
17. Click the Enable IIS authentication box at the top of the screen.
18. The IIS authentication is now enabled.
Configure directory integration
You enabled IIS authentication, but to perform the pre-authentication to your Active Directory (AD) via LDAP you
must configure the LDAP connection to the domain controller.
1. Click the Directory Integration icon.
2. On the Settings tab, select the Use specific LDAP configuration radio button.
3. Click the Edit… button.
4. In the Edit LDAP Configuration dialog box, populate the fields with the information required to connect to the
AD domain controller. Descriptions of the fields are included in the table below. This information is also included
in the Azure Multi-Factor Authentication Server help file.
5. Test the LDAP connection by clicking the Test button.
Trusted IPs
Trusted IPs allow users to bypass Azure Multi-Factor Authentication for website requests originating from specific
IP addresses or subnets. For example, you may want to exempt users from two-step verification when they sign in
from the office. For this, you would specify the office subnet as a Trusted IPs entry.
To configure trusted IPs
1. In the IIS Authentication section, click the Trusted IPs tab.
2. Click the Add… button.
3. When the Add Trusted IPs dialog box appears, select one of the Single IP, IP range, or Subnet radio buttons.
4. Enter the IP address, range of IP addresses, or subnet that should be whitelisted. If entering a subnet, select the
appropriate Netmask and click the OK button. The trusted IP has now been added.
Secure your cloud and on-premises resources using
Azure Multi-Factor Authentication Server with AD FS
in Windows Server 2012 R2
1/17/2017 • 7 min to read • Edit on GitHub
If you use Active Directory Federation Services (AD FS) and want to secure cloud or on-premises resources, you can
configure Azure Multi-Factor Authentication Server to work with AD FS. This configuration triggers two-step
verification for high-value endpoints.
In this article, we discuss using Azure Multi-Factor Authentication Server with AD FS in Windows Server 2012 R2.
For more information, read about how to secure cloud and on-premises resources by using Azure Multi-Factor
Authentication Server with AD FS 2.0.
5. If the Active Directory window is displayed, that means two things. Your computer is joined to a domain, and the
Active Directory configuration for securing communication between the AD FS adapter and the Multi-Factor
Authentication service is incomplete. Click Next to automatically complete this configuration, or select the Skip
automatic Active Directory configuration and configure settings manually check box, and then click
Next.
6. If the Local Group windows is displayed, that means two things. Your computer is not joined to a domain, and
the local group configuration for securing communication between the AD FS adapter and the Multi-Factor
Authentication service is incomplete. Click Next to automatically complete this configuration, or select the Skip
automatic Local Group configuration and configure settings manually check box, and then click Next.
7. In the installation wizard, click Next. Azure Multi-Factor Authentication Server creates the PhoneFactor Admins
group and adds the AD FS service account to the PhoneFactor Admins group.
8. On the Launch Installer page, click Next.
9. In the Multi-Factor Authentication AD FS adapter installer, click Next.
10. Click Close when the installation is finished.
11. When the adapter has been installed, you must register it with AD FS. Open Windows PowerShell and run the
following command:
C:\Program Files\Multi-Factor Authentication Server\Register-MultiFactorAuthenticationAdfsAdapter.ps1
12. To use your newly registered adapter, edit the global authentication policy in AD FS. In the AD FS management
console, go to the Authentication Policies node. In the Multi-factor Authentication section, click the Edit
link next to the Global Settings section. In the Edit Global Authentication Policy window, select Multi-
Factor Authentication as an additional authentication method, and then click OK. The adapter is registered as
WindowsAzureMultiFactorAuthentication. Restart the AD FS service for the registration to take effect.
At this point, Multi-Factor Authentication Server is set up to be an additional authentication provider to use with AD
FS.
Related topics
For troubleshooting help, see the Azure Multi-Factor Authentication FAQs
LDAP Authentication and Azure Multi-Factor
Authentication Server
1/17/2017 • 5 min to read • Edit on GitHub
By default, the Azure Multi-Factor Authentication Server is configured to import or synchronize users from Active
Directory. However, it can be configured to bind to different LDAP directories, such as an ADAM directory, or
specific Active Directory domain controller. When connected to a directory via LDAP, the Azure Multi-Factor
Authentication Server can be configured to act as an LDAP proxy to perform authentications. It also allows for the
use of LDAP bind as a RADIUS target, for pre-authentication of users with IIS Authentication, or for primary
authentication in the Azure MFA user portal.
To use Azure Multi-Factor Authentication as an LDAP proxy, insert the Azure Multi-Factor Authentication Server
between the LDAP client (e.g. VPN appliance, application) and the LDAP directory server. The Azure Multi-Factor
Authentication Server must be configured to communicate with both the client servers and the LDAP directory. In
this configuration, the Azure Multi-Factor Authentication Server accepts LDAP requests from client servers and
applications and forwards them to the target LDAP directory server to validate the primary credentials. If the
response from the LDAP directory shows that they primary credentials are valid, Azure Multi-Factor Authentication
performs a second identity verification and sends a response back to the LDAP client. The entire authentication
succeeds only if both the LDAP server authentication and the second-step verification succeed.

3. On the Clients tab, change the TCP port and SSL port if the Azure Multi-Factor Authentication LDAP service
should bind to non-standard ports to listen for LDAP requests.
4. If you plan to use LDAPS from the client to the Azure Multi-Factor Authentication Server, an SSL certificate must
be installed on the server that the Server is running on. Click the Browse… button next to the SSL certificate box
and select the installed certificate that will be used for the secure connection.
5. Click Add…
6. In the Add LDAP Client dialog box, enter the IP address of the appliance, server, or application that will
authenticate to the Server and an Application name (optional). The Application name appears in Azure Multi-
Factor Authentication reports and may be displayed within SMS or Mobile App authentication messages.
7. Check the Require Azure Multi-Factor Authentication user match box if all users have been or will be
imported into the Server and subject to two-step verification. If a significant number of users have not yet been
imported into the Server and/or will be exempt from two-step verification, leave the box unchecked. See the
help file for additional information on this feature.
Repeat these steps to add additional LDAP clients.
Configure the LDAP directory connection
When the Azure Multi-Factor Authentication is configured to receive LDAP authentications, it must proxy those
authentications to the LDAP directory. Therefore, the Target tab only displays a single, grayed out option to use an
LDAP target.
1. To configure the LDAP directory connection, click the Directory Integration icon.
2. On the Settings tab, select the Use specific LDAP configuration radio button.
3. Select Edit…
4. In the Edit LDAP Configuration dialog box, populate the fields with the information required to connect to
the LDAP directory. Descriptions of the fields are included in the Azure Multi-Factor Authentication Server
help file.
The RADIUS Authentication section allows you to enable and configure RADIUS authentication for the Azure Multi-
Factor Authentication Server. RADIUS is a standard protocol to accept authentication requests and to process those
requests. The Azure Multi-Factor Authentication Server acts as a RADIUS server and is inserted between your
RADIUS client (e.g. VPN appliance) and your authentication target, which could be Active Directory (AD), an LDAP
directory or another RADIUS server, in order to add Azure Multi-Factor Authentication. For Azure Multi-Factor
Authentication to function, you must configure the Azure Multi-Factor Authentication Server so that it can
communicate with both the client servers and the authentication target. The Azure Multi-Factor Authentication
Server accepts requests from a RADIUS client, validates credentials against the authentication target, adds Azure
Multi-Factor Authentication, and sends a response back to the RADIUS client. The entire authentication will succeed
only if the both the primary authentication and the Azure Multi-Factor Authentication succeed.
NOTE
The MFA Server only supports PAP (password authentication protocol) and MSCHAPv2 (Microsoft's Challenge-Handshake
Authentication Protocol) RADIUS protocols when acting as a RADIUS server. Other protocols such as EAP (extensible
authentication protocol) can be used when the MFA server acts as a RADIUS proxy to another RADIUS server which supports
that protocol such as Microsoft NPS.
When using other protocols in this configuration, one-way SMS and OATH tokens will not work since the MFA Server is not
able to initiate a successful RADIUS Challenge response using that protocol.
RADIUS Authentication Configuration
To configure RADIUS authentication, install the Azure Multi-Factor Authentication Server on a Windows server. If
you have an Active Directory environment, the server should be joined to the domain inside the network. Use the
following procedure to configure the Azure Multi-Factor Authentication Server:
1. Within the Azure Multi-Factor Authentication Server click the RADIUS Authentication icon in the left menu.
2. Check the Enable RADIUS authentication checkbox.
3. On the Clients tab change the Authentication port(s) and Accounting port(s) if the Azure Multi-Factor
Authentication RADIUS service should bind to non-standard ports to listen for RADIUS requests from the clients
that will be configured.
4. Click Add… button.
5. In the Add RADIUS Client dialog box, enter the IP address of the appliance/server that will authenticate to the
Azure Multi-Factor Authentication Server, an Application name (optional) and a Shared secret. The shared secret
will need to be the same on both the Azure Multi-Factor Authentication Server and appliance/server. The
Application name appears in Azure Multi-Factor Authentication reports and may be displayed within SMS or
Mobile App authentication messages.
6. Check the Require Multi-Factor Authentication user match box if all users have been or will be imported into the
Server and subject to multi-factor authentication. If a significant number of users have not yet been imported
into the Server and/or will be exempt from multi-factor authentication, leave the box unchecked. See the help
file for additional information on this feature.
7. Check the Enable fallback OATH token box if users will use the Azure Multi-Factor Authentication mobile app
authentication and you want to use OATH passcodes as a fallback authentication to the out- of-band phone call,
SMS or push notification.
8. Click the OK button.
9. You may repeat steps 4 through 8 to add additional RADIUS clients.
10. Click the Target tab.
11. If the Azure Multi-Factor Authentication Server is installed on a domain-joined server in an Active Directory
environment, select Windows domain.
12. If users should be authenticated against an LDAP directory, select LDAP bind. When using LDAP bind, you must
click the Directory Integration icon and edit the LDAP configuration on the Settings tab so that the Server can
bind to your directory. Instructions for configuring LDAP can be found in the LDAP Proxy configuration guide.
13. If users should be authenticated against another RADIUS server, select RADIUS server(s).
14. Configure the server that the Server will proxy the RADIUS requests to by clicking the Add button.
15. In the Add RADIUS Server dialog box enter the IP address of the RADIUS server and a Shared secret. The shared
secret will need to be the same on both the Azure Multi-Factor Authentication Server and RADIUS server.
Change the Authentication port and Accounting port if different ports are used by the RADIUS server.
16. Click the OK button.
17. You must add the Azure Multi-Factor Authentication Server as a RADIUS client in the other RADIUS server so
that it will process access requests sent to it from the Azure Multi-Factor Authentication Server. You must use
the same shared secret configured in the Azure Multi-Factor Authentication Server.
18. You may repeat this step to add additional RADIUS servers and configure the order in which the Server should
call them with the Move Up and Move Down buttons. This completes the Azure Multi-Factor Authentication
Server configuration. The Server is now listening on the configured ports for RADIUS access requests from the
configured clients.
The Directory Integration section allows you to configure the server to integrate with Active Directory or another
LDAP directory. It allows you to configure attributes to match the directory schema and set up automatic
synchronization of users.
Settings
By default, the Azure Multi-Factor Authentication Server is configured to import or synchronize users from Active
Directory. The tab allows you to override the default behavior and to bind to a different LDAP directory, an ADAM
directory, or specific Active Directory domain controller. It also provides for the use of LDAP Authentication to
proxy LDAP or for LDAP Bind as a RADIUS target, pre-authentication for IIS Authentication, or primary
authentication for User Portal. The following table describes the individual settings.
FEATURE DESCRIPTION
Use Active Directory Select the Use Active Directory option to use Active Directory
for importing and synchronization. This is the default setting.
Note: The computer must be joined to a domain and you
must be signed on with a domain account for Active Directory
integration to work properly.
FEATURE DESCRIPTION
Include trusted domains Check the Include Trusted Domains checkbox to have the
agent attempt to connect to domains trusted by the current
domain, another domain in the forest, or domains involved in
a forest trust. When not importing or synchronizing users
from any of the trusted domains, uncheck the checkbox to
improve performance. The default is checked.
Use specific LDAP configuration Select the Use LDAP option to use the LDAP settings specified
for importing and synchronization. Note: When Use LDAP is
selected, the user interface changes references from Active
Directory to LDAP.
Edit button The Edit button allows the current LDAP configuration
settings to modified.
Use attribute scope queries Indicates whether attribute scope queries should be used.
Attribute scope queries allow for efficient directory searches
qualifying records based on the entries in another record's
attribute. The Azure Multi-Factor Authentication Server uses
attribute scope queries to efficiently query the users that are a
member of a security group.
Note: There are some cases where attribute scope queries are
supported, but shouldn't be used. For example, Active
Directory can have issues with attribute scope queries when a
security group contains members from more than one
domain. In this case the checkbox should be unchecked.
FEATURE DESCRIPTION
Bind type - Queries Select the appropriate bind type for use when binding to
search the LDAP directory. This is used for imports,
synchronization, and username resolution.
Bind type - Authentications Select the appropriate bind type for use when performing
LDAP bind authentication. See the bind type descriptions
under Bind type - Queries. For example, this allows for
Anonymous bind to be used for queries while SSL bind is used
to secure LDAP bind authentications.
Bind DN or Bind username Enter the distinguished name of the user record for the
account to use when binding to the LDAP directory.
Bind Password Enter the bind password for the Bind DN or username being
used to bind to the LDAP directory. To configure the
password for the Multi-Factor Auth Server AdSync Service,
synchronization must be enabled and the service must be
running on the local machine. The password will be saved in
the Windows Stored Usernames and Passwords under the
account the Multi-Factor Auth Server AdSync Service is
running as. The password will also be saved under the account
the Multi-Factor Auth Server user interface is running as and
under the account the Multi-Factor Auth Server Service is
running as.
Query size limit Specify the size limit for the maximum number of users that a
directory search will return. This limit should match the
configuration on the LDAP directory. For large searches where
paging is not supported, import and synchronization will
attempt to retrieve users in batches. If the size limit specified
here is larger than the limit configured on the LDAP directory,
some users may be missed.
Test button Click the Test button to test binding to the LDAP server.
Filters
Filters allow you to set criteria to qualify records when performing a directory search. By setting the filter you can
scope the objects you want to synchronize.
Attributes
Attributes may be customized as necessary for a specific directory. This allows you to add custom attributes and
fine tune the synchronization to only the attributes that you need. The value for each attribute field should be the
name of the attribute as defined in the directory schema. Use the table below for additional information.
FEATURE DESCRIPTION
Unique identifier Enter the attribute name of the attribute that serves as the
unique identifier of container, security group, and user
records. In Active Directory, this is usually objectGUID. In
other LDAP implementations, it may be entryUUID or
something similar. The default is objectGUID.
... (Select Attribute) buttons Each attribute field has a "..." button next to it that will display
the Select Attribute dialog allowing an attribute to be selected
from a list.
Unique identifier type Select the type of the unique identifier attribute. In Active
Directory, the objectGUID attribute is of type GUID. In other
LDAP implementations, it may be of type ASCII Byte Array or
String. The default is GUID.
Distinguished name Enter the attribute name of the attribute that contains the
distinguished name for each record. In Active Directory, this is
usually distinguishedName. In other LDAP implementations, it
may be entryDN or something similar. The default is
distinguishedName.
Container name Enter the attribute name of the attribute that contains the
name in a container record. The value of this attribute will be
displayed in the Container Hierarchy when importing from
Active Directory or adding synchronization items. The default
is name.
Security group name Enter the attribute name of the attribute that contains the
name in a security group record. The value of this attribute will
be displayed in the Security Group list when importing from
Active Directory or adding synchronization items. The default
is name.
Users The following attributes are used for searching for, displaying,
importing, and synchronizing user information from the
directory.
Username Enter the attribute name of the attribute that contains the
username in a user record. The value of this attribute will be
used as the Multi-Factor Auth Server username. A second
attribute may be specified as a backup to the first. The second
attribute will only be used if the first attribute does not
contain a value for the user. The defaults are
userPrincipalName and sAMAccountName.
First name Enter the attribute name of the attribute that contains the
first name in a user record. The default is givenName.
Last name Enter the attribute name of the attribute that contains the last
name in a user record. The default is sn.
FEATURE DESCRIPTION
Email address Enter the attribute name of the attribute that contains the
email address in a user record. Email address will be used to
send welcome and update emails to the user. The default is
mail.
User group Enter the attribute name of the attribute that contains the
user group in a user record. User group can be used to filter
users in the agent and on reports in the Multi-Factor Auth
Server Management Portal.
Description Enter the attribute name of the attribute that contains the
description in a user record. Description is only used for
searching. The default is description.
Voice call language Enter the attribute name of the attribute that contains the
short name of the language to use for voice calls for the user.
SMS text language Enter the attribute name of the attribute that contains the
short name of the language to use for SMS text messages for
the user.
Phone app language Enter the attribute name of the attribute that contains the
short name of the language to use for phone app text
messages for the user.
OATH token language Enter the attribute name of the attribute that contains the
short name of the language to use for OATH token text
messages for the user.
Business Enter the attribute name of the attribute that contains the
business phone number in a user record. The default is
telephoneNumber.
Home Enter the attribute name of the attribute that contains the
home phone number in a user record. The default is
homePhone.
Pager Enter the attribute name of the attribute that contains the
pager number in a user record. The default is pager.
Mobile Enter the attribute name of the attribute that contains the
mobile phone number in a user record. The default is mobile.
Fax Enter the attribute name of the attribute that contains the fax
number in a user record. The default is
facsimileTelephoneNumber.
IP phone Enter the attribute name of the attribute that contains the IP
phone number in a user record. The default is ipPhone.
FEATURE DESCRIPTION
Extension Enter the attribute name of the attribute that contains the
phone number extension in a user record. The value of the
extension field will be used as the extension to the primary
phone number only. The default is blank.
Restore Defaults button Click the Restore Defaults button to return all attributes back
to their default value. The defaults should work properly with
the normal Active Directory or ADAM schema.
To edit attributes, simply click the edit button on the Attributes tab. This will bring up a windows that allows you to
edit the attributes.
Synchronization
Synchronization keeps the Azure Multi-Factor user database synchronized with the users in Active Directory or
another Lightweight Directory Access Protocol (LDAP) Lightweight Directory Access Protocol directory. The process
is similar to importing users manually from Active Directory, but periodically polls for Active Directory user and
security group changes to process. It also provides for disabling or removing users removed from a container or
security group and removing users deleted from Active Directory.
The Multi-Factor Auth ADSync service is a Windows service that performs the periodic polling of Active Directory.
This is not to be confused with Azure AD Sync or Azure AD Connect. the Multi-Factor Auth ADSync, although built
on a similar code base, is specific to the Azure Multi-Factor Authentication Server. It is installed in a Stopped state
and is started by the Multi-Factor Auth Server service when configured to run. If you have a multi-server Multi-
Factor Auth Server configuration, the Multi-Factor Auth ADSync may only be run on a single server.
The Multi-Factor Auth ADSync service uses the DirSync LDAP server extension provided by Microsoft to efficiently
poll for changes. This DirSync control caller must have the "directory get changes" right and DS-Replication-Get-
Changes extended control access right. By default, these rights are assigned to the Administrator and LocalSystem
accounts on domain controllers. The Multi-Factor Auth AdSync service is configured to run as LocalSystem by
default. Therefore it is simplest to run the service on a domain controller. The service can run as an account with
lesser permissions if you configure it to always perform a full synchronization. This is less efficient, but requires
less account privileges.
If configured to use LDAP and the LDAP directory supports the DirSync control, then polling for user and security
group changes will work the same as it does with Active Directory. If the LDAP directory does not support the
DirSync control, then a full synchronization will be performed during each cycle.
Use the table below for additional information on each of the individual settings on the Synchronization tab.
FEATURE DESCRIPTION
Enable synchronization with Active Directory When checked, the Multi-Factor Auth Server service will be
started to periodically poll Active Directory for changes.
Synchronize every Specify the time interval the Multi-Factor Auth Server service
will wait between polling and processing changes.
Remove users no longer in Active Directory When checked, the Multi-Factor Auth Server service will
process Active Directory deleted user tombstones and remove
the related Multi-Factor Auth Server user.
Always perform a full synchronization When checked, the Multi-Factor Auth Server service will
always perform a full synchronization. When unchecked, the
Multi-Factor Auth Server service will perform an incremental
synchronization by only querying users that have changed.
The default is unchecked.
Require administrator approval when more than X users will Synchronization items can be configured to disable or remove
be disabled or removed users who are no longer a member of the item's container or
security group. As a safeguard, administrator approval can be
required when the number of users to disable or remove
exceeds a threshold. When checked, approval will be required
for specified threshold. The default is 5 and the range is 1 to
999.
The Synchronize Now button allows you to run a full synchronization for the synchronization items specified. A
full synchronization is required whenever synchronization items are added, modified, removed, or reordered. It is
also required before the Multi-Factor Auth AdSync service will be operational since it sets the starting point from
which the service will poll for incremental changes. If changes have been made to synchronization items and a full
synchronization has not been performed, you will be prompted to Synchronize Now when navigating to another
section or when closing the user interface.
The Remove button allows the administrator to delete one or more synchronization items from the Multi-Factor
Auth Server synchronization item list.
WARNING
Once a synchronization item record has been removed, it cannot be recovered. You will need to re-add the synchronization
item record if you deleted it by mistake.
The synchronization item or synchronization items have been removed from Multi-Factor Auth Server. The Multi-
Factor Auth Server service will no longer process the synchronization items.
The Move Up and Move Down buttons allow the administrator to change the order of the synchronization items.
The order is important since the same user may be a member of more than one synchronization item (e.g. a
container and a security group). The settings applied to the user during synchronization will come from the first
synchronization item in the list to which the user is associated. Therefore, the synchronization items should be put
in priority order.
TIP
A full synchronization should be performed after removing synchronization items. A full synchronization should be performed
after ordering synchronization items. Click the Synchronize Now button to perform a full synchronization.
The IIS Authentication section of the Azure Multi-Factor Authentication Server allows you to enable and configure
IIS authentication for integration with Microsoft IIS web applications. The Azure Multi-Factor Authentication Server
installs a plug-in which can filter requests being made to the IIS web server in order to add Azure Multi-Factor
Authentication. The IIS plug-in provides support for Form-Based Authentication and Integrated Windows HTTP
Authentication. Trusted IPs can also be configured to exempt internal IP addresses from two-factor authentication.
Trusted IPs
The Trusted IPs allows users to bypass Azure Multi-Factor Authentication for website requests originating from
specific IP addresses or subnets. For example, you may want to exempt users from Azure Multi-Factor
Authentication while logging in from the office. For this, you would specify the office subnet as an Trusted IPs
entry. To configure Trusted IPs use the following procedure:
1. In the IIS Authentication section, click the Trusted IPs tab.
2. Click the Add… button.
3. When the Add Trusted IPs dialog box appears, select the Single IP, IP range or Subnet radio button.
4. nter the IP address, range of IP addresses or subnet that should be whitelisted. If entering a subnet, select the
appropriate Netmask and click the OK button. The whitelist has now been added.
Remote Desktop Gateway and Azure Multi-Factor
Authentication Server using RADIUS
1/17/2017 • 3 min to read • Edit on GitHub
In many cases, Remote Desktop Gateway uses the local NPS to authenticate users. This document describes how to
route RADIUS request out from the Remote Desktop Gateway (through the local NPS) to the Multi-Factor
Authentication Server.
The Multi-Factor Authentication Server should be installed on a separate server, which will then proxy the RADIUS
request back to the NPS on the Remote Desktop Gateway Server. After NPS validates the username and password,
it will return a response to the Multi-Factor Authentication Server which performs the second factor of
authentication before returning a result to the gateway.
Configure NPS
The RD Gateway uses NPS to send the RADIUS request to Azure Multi-Factor Authentication. A timeout must be
changed to prevent the RD Gateway from timing out before multi-factor authentication has completed. Use the
following procedure to configure NPS.
1. In NPS, expand the RADIUS Clients and Server menu in the left column and click on Remote RADIUS Server
Groups. Go into the properties of the TS GATEWAY SERVER GROUP. Edit the RADIUS Server(s) displayed and
go to the Load Balancing tab. Change the “Number of seconds without response before request is considered
dropped” and the “Number of seconds between requests when server is identified as unavailable” to 30-60
seconds. Click on the Authentication/Account tab and ensure that the RADIUS ports specified match the ports
that the Multi-Factor Authentication Server will be listening on.
2. NPS must also be configured to receive RADIUS authentications back from the Azure Multi-Factor
Authentication Server. Click on RADIUS Clients in the left menu. Add the Azure Multi-Factor Authentication
Server as a RADIUS client. Choose a Friendly name and specify a shared secret.
3. Expand the Policies section in the left navigation and click on Connection Request Policies. It should contain a
Connection Request Policy called TS GATEWAY AUTHORIZATION POLICY that was created when RD Gateway
was configured. This policy forwards RADIUS requests to the Multi-Factor Authentication Server.
4. Copy this policy to create a new one. In the new policy, add a condition that matches the Client Friendly Name
with the Friendly name set in step 2 above for the Azure Multi-Factor Authentication Server RADIUS client.
Change the Authentication Provider to Local Computer. This policy ensures that when a RADIUS request is
received from the Azure Multi-Factor Authentication Server, the authentication occurs locally instead of sending
a RADIUS request back to the Azure Multi-Factor Authentication Server which would result in a loop condition.
To prevent the loop condition, this new policy must be ordered ABOVE the original policy that forwards to the
Multi-Factor Authentication Server.
IMPORTANT
To download the SDK, you need to create an Azure Multi-Factor Auth Provider even if you have Azure MFA, AAD Premium,
or EMS licenses. If you create an Azure Multi-Factor Auth Provider for this purpose and already have licenses, make sure to
create the Provider with the Per Enabled User model. Then, link the Provider to the directory that contains the Azure MFA,
Azure AD Premium, or EMS licenses. This configuration ensures that you are only billed if you have more unique users using
the SDK than the number of licenses you own.
The Azure Multi-Factor Authentication Software Development Kit (SDK) lets you build two-step verification directly
into the sign-in or transaction processes of applications in your Azure AD tenant.
The Multi-Factor Authentication SDK is available for C#, Visual Basic (.NET), Java, Perl, PHP, and Ruby. The SDK
provides a thin wrapper around two-step verification. It includes everything you need to write your code, including
commented source code files, example files, and a detailed ReadMe file. Each SDK also includes a certificate and
private key for encrypting transactions that are unique to your Multi-Factor Authentication Provider. As long as you
have a provider, you can download the SDK in as many languages and formats as you need.
The structure of the APIs in the Multi-Factor Authentication SDK is simple. Make a single function call to an API with
the multi-factor option parameters (like verification mode) and user data (like the telephone number to call or the
PIN number to validate). The APIs translate the function call into web services requests to the cloud-based Azure
Multi-Factor Authentication Service. All calls must include a reference to the private certificate that is included in
every SDK.
Because the APIs do not have access to users registered in Azure Active Directory, you must provide user
information in a file or database. Also, the APIs do not provide enrollment or user management features, so you
need to build these processes into your application.
NOTE
When implementing Multi-Factor Authentication, use the additional methods (phone call or text message) as secondary or
tertiary verification to supplement your primary authentication method (username and password). These methods are not
designed as primary authentication methods.
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head runat="server">
<title>Multi-Factor Authentication Demo</title>
</head>
<body>
<h1>Azure Multi-Factor Authentication Demo</h1>
<form id="form1" runat="server">
<div">
<asp:TextBox id="username" runat="server" width="100px"/><br />
<asp:Textbox id="password" runat="server" width="100px" TextMode="password" /><br />
</div>
</form>
</body>
</html>
Server-Side Code
In the following server-side code, Multi-Factor Authentication is configured and run in Step 2. Standard mode
(MODE_STANDARD) is a telephone call to which the user responds by pressing the # key.
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;
}
}
Azure Multi-Factor Authentication FAQ
1/17/2017 • 9 min to read • Edit on GitHub
This FAQ answers common questions about Azure Multi-Factor Authentication and using the Multi-Factor
Authentication service, including questions about the billing model and usability.
General
Q: How does Azure Multi-Factor Authentication Server handle user data?
With Multi-Factor Authentication Server, user data is stored only on the on-premises servers. No persistent user
data is stored in the cloud. When the user performs two-step verification, Multi-Factor Authentication Server sends
data to the Azure Multi-Factor Authentication cloud service for authentication. Communication between Multi-
Factor Authentication Server and the Multi-Factor Authentication cloud service uses Secure Sockets Layer (SSL) or
Transport Layer Security (TLS) over port 443 outbound.
When authentication requests are sent to the cloud service, data is collected for authentication and usage reports.
Data fields included in two-step verification logs are as follows:
Unique ID (either user name or on-premises Multi-Factor Authentication Server ID)
First and Last Name (optional)
Email Address (optional)
Phone Number (when using a voice call or SMS authentication)
Device Token (when using mobile app authentication)
Authentication Mode
Authentication Result
Multi-Factor Authentication Server Name
Multi-Factor Authentication Server IP
Client IP (if available)
The optional fields can be configured in Multi-Factor Authentication Server.
The verification result (success or denial), and the reason if it was denied, is stored with the authentication data and
is available in authentication and usage reports.
Billing
Most billing questions can be answered by referring to the Multi-Factor Authentication Pricing page.
Q: Is my organization charged for phone calls or text messages used to authenticate my users?
Organizations are not charged for individual phone calls placed or text messages sent to users through Azure
Multi-Factor Authentication. Phone owners might be charged for the phone calls or text messages they receive,
according to their personal phone service.
Q: Does the per-user billing model charge based on the number of users who are configured to use
Multi-Factor Authentication or the number of users who perform verifications?
Billing is based on the number of users configured to use Multi-Factor Authentication.
Q: How does Multi-Factor Authentication billing work?
When you use the "per user" or "per authentication" model, Azure MFA is a consumption-based resource. Any
charges are billed to the organization’s Azure subscription just like virtual machines, websites, etc.
When you use the license model, Azure Multi-Factor Authentication licenses are purchased and then assigned to
users, just like for Office 365 and other subscription products.
Learn more about your options in How Azure Multi-Factor Authentication works
Q: Is there a free version of Azure Multi-Factor Authentication for administrators?
In some instances, yes. Multi-Factor Authentication for Azure Administrators offers a subset of Azure MFA features
at no cost. This offer applies to members of the Azure Global Administrators group in Azure Active Directory
instances that aren't linked to a consumption-based Azure Multi-Factor Authentication provider. Using a Multi-
Factor Authentication provider upgrades all admins and users in the directory who are configured to use Multi-
Factor Authentication to the full version of Azure Multi-Factor Authentication.
Q: Is there a free version of Azure Multi-Factor Authentication for Office 365 users?
In some instances, yes. Multi-Factor Authentication for Office 365 offers a subset of Azure MFA features at no cost.
This offer applies to users who have an Office 365 license assigned, when a consumption-based Azure Multi-Factor
Authentication provider has not been linked to the corresponding instance of Azure Active Directory. Using the
Multi-Factor Authentication provider upgrades all admins and users in the directory who are configured to use
Multi-Factor Authentication to the full version of Azure Multi-Factor Authentication.
Q: Can my organization switch between per-user and per-authentication consumption billing models at
any time?
Your organization chooses a billing model when it creates a resource. You cannot change a billing model after the
resource is provisioned. You can, however, create another Multi-Factor Authentication resource to replace the
original. User settings and configuration options cannot be transferred to the new resource.
Q: Can my organization switch between the consumption billing and license model at any time?
When licenses are added to a directory that already has a per-user Azure Multi-Factor Authentication provider,
consumption-based billing is decremented by the number of licenses owned. If all users configured to use Multi-
Factor Authentication have licenses assigned, the administrator can delete the Azure Multi-Factor Authentication
provider.
You cannot mix per-authentication consumption billing with a license model. When a per-authentication Multi-
Factor Authentication provider is linked to a directory, the organization is billed for all Multi-Factor Authentication
verification requests, regardless of any licenses owned.
Q: Does my organization have to use and synchronize identities to use Azure Multi-Factor
Authentication?
When an organization uses a consumption-based billing model, Azure Active Directory is not required. Linking a
Multi-Factor Authentication provider to a directory is optional. If your organization is not linked to a directory, it
can deploy Azure Multi-Factor Authentication Server or the Azure Multi-Factor Authentication SDK on-premises.
Azure Active Directory is required for the license model because licenses are added to the directory when you
purchase and assign them to users in the directory.
Usability
Q: What does a user do if they don’t receive a response on their phone, or if the phone is not available
to the user?
If the user has configured a backup phone, they should try again and select that phone when prompted on the
sign-in page. If the user doesn’t have another method configured, the organization's administrator can update the
number assigned to the user's primary phone.
Q: What does the administrator do if a user contacts the administrator about an account that the user
can no longer access?
The administrator can reset the user's account by asking them to go through the registration process again. Learn
more about managing user and device settings with Azure Multi-Factor Authentication in the cloud.
Q: What does an administrator do if a user's phone that is using app passwords is lost or stolen?
The administrator can delete all the user's app passwords to prevent unauthorized access. After the user has a
replacement device, the user can recreate the passwords. Learn more about managing user and device settings
with Azure Multi-Factor Authentication in the cloud.
Q: What if the user can't sign in to non-browser apps?
A user who is configured to use Multi-Factor Authentication requires an app password to sign in to some non-
browser apps. A user needs to clear (delete) sign-in information, restart the app, and sign in by using their user
name and app password.
Get more information about creating app passwords and other help with app passwords.
NOTE
Modern authentication for Office 2013 clients
Office 2013 clients (including Outlook) support new authentication protocols. You can configure Office 2013 to support
Multi-Factor Authentication. After you configure Office 2013, app passwords are not required for Office 2013 clients. For
more information, see the Office 2013 modern authentication public preview announcement.
Q: What does a user do if the user does not receive a text message, or if the user replies to a two-way
text message but the verification times out?
Deliver of text messages, and receipt of replies in two-way SMS is not guaranteed because there are uncontrollable
factors that might affect the reliability of the service. These factors include the destination country, the mobile
phone carrier, and the signal strength.
Users who experience difficulty reliably receiving text messages should select the mobile app or phone call method
instead. The mobile app can receive notifications both over cellular and Wi-Fi connections. In addition, the mobile
app can generate verification codes even when the device has no signal at all. The Microsoft Authenticator app is
available for Windows Phone, Android, and IOS.
If you must use text messages, we recommend using one-way SMS rather than two-way SMS when possible. One-
way SMS is more reliable and it prevents users from incurring global SMS charges from replying to a text message
that was sent from another country.
Q: Can I use hardware tokens with Azure Multi-Factor Authentication Server?
If you are using Azure Multi-Factor Authentication Server, you can import third-party Open Authentication (OATH)
time-based, one-time password (TOTP) tokens, and then use them for two-step verification.
You can use ActiveIdentity tokens that are OATH TOTP tokens if you put the secret key file in a CSV file and import
to Azure Multi-Factor Authentication Server. You can use OATH tokens with Active Directory Federation Services
(ADFS), Remote Authentication Dial-In User Service (RADIUS) when the client system can process access challenge
responses, and Internet Information Server (IIS) forms-based authentication.
You can import third-part OATH TOTP tokens with the following formats:
Portable Symmetric Key Container (PSKC)
CSV if the file contains a serial number, a secret key in Base 32 format, and a time interval
Q: Can I use Azure Multi-Factor Authentication Server to secure Terminal Services?
Yes, but, if you are using Windows Server 2012 R2 or later, only by using Remote Desktop Gateway (RD Gateway).
Security changes in Windows Server 2012 R2 have changed the way that Azure Multi-Factor Authentication Server
connects to the Local Security Authority (LSA) security package in Windows Server 2012 and earlier versions. For
versions of Terminal Services in Windows Server 2012 or earlier, you can secure an application with Windows
Authentication. If you are using Windows Server 2012 R2, you need RD Gateway.
Q: Why would a user receive a Multi-Factor Authentication call from an anonymous caller after setting
up caller ID?
When Multi-Factor Authentication calls are placed through the public telephone network, sometimes they are
routed through a carrier that doesn't support caller ID. Because of this, caller ID is not guaranteed, even though the
Multi-Factor Authentication system always sends it.
Errors
Q: What should users do if they see an “Authentication request is not for an activated account” error
message when using mobile app notifications?
Tell them to follow this procedure to remove their account from the mobile app, then add it again:
1. Go to your Azure portal profile and sign in with your organizational account.
2. Select Additional Security Verification.
3. Remove the existing account from the mobile app.
4. Click Configure, and then follow the instructions to reconfigure the mobile app.
Q: What should users do if they see a 0x800434D4L error message when signing in to a non-browser
application?
Currently, a user can use additional security verification only with applications and services that the user can access
through a browser. Non-browser applications (also referred to as rich client applications) that are installed on a
local computer, such as Windows PowerShell, doesn't work with accounts that require additional security
verification. In this case, the user might see the application generate an 0x800434D4L error.
A workaround for this is to have separate user accounts for admin-related and non-admin operations. Later, you
can link mailboxes between your admin account and non-admin account so that you can sign in to Outlook by
using your non-admin account. For more details about this, learn how to give an administrator the ability to open
and view the contents of a user's mailbox.
Next steps
If your question isn't answered here, please leave it in the comments at the bottom of the page. Or, here are some
additional options for getting help:
Search the Microsoft Support Knowledge Base for solutions to common technical issues.
Search for and browse technical questions and answers from the community, or ask your own question in the
Azure Active Directory forums.
If you're a legacy PhoneFactor customer and you have questions or need help resetting a password, use the
password reset link to open a support case.
Contact a support professional through Azure Multi-Factor Authentication Server (PhoneFactor) support. When
contacting us, it's helpful if you can include as much information about your issue as possible. Information you
can supply includes the page where you saw the error, the specific error code, the specific session ID, and the ID
of the user who saw the error.