Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This page of documentation is for Specialist use only, Representatives can read it, go for it, you just won't be able to do any of the stuff listed here.

Documentation Source: Manage authentication methods for MFA (Which is out of date...)

Use Case

This article will cover how to get into a user's MFA authentication settings so that you can remove, add, or modify existing authentication methods they have tied to their account.
Situations where you MAY need to use this:

  • A user has gotten a new cellphone
  • A user has gotten a new cellphone number
  • A user has gotten a new office number
  • To revoke existing MFA sessions
  • To require a user to re-register for MFA
  • User registered with the wrong phone number
  • Or any number of issues with their initial device registration...

Identity Verification

  • Should go without saying at this point but PPS ID verification is required before making ANY changes to a user's MFA authentication methods.

Accessing MFA Authentication Methods

  • To Access a User's authentication settings,
  • Search the username/alias in the "Search Users" field, and click on the account when you find it
    NOTE: AzureAD is a bit more flexible than other ADs we use, so you may be able to just search the name.
  • Under the "Manage" heading in the left side-bar, click on Authentication Methods
  • A user can DIRECTLY access these settings themselves, assuming they can log in, via this page: https://mysignins.microsoft.com/security-info

Modifying MFA Authentication Methods

Once you're on a user's authentitication methods page, there's a couple different things you can do.

  • Add authentication Method
  • Reset Password <DO NOT DO THIS>
  • Require re-register for MFA
  • Revoke MFA Sessions
  • Remove Authentication Methods
  • Modify Authentication Methods


User has accidentally blocked their account

  • When setting up, user may accidentally deny their own set up attempt.  This blocks their account and they will no longer be able to set up MFA.
  • To find out if they have blocked themselves, go here:
  1. Start at Azure Directory and click on Security

Image Added
2.  On the following Menu, select MFA

Image Added

3. Select Block/Unblock Users

Image Added

You will now have a list of all user's that have blocked their accounts by denying an MFA log in attempt.  We currently have no access to unblock them, and the ticket must be sent to ITaP Collaboration as a work impaired Incident ticket.  Placing them on the MFA Exempt list does not override the MFA requirement even as a temporary workaround.

Image Added

...to be continued