• Certificates
  • Directory Integration Switch to the Synchronization tab Select Enable synchronization with Active Directory
  • Require administrator approval when disabled or removed users exceed threshold Click Add… Expand .
  • JohnF@ .
  • AD FS Select Allow user enrolment Select Allow users to select method
  • Windows PowerShell , as an administrator
  • Note: If the wizard fails to launch, run Multi-Factor Authentication Server




    Download 78,77 Kb.
    bet4/8
    Sana22.07.2021
    Hajmi78,77 Kb.
    #15678
    1   2   3   4   5   6   7   8
    Note:If the wizard fails to launch, run Multi-Factor Authentication Server.

    Activate the Multi-Factor Authentication Server on DC1

    1. Still on DC1, switch back to Internet Explorer, and click Generate Activation Credentials

    1. Copy the email address to the Email field on the Activate page of the Multi-Factor Authentication Server management console

    2. Copy the password to the Password field on the Activate page of the Multi-Factor Authentication Server management console and then click Activate

    3. On the Join Group dialog box, click OK

    4. Click Yes to run the Multi-Factor Authentication wizard

    5. Click Next

    6. Deselect Certificates and click Next

    7. Accept the defaults and click Next

    8. Click Finish to reboot the server

    Establish MFA synchronization with Active Directory

    1. From the Microsoft Azure Management Portal, connect up to the DC1 VM, logging in as Corp\LabAdmin

    Note: If you receive a “Remote Desktop can’t connect to the remote computer …” message, the machine is probably still starting its services, try again in a couple of minutes.

    1. On DC1 VM, from the Start menu, run Multi-Factor Authentication Server

    2. Click Yes

    3. In the left navigation pane for the Multi-Factor Authentication Server management console, click Directory Integration

    4. Switch to the Synchronization tab

    5. Select Enable synchronization with Active Directory

    6. Select Remove users no longer in Active Directory

    7. Deselect Always perform a full synchronization

    8. Deselect Require administrator approval when disabled or removed users exceed threshold

    9. Click Add…

    10. Expand ., and click Corporate

    11. Click the Method Defaults tab

    12. Select Text message - this configures Azure MFA to challenge users via a two-way text message; compare this to the one-way text message experience offered by Azure Active Directory - integrated MFA

    13. Click Add, click OK and click Close

    14. Click Synchronize Now and click OK

    15. In the left navigation pane, click Users

    16. If you don’t see a list of users, press F5 until they appear

    17. Verify that the JohnF@. user does not have an alert next to his user name and shows your mobile phone number in the Phone field

    18. Select JohnF@. and click Test…

    19. In the Password field, type pass@word1 and click Test

    20. When you receive a text message from Microsoft, reply to the text with the six-digit verification code to complete authentication

    21. When authentication completes, click OK and click Close

    Install the AD FS adapter for the Multi-Factor Authentication Server on DC1 and configure settings

    1. In the left navigation pane for the Multi-Factor Authentication Server management console, click AD FS

    1. Select Allow user enrolment

    2. Select Allow users to select method, and select the Phone call and Text message checkboxes

    3. Select Use security questions for fallback and type 2 in the associated field

    4. Verify that Enable logging is selected

    5. Click Install AD FS Adapter…

    6. Complete the installation

    Register the Multi-Factor Authentication Adapter with AD FS

    1. Run Windows PowerShell, as an administrator

    1. In Windows PowerShell, enter the following commands:


    Download 78,77 Kb.
    1   2   3   4   5   6   7   8




    Download 78,77 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Note: If the wizard fails to launch, run Multi-Factor Authentication Server

    Download 78,77 Kb.