{"id":14749,"date":"2020-08-01T07:17:27","date_gmt":"2020-08-01T07:17:27","guid":{"rendered":"https:\/\/www.testpreptraining.com\/tutorial\/?page_id=14749"},"modified":"2022-03-23T10:08:13","modified_gmt":"2022-03-23T10:08:13","slug":"learn-to-configure-azure-multi-factor-authentication-settings","status":"publish","type":"page","link":"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/","title":{"rendered":"Learn to Configure Azure Multi-Factor Authentication settings"},"content":{"rendered":"\n<p>This tutorial will help you to learn To customize the end-user experience for Azure Multi-Factor Authentication, you can configure options for settings like the account lockout thresholds or fraud alerts and notifications. Some options are in the Azure Active Directory (Azure AD) portal, while others are in the Azure Multi-Factor Authentication portal.<\/p>\n\n\n\n<p>The following Azure Multi-Factor Authentication settings are available in the Azure portal:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"957\" height=\"475\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-settings-portal.png\" alt=\"Learn to Configure Azure Multi-Factor Authentication settings\" class=\"wp-image-14752\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-settings-portal.png 957w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-settings-portal-750x372.png 750w\" sizes=\"auto, (max-width: 957px) 100vw, 957px\" \/><figcaption>Image source &#8211; Microsoft<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"account-lockout\"><strong>Account lockout<\/strong><\/h3>\n\n\n\n<p>The account lockout settings enable you to select how many unsuccessful MFA attempts to allow before the account is locked out for a period of time to avoid repeated MFA attempts as part of an attack. When a pin code is supplied for the MFA prompt, the account lockout settings are implemented.<\/p>\n\n\n\n<p>The following settings are available:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Number of MFA denials to trigger account lockout<\/li><li>Minutes until account lockout counter is reset<\/li><li>Minutes until account is automatically unblocked<\/li><\/ul>\n\n\n\n<p>To configure account lockout settings, complete the following settings:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Sign in to the&nbsp;Azure portal&nbsp;as an administrator.<\/li><li>Browse to&nbsp;<strong>Azure Active Directory<\/strong>&nbsp;&gt;&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>MFA<\/strong>&nbsp;&gt;&nbsp;<strong>Account lockout<\/strong>.<\/li><li>Enter the require values for your environment, then select&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"752\" height=\"432\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/account-lockout-settings.png\" alt=\"\" class=\"wp-image-14754\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/account-lockout-settings.png 752w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/account-lockout-settings-696x400.png 696w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><figcaption>Image Source &#8211; Microsoft<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"block-a-user\"><strong>Block a user<\/strong><\/h3>\n\n\n\n<p>To block a user, complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Browse to&nbsp;<strong>Azure Active Directory<\/strong>&nbsp;&gt;&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>MFA<\/strong>&nbsp;&gt;&nbsp;<strong>Block\/unblock users<\/strong>.<\/li><li>Select&nbsp;<strong>Add<\/strong>&nbsp;to block a user.<\/li><li>Select the&nbsp;<strong>Replication Group<\/strong>, then choose&nbsp;<em>Azure Default<\/em>.Enter the username for the blocked user as&nbsp;<code>username\\@domain.com<\/code>, then provide a comment in the&nbsp;<em>Reason<\/em>&nbsp;field.<\/li><li>When ready, select&nbsp;<strong>OK<\/strong>&nbsp;to block the user.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"unblock-a-user\"><strong>Unblock a user<\/strong><\/h3>\n\n\n\n<p>To unblock a user, complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Browse to&nbsp;<strong>Azure Active Directory<\/strong>&nbsp;&gt;&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>MFA<\/strong>&nbsp;&gt;&nbsp;<strong>Block\/unblock users<\/strong>.<\/li><li>In the&nbsp;<em>Action<\/em>&nbsp;column next to the desired user, select&nbsp;<strong>Unblock<\/strong>.<\/li><li>Enter a comment in the&nbsp;<em>Reason for unblocking<\/em>&nbsp;field.<\/li><li>When ready, select&nbsp;<strong>OK<\/strong>&nbsp;to unblock the user.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"fraud-alert\"><strong>Fraud alert<\/strong><\/h3>\n\n\n\n<p>The fraud alert tool allows users to report unauthorized access to their accounts. Users can report a fraud attempt via the Microsoft Authenticator app or their phone when they receive an unfamiliar and suspicious MFA prompt.<\/p>\n\n\n\n<p>To enable and configure fraud alerts, complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Browse to&nbsp;<strong>Azure Active Directory<\/strong>&nbsp;&gt;&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>MFA<\/strong>&nbsp;&gt;&nbsp;<strong>Fraud alert<\/strong>.<\/li><li>Set the&nbsp;<em>Allow users to submit fraud alerts<\/em>&nbsp;setting to&nbsp;<strong>On<\/strong>.<\/li><li>Configure the&nbsp;<em>Automatically block users who report fraud<\/em>&nbsp;or&nbsp;<em>Code to report fraud during initial greeting<\/em>&nbsp;setting as desired.<\/li><li>When ready, select&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"view-fraud-reports\"><strong>View fraud reports<\/strong><\/h3>\n\n\n\n<p>Select\u00a0<strong>Azure Active Directory<\/strong>\u00a0>\u00a0<strong>Sign-ins<\/strong>\u00a0>\u00a0<strong>Authentication Details<\/strong>. The fraud report is now part of the normal Azure AD Sign-ins report, and it will appear as MFA rejected, Fraud Code Entered in the &#8220;Result Detail.&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"notifications\"><strong>Notifications<\/strong><\/h3>\n\n\n\n<p>o configure fraud alert notifications, complete the following settings:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Browse to&nbsp;<strong>Azure Active Directory<\/strong>&nbsp;&gt;&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>Multi-Factor Authentication<\/strong>&nbsp;&gt;&nbsp;<strong>Notifications<\/strong>.<\/li><li>Enter the email address to add into the next box.<\/li><li>To remove an existing email address, select the&nbsp;<strong>&#8230;<\/strong>&nbsp;option next to the desired email address, then select&nbsp;<strong>Delete<\/strong>.<\/li><li>When ready, select&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"oath-tokens\"><strong>OATH tokens<\/strong><\/h3>\n\n\n\n<p>OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds are supported by Azure AD. Customers can buy these tokens from whatever seller they like.<\/p>\n\n\n\n<p>OATH TOTP hardware tokens usually include a secret key, or seed, that is pre-programmed in the token. These keys must be entered into Azure AD as outlined in the steps below. Secret keys are restricted to 128 characters, therefore not all tokens will work with them. The secret key must be encoded in Base32 and can only contain the letters a-z or A-Z and numerals 1-7.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"phone-call-settings\"><strong>Phone call settings<\/strong><\/h3>\n\n\n\n<p>You may customise the user&#8217;s experience if they receive phone calls for MFA prompts, such as the caller ID or voice greeting they hear.<\/p>\n\n\n\n<p>To configure your own caller ID number, complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Browse to&nbsp;<strong>Azure Active Directory<\/strong>&nbsp;&gt;&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>MFA<\/strong>&nbsp;&gt;&nbsp;<strong>Phone call settings<\/strong>.<\/li><li>Set the&nbsp;<strong>MFA caller ID number<\/strong>&nbsp;to the number you wish users to see on their phone. Only US-based numbers are allowed.<\/li><li>When ready, select&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"set-up-a-custom-message\"><strong>Set up a custom message<\/strong><\/h3>\n\n\n\n<p>To use your own custom messages, complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Browse to&nbsp;<strong>Azure Active Directory<\/strong>&nbsp;&gt;&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>MFA<\/strong>&nbsp;&gt;&nbsp;<strong>Phone call settings<\/strong>.<\/li><li>Select&nbsp;<strong>Add greeting<\/strong>.<\/li><li>Choose the&nbsp;<strong>Type<\/strong>&nbsp;of greeting, such as&nbsp;<em>Greeting (standard)<\/em>&nbsp;or&nbsp;<em>Authentication successful<\/em>.<\/li><li>Select the&nbsp;<strong>Language<\/strong>, based on the previous section on&nbsp;custom message language behavior.<\/li><li>Browse for and select an&nbsp;<em>.mp3<\/em>&nbsp;or&nbsp;<em>.wav<\/em>&nbsp;sound file to upload.<\/li><li>When ready, select&nbsp;<strong>Add<\/strong>, then&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mfa-service-settings\"><strong>MFA service settings<\/strong><\/h3>\n\n\n\n<p>In the Azure Multi-Factor Authentication service settings, you may configure app passwords, trusted IPs, verification choices, and remember multi-factor authentication. This is a legacy portal that isn&#8217;t part of the Azure Active Directory site.<\/p>\n\n\n\n<p>Service settings can be accessed from the Azure portal by browsing to&nbsp;<strong>Azure Active Directory<\/strong>&nbsp;&gt;&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>MFA<\/strong>&nbsp;&gt;&nbsp;<strong>Getting started<\/strong>&nbsp;&gt;&nbsp;<strong>Configure<\/strong>&nbsp;&gt;&nbsp;<strong>Additional cloud-based MFA settings<\/strong>. A new window or tab opens with additional&nbsp;<em>service settings<\/em>&nbsp;options.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"trusted-ips\"><strong>Trusted IPs<\/strong><\/h3>\n\n\n\n<p>For users that login in from a certain IP address range, Azure Multi-Factor Authentication&#8217;s Trusted IPs functionality skips multi-factor authentication prompts. You may establish trusted IP ranges for your on-premises installations so that no Azure Multi-Factor Authentication prompt appears when users are in one of those locations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"enable-named-locations-by-using-conditional-access\"><strong>Enable named locations by using Conditional Access<\/strong><\/h3>\n\n\n\n<p>You can use Conditional Access rules to define named locations using the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the Azure portal, search for and select&nbsp;<strong>Azure Active Directory<\/strong>, then browse to&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>Conditional Access<\/strong>&nbsp;&gt;&nbsp;<strong>Named locations<\/strong>.<\/li><li>Select&nbsp;<strong>New location<\/strong>.<\/li><li>Enter a name for the location.<\/li><li>Select&nbsp;<strong>Mark as trusted location<\/strong>.<\/li><li>Enter the IP Range in CIDR notation for your environment, such as&nbsp;<em>40.77.182.32\/27<\/em>.<\/li><li>Select&nbsp;<strong>Create<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"enable-the-trusted-ips-feature-by-using-conditional-access\"><strong>Enable the Trusted IPs feature by using Conditional Access<\/strong><\/h3>\n\n\n\n<p>To enable trusted IPs using Conditional Access policies, complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the Azure portal, search for and select&nbsp;<strong>Azure Active Directory<\/strong>, then browse to&nbsp;<strong>Security<\/strong>&nbsp;&gt;&nbsp;<strong>Conditional Access<\/strong>&nbsp;&gt;&nbsp;<strong>Named locations<\/strong>.<\/li><li>Select&nbsp;<strong>Configure MFA trusted IPs<\/strong>.<\/li><li>On the&nbsp;<strong>Service Settings<\/strong>&nbsp;page, under&nbsp;<strong>Trusted IPs<\/strong>, choose from any of the following two options:<ul><li><strong>For requests from federated users originating from my intranet<\/strong>: To choose this option, select the check box. All federated users who sign in from the corporate network bypass two-step verification by using a claim that is issued by AD FS. Ensure that AD FS has a rule to add the intranet claim to the appropriate traffic. If the rule does not exist, create the following rule in AD FS:<code>c:[Type== \"http:\/\/schemas.microsoft.com\/ws\/2012\/01\/insidecorporatenetwork\"] =&gt; issue(claim = c);<\/code><\/li><li><strong>For requests from a specific range of public IPs<\/strong>: To choose this option, enter the IP addresses in the text box by using CIDR notation.<ul><li>Also, For IP addresses that are in the range xxx.xxx.xxx.1 through xxx.xxx.xxx.254, use notation like&nbsp;<strong>xxx.xxx.xxx.0\/24<\/strong>.<\/li><li>Furthermore, For a single IP address, use notation like&nbsp;<strong>xxx.xxx.xxx.xxx\/32<\/strong>.<\/li><li>Enter up to 50 IP address ranges. Users who sign in from these IP addresses bypass two-step verification.<\/li><\/ul><\/li><\/ul><\/li><li>Select&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"enable-the-trusted-ips-feature-by-using-service-settings\"><strong>Enable the Trusted IPs feature by using service settings<\/strong><\/h3>\n\n\n\n<p>If you don&#8217;t want to use Conditional Access policies to enable trusted IPs, you can configure the&nbsp;<em>service settings<\/em>&nbsp;for Azure Multi-Factor Authentication using the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the Azure portal, search for and select&nbsp;<strong>Azure Active Directory<\/strong>, then choose&nbsp;<strong>Users<\/strong>.<\/li><li>Select&nbsp;<strong>Multi-Factor Authentication<\/strong>.<\/li><li>Under Multi-Factor Authentication, select&nbsp;<strong>service settings<\/strong>.<\/li><li>On the&nbsp;<strong>Service Settings<\/strong>&nbsp;page, under&nbsp;<strong>Trusted IPs<\/strong>, choose one (or both) of the following two options:<ul><li><strong>For requests from federated users on my intranet<\/strong><\/li><li><strong>For requests from a specified range of IP address subnets<\/strong><\/li><\/ul><\/li><li>Select&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"enable-and-disable-verification-methods\"><strong>Enable and disable verification methods<\/strong><\/h3>\n\n\n\n<p>To enable or disable verification methods, complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the Azure portal, search for and select&nbsp;<strong>Azure Active Directory<\/strong>, then choose&nbsp;<strong>Users<\/strong>.<\/li><li>Select&nbsp;<strong>Multi-Factor Authentication<\/strong>.<\/li><li>Under Multi-Factor Authentication, select&nbsp;<strong>service settings<\/strong>.<\/li><li>On the&nbsp;<strong>Service Settings<\/strong>&nbsp;page, under&nbsp;<strong>verification options<\/strong>, select\/unselect the methods to provide to your users.<\/li><li>Click&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"enable-remember-multi-factor-authentication\"><strong>Enable remember Multi-Factor Authentication<\/strong><\/h3>\n\n\n\n<p>To enable and configure the option for users to remember their MFA status and bypass prompts, complete the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the Azure portal, search for and select&nbsp;<strong>Azure Active Directory<\/strong>, then choose&nbsp;<strong>Users<\/strong>.<\/li><li>Select&nbsp;<strong>Multi-Factor Authentication<\/strong>.<\/li><li>Under Multi-Factor Authentication, select&nbsp;<strong>service settings<\/strong>.<\/li><li>On the&nbsp;<strong>Service Settings<\/strong>&nbsp;page,&nbsp;<strong>manage remember multi-factor authentication<\/strong>, select the&nbsp;<strong>Allow users to remember multi-factor authentication on devices they trust<\/strong>&nbsp;option.<\/li><li>Set the number of days to allow trusted devices to bypass two-step verification. The default is 14 days.<\/li><li>Select&nbsp;<strong>Save<\/strong>.<\/li><\/ol>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.testpreptraining.ai\/microsoft-azure-architect-technologies-az-303-free-practice-test\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"150\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Untitled-design-5.png\" alt=\"free practice test for AZ- 303\" class=\"wp-image-13928\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Untitled-design-5.png 960w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/07\/Untitled-design-5-750x117.png 750w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><\/figure><\/div>\n\n\n\n<p><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/exam-az-303-microsoft-azure-architect-technologies\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Go back to home page <\/strong><\/a><\/p>\n\n\n\n<p class=\"has-text-align-right\"><strong>Reference documentation &#8211;<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/howto-mfa-mfasettings#phone-call-settings\" target=\"_blank\" rel=\"noreferrer noopener\"> Configure Azure Multi-Factor Authentication settings<\/a> <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This tutorial will help you to learn To customize the end-user experience for Azure Multi-Factor Authentication, you can configure options for settings like the account lockout thresholds or fraud alerts and notifications. Some options are in the Azure Active Directory (Azure AD) portal, while others are in the Azure Multi-Factor Authentication portal. The following Azure&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-14749","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Learn to Configure Azure Multi-Factor Authentication settings<\/title>\n<meta name=\"description\" content=\"Enhance and upgrade your Azure Architect skills by preparing from tutorial - Learn to Configure Azure Multi-Factor Authentication settings.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learn to Configure Azure Multi-Factor Authentication settings\" \/>\n<meta property=\"og:description\" content=\"Enhance and upgrade your Azure Architect skills by preparing from tutorial - Learn to Configure Azure Multi-Factor Authentication settings.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/\" \/>\n<meta property=\"og:site_name\" content=\"Testprep Training Tutorials\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-23T10:08:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-settings-portal.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/\",\"name\":\"Learn to Configure Azure Multi-Factor Authentication settings\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\"},\"datePublished\":\"2020-08-01T07:17:27+00:00\",\"dateModified\":\"2022-03-23T10:08:13+00:00\",\"description\":\"Enhance and upgrade your Azure Architect skills by preparing from tutorial - Learn to Configure Azure Multi-Factor Authentication settings.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn to Configure Azure Multi-Factor Authentication settings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"name\":\"Testprep Training Tutorials\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\",\"name\":\"Testprep Training\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"contentUrl\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"width\":583,\"height\":153,\"caption\":\"Testprep Training\"},\"image\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Learn to Configure Azure Multi-Factor Authentication settings","description":"Enhance and upgrade your Azure Architect skills by preparing from tutorial - Learn to Configure Azure Multi-Factor Authentication settings.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/","og_locale":"en_US","og_type":"article","og_title":"Learn to Configure Azure Multi-Factor Authentication settings","og_description":"Enhance and upgrade your Azure Architect skills by preparing from tutorial - Learn to Configure Azure Multi-Factor Authentication settings.","og_url":"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/","og_site_name":"Testprep Training Tutorials","article_modified_time":"2022-03-23T10:08:13+00:00","og_image":[{"url":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2020\/08\/multi-factor-authentication-settings-portal.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/","url":"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/","name":"Learn to Configure Azure Multi-Factor Authentication settings","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website"},"datePublished":"2020-08-01T07:17:27+00:00","dateModified":"2022-03-23T10:08:13+00:00","description":"Enhance and upgrade your Azure Architect skills by preparing from tutorial - Learn to Configure Azure Multi-Factor Authentication settings.","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/learn-to-configure-azure-multi-factor-authentication-settings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/tutorial\/"},{"@type":"ListItem","position":2,"name":"Learn to Configure Azure Multi-Factor Authentication settings"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","name":"Testprep Training Tutorials","description":"","publisher":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization","name":"Testprep Training","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/","url":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","contentUrl":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","width":583,"height":153,"caption":"Testprep Training"},"image":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/14749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/comments?post=14749"}],"version-history":[{"count":7,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/14749\/revisions"}],"predecessor-version":[{"id":53419,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/14749\/revisions\/53419"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media?parent=14749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/categories?post=14749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/tags?post=14749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}