gebeurtenis
29 apr, 14 - 30 apr, 19
Neem deel aan de ultieme virtuele Windows Server-gebeurtenis van 29-30 voor diepgaande technische sessies en live Q&A met Microsoft-technici.
Nu registrerenDeze browser wordt niet meer ondersteund.
Upgrade naar Microsoft Edge om te profiteren van de nieuwste functies, beveiligingsupdates en technische ondersteuning.
Organizations are experiencing attacks that attempt to brute force, compromise, or otherwise lock out user accounts by sending password based authentication requests. To help protect organizations from compromise, AD FS has introduced capabilities such as extranet “smart” lockout, and IP address based blocking.
However, these mitigations are reactive. To provide a proactive way, to reduce the severity of these attacks, AD FS has the ability to prompt for other factors prior to collecting the password.
For example, AD FS 2016 introduced Microsoft Entra multifactor authentication as primary authentication so that OTP codes from the Authenticator App could be used as the first factor. Beginning with AD FS 2019 you can configure external authentication providers as primary authentication factors.
There are two key scenarios this enables:
Protect password-based sign in from brute-force attacks and lockouts by prompting for an additional, external factor first. A password prompt is only seen when the external authentication is successfully completed. This eliminates a convenient way attackers have been trying to compromise or disable accounts.
This scenario consists of two components:
Eliminate passwords entirely but completing a strong, multifactor authentication using entirely non password based methods in AD FS
What primary authentication really means is that it's the method the user is prompted for first, prior to additional factors. Previously the only primary methods available in AD FS were built in methods for Active Directory or Microsoft Entra multifactor authentication, or other LDAP authentication stores. External methods could be configured as “additional” authentication, which takes place after primary authentication has successfully completed.
In AD FS 2019, the external authentication as primary capability means that any external authentication providers registered on the AD FS farm (using Register-AdfsAuthenticationProvider) become available for primary authentication and “additional” authentication. They can be enabled the same way as the built-in providers such as Forms Authentication and Certificate Authentication, for intranet and/or extranet use.
Once an external provider is enabled for extranet, intranet, or both, it becomes available for users to use. If more than one method is enabled, users see a choice page and be able to choose a primary method, just as they do for additional authentication.
Before configuring external authentication providers as primary, ensure you have the following prerequisites in place.
After you have verified the prerequisites, there are two ways to configure AD FS additional authentication providers as primary: PowerShell, or the AD FS Management console.
PS C:\> Set-AdfsGlobalAuthenticationPolicy -AllowAdditionalAuthenticationAsPrimary $true
The AD FS service must be restarted after enabling or disabling additional authentication as primary.
In the AD FS Management console, under Service -> Authentication Methods, under Primary Authentication Methods, select Edit
Select the checkbox for Allow additional authentication providers as primary.
The AD FS service must be restarted after enabling or disabling additional authentication as primary.
To complete the “protect the password” scenario, enable username and password as additional authentication using either PowerShell or the AD FS Management console. Examples are provided for both methods.
PS C:\> $providers = (Get-AdfsGlobalAuthenticationPolicy).AdditionalAuthenticationProvider
PS C:\>$providers = $providers + "FormsAuthentication"
PS C:\>Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider $providers
In the AD FS Management console, under Service -> Authentication Methods, under Additional Authentication Methods, select Edit
Select the checkbox for Forms Authentication to enable username and password as additional authentication.
gebeurtenis
29 apr, 14 - 30 apr, 19
Neem deel aan de ultieme virtuele Windows Server-gebeurtenis van 29-30 voor diepgaande technische sessies en live Q&A met Microsoft-technici.
Nu registrerenTraining
Module
Gebruikersverificatie beheren - Training
Er zijn meerdere opties voor verificatie in Azure AD. Meer informatie over het implementeren en beheren van de juiste verificaties voor gebruikers op basis van bedrijfsbehoeften.
Certificering
Microsoft Gecertificeerd: Identiteits- en Toegangsbeheerbeheerder Associate - Certifications
Demonstreer de functies van Microsoft Entra ID om identiteitsoplossingen te moderniseren, hybride oplossingen te implementeren en identiteitsbeheer te implementeren.