added fixes
This commit is contained in:
Родитель
57691f029f
Коммит
14b44e7cf8
|
@ -13,7 +13,7 @@ date: 2019-03-25 17:00:00
|
|||
|
||||
#### Multi-Factor Authentication on Azure in a Nutshell
|
||||
|
||||
In another Tips and Tricks post, we added Azure Active Directory authentication to an existing App Service Web App. Today, we’ll make sure Multi-Factor Authentication (MFA) is on for that user. There are various services in Azure when it comes to [Multi-Factor Authentication](https://azure.microsoft.com/en-us/services/multi-factor-authentication?WT.mc_id=azure-azuredevtips-micrum)), so let’s first see what’s available. Keep in mind, I want it to be FREE.
|
||||
In another Tips and Tricks post, we added Azure Active Directory authentication to an existing App Service Web App. Today, we’ll make sure Multi-Factor Authentication (MFA) is on for that user. There are various services in Azure when it comes to [Multi-Factor Authentication](https://azure.microsoft.com/services/multi-factor-authentication?WT.mc_id=azure-azuredevtips-micrum), so let’s first see what’s available. Keep in mind, I want it to be FREE.
|
||||
|
||||
If you take a look at the documentation on how it works, the following MFA offerings are listed:
|
||||
* **Azure Active Directory Premium** – Licenses for full-featured, on-premises, or cloud-hosted MFA services.
|
||||
|
@ -27,9 +27,9 @@ pay-as-you-go Azure account.
|
|||
|
||||
So why didn’t I use Azure Active Directory Premium, MFA for Office 365, or MFA for Azure Active Directory Global Administrators?
|
||||
|
||||
First, I didn’t want to pay for Azure Active Directory Premium. Also, I didn’t use MFA for Office 365 because it is for accounts connected to an Office 365 account, which I didn’t have. Finally, Azure Active Directory Global Administrators MFA is a [two-step verification for Azure Active Directory users](https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates?WT.mc_id=docs-azuredevtips-micrum) and not a Microsoft account. There are ways to turn [two-step verification on for Microsoft accounts](https://support.microsoft.com/en-us/help/12408/microsoft-account-about-two-step-verification?WT.mc_id=support-azuredevtips-micrum) that are done outside of Azure, which I didn’t want to do.
|
||||
First, I didn’t want to pay for Azure Active Directory Premium. Also, I didn’t use MFA for Office 365 because it is for accounts connected to an Office 365 account, which I didn’t have. Finally, Azure Active Directory Global Administrators MFA is a [two-step verification for Azure Active Directory users](https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-userstates?WT.mc_id=docs-azuredevtips-micrum) and not a Microsoft account. There are ways to turn [two-step verification on for Microsoft accounts](https://support.microsoft.com/help/12408/microsoft-account-about-two-step-verification?WT.mc_id=support-azuredevtips-micrum) that are done outside of Azure, which I didn’t want to do.
|
||||
|
||||
While researching why I couldn’t enable MFA for my Microsoft account user, I found a newer feature that also provides MFA called Baseline Protection. The nice thing about using [Baseline Protection](https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/baseline-protection?WT.mc_id=docs-azuredevtips-micrum) is it works well for Microsoft accounts and Azure Active Directory accounts.
|
||||
While researching why I couldn’t enable MFA for my Microsoft account user, I found a newer feature that also provides MFA called Baseline Protection. The nice thing about using [Baseline Protection](https://docs.microsoft.com/azure/active-directory/conditional-access/baseline-protection?WT.mc_id=docs-azuredevtips-micrum) is it works well for Microsoft accounts and Azure Active Directory accounts.
|
||||
|
||||
#### How I turned on Multi-Factor Authentication using Baseline Policy
|
||||
Go to the Azure portal and navigate to **Azure Active Directory**, and then click **Conditional access** under **Security**. Since I’m using my own pay-as-you-go subscription, this is the default directory.
|
||||
|
|
|
@ -13,7 +13,7 @@ date: 2017-09-21 17:00:00
|
|||
:::
|
||||
|
||||
#### Working with Files in Azure App Service
|
||||
In the [last post](https://microsoft.github.io/AzureTipsAndTricks/blog/tip19.html?WT.mc_id=github-azuredevtips-micrum), we created a web app and uploaded it to Azure App Service. In this post, we'll take a look at the files uploaded and three tools that I use to work with them
|
||||
In the [Tip 19 - Deploy an Azure Web App using only the CLI](tip19.html), we created a web app and uploaded it to Azure App Service. In this post, we'll take a look at the files uploaded and three tools that I use to work with them
|
||||
|
||||
##### Console Access to my App Service
|
||||
I can go to the Azure Portal and select my App Service and click on **Console** under **Development Tools** to have a command prompt to quickly work with my Azure App Service.
|
||||
|
|
Загрузка…
Ссылка в новой задаче