Update "Session controls for Combined Registration" to reflect Auth s…#1949
Update "Session controls for Combined Registration" to reflect Auth s…#1949andrequeda wants to merge 1 commit intoMicrosoftDocs:mainfrom
Conversation
…trengths conflict Document conflict between Auth strengths and 10-minute session requirement for security info registration, as well as potential solutions for it
|
@andrequeda : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change. |
|
Learn Build status updates of commit b303e41: ✅ Validation status: passed
For more details, please refer to the build report. |
|
Can you review the proposed changes? IMPORTANT: When the changes are ready for publication, adding a #label:"aq-pr-triaged" |
There was a problem hiding this comment.
Pull request overview
Updates the combined registration documentation to describe a conflict between Conditional Access authentication strengths and recent/related session reauthentication requirements, and to outline mitigation options.
Changes:
- Reformats “Session controls for Combined Registration” into clearer bullets.
- Adds the 10-minute MFA reauthentication requirement (MC1135479) and explains how it can conflict with authentication strengths.
- Notes possible tenant-level and user-level mitigations.
|
|
||
| ### Session controls for Combined Registration | ||
| By default Combined registration enforces all MFA capable users to strongly authenticate prior to registering or managing their security info. If a user is currently signed in, and previously completed MFA as part of a valid session, no additional MFA is required by default, unless a user is attempting to add or modify a passkey (FIDO2) method. Adding or modifying a passkey (FIDO2) method requires users to have strongly authenticated within the past 5 minutes. If MFA hasn't been completed in the past 5 minutes, the user is asked to sign-in and complete fresh MFA. Organizations can modify the authentication requirements by defining [Conditional Access policies for securing security info registration.](~/identity/conditional-access/policy-all-users-security-info-registration.md). | ||
| By default, Combined registration enforces all MFA capable users to strongly authenticate prior to registering or managing their security info. |
There was a problem hiding this comment.
Use hyphenation for the compound modifier here: "MFA-capable users" (not "MFA capable users").
| By default, Combined registration enforces all MFA capable users to strongly authenticate prior to registering or managing their security info. | |
| By default, Combined registration enforces all MFA-capable users to strongly authenticate prior to registering or managing their security info. |
| By default Combined registration enforces all MFA capable users to strongly authenticate prior to registering or managing their security info. If a user is currently signed in, and previously completed MFA as part of a valid session, no additional MFA is required by default, unless a user is attempting to add or modify a passkey (FIDO2) method. Adding or modifying a passkey (FIDO2) method requires users to have strongly authenticated within the past 5 minutes. If MFA hasn't been completed in the past 5 minutes, the user is asked to sign-in and complete fresh MFA. Organizations can modify the authentication requirements by defining [Conditional Access policies for securing security info registration.](~/identity/conditional-access/policy-all-users-security-info-registration.md). | ||
| By default, Combined registration enforces all MFA capable users to strongly authenticate prior to registering or managing their security info. | ||
|
|
||
| - Adding or modifying a passkey (FIDO2) method requires users to have strongly authenticated within the past 5 minutes. If MFA hasn't been completed in the past 5 minutes, the user is asked to sign-in and complete fresh MFA. |
There was a problem hiding this comment.
"sign-in" is used as a verb here. Update to "sign in" (verb) to match Microsoft style and the rest of the article.
| - Adding or modifying a passkey (FIDO2) method requires users to have strongly authenticated within the past 5 minutes. If MFA hasn't been completed in the past 5 minutes, the user is asked to sign-in and complete fresh MFA. | |
| - Adding or modifying a passkey (FIDO2) method requires users to have strongly authenticated within the past 5 minutes. If MFA hasn't been completed in the past 5 minutes, the user is asked to sign in and complete fresh MFA. |
| By default, Combined registration enforces all MFA capable users to strongly authenticate prior to registering or managing their security info. | ||
|
|
||
| - Adding or modifying a passkey (FIDO2) method requires users to have strongly authenticated within the past 5 minutes. If MFA hasn't been completed in the past 5 minutes, the user is asked to sign-in and complete fresh MFA. | ||
| - Starting August 25, 2025, as announced in MC1135479, users are required to complete multi-factor authentication (MFA) when managing credentials or accessing My Sign Ins if they haven’t done so within the last 10 minutes of their current session. |
There was a problem hiding this comment.
This bullet mixes a few inconsistent terms/typography used elsewhere in the doc:
- Use "multifactor authentication" (no hyphen) for consistency.
- Use consistent product naming for "My Sign-ins" (the article uses "My Sign-ins" elsewhere).
- Replace the smart apostrophe in "haven’t" with a straight apostrophe for consistent Markdown text.
| - Starting August 25, 2025, as announced in MC1135479, users are required to complete multi-factor authentication (MFA) when managing credentials or accessing My Sign Ins if they haven’t done so within the last 10 minutes of their current session. | |
| - Starting August 25, 2025, as announced in MC1135479, users are required to complete multifactor authentication (MFA) when managing credentials or accessing My Sign-ins if they haven't done so within the last 10 minutes of their current session. |
| Enforcing Authentication Strengths to security info registration can conflict with both aforementioned requirements, with end-users potentially experiencing the error message *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*. Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength. | ||
|
|
There was a problem hiding this comment.
This paragraph has several consistency/clarity issues:
- In running text, use lowercase "authentication strengths" unless you’re referring to the UI label.
- "Enforcing … to security info registration" is ungrammatical; use "for" instead of "to".
- Consider splitting this into shorter sentences (or a short list) to improve readability, and avoid "end-users" in favor of "users" per Microsoft style.
- The final "Authentication Strength" reference should be consistent (likely "authentication strength").
| Enforcing Authentication Strengths to security info registration can conflict with both aforementioned requirements, with end-users potentially experiencing the error message *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*. Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength. | |
| Enforcing authentication strengths for security info registration can conflict with both of these requirements. Users might experience the error message *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*. | |
| You can make changes at either the tenant level or the user level: | |
| - At the tenant level, enforce **Sign-in frequency: Every time** for the **Register security info** user action, or enable passkeys for Windows Hello for Business users. | |
| - At the user level, ensure that users authenticate with a session that's no more than 10 minutes old, or ensure that they authenticate with a combination of methods included in the enforced authentication strength. |
| - Starting August 25, 2025, as announced in MC1135479, users are required to complete multi-factor authentication (MFA) when managing credentials or accessing My Sign Ins if they haven’t done so within the last 10 minutes of their current session. | ||
| Enforcing Authentication Strengths to security info registration can conflict with both aforementioned requirements, with end-users potentially experiencing the error message *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*. Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength. | ||
|
|
||
| Organizations can modify the authentication requirements by defining [Conditional Access policies for securing security info registration.](~/identity/conditional-access/policy-all-users-security-info-registration.md). |
There was a problem hiding this comment.
The period is currently included in the link text ("registration."). Move punctuation outside the hyperlink to follow Microsoft Learn link formatting conventions.
| Organizations can modify the authentication requirements by defining [Conditional Access policies for securing security info registration.](~/identity/conditional-access/policy-all-users-security-info-registration.md). | |
| Organizations can modify the authentication requirements by defining [Conditional Access policies for securing security info registration](~/identity/conditional-access/policy-all-users-security-info-registration.md). |
…trengths conflict
Document conflict between Auth strengths and 10-minute session requirement for security info registration, as well as potential solutions for it