![]() Step 4– After you successfully connected to your Tenant, run the below command. ![]() The outcome of the above command will give you the following results. Click Next after you enter the User name and Password. The user name you are entering here must have either Global or Security administrator privileges. Step 3– After you execute the above command, you will see a screen to enter your login user name for this tenant. In your case, make sure to mentioned your Azure Tenant name followed by. Step 2– Connect your tenant using the below command.Ĭonnect-AzureAD -TenantId ![]() Step-1 Open the PowerShell with Admin Rights and type the below command. Please refer the below for more information about the Azure Active Directory V2 Preview PowerShell Module.īased on the above link, following indicates the most recent versions available for AADV2. Since this feature is still in preview mode, we have to use PowerShell to enable it.Īs the prerequisites, we have to install the latest version of Azure Active Directory V2 Preview PowerShell Module. I am going to show you how to enable this in my test tenant. Finally, they have to provide their PIN or biometric to initiate the authentication process. The user must match the number as the first step and click Approve tab. Therefore, the Microsoft Authenticator application uses key-based authentication to enable users credentials which bind to their respective devices and allow them to use a biometric or a PIN number.Īfter entering a username, a person who has enabled phone sign-in, in the Microsoft Authenticator app will see a message telling the user to click a number which show in the Authenticator app. This is because with this option, we can have more security and password less environment. This is one of the most excited feature which I have ever seen so far.
0 Comments
Leave a Reply. |