(2018-04-20) Azure AD MFA Server v8.0.0.3 Has Been Released
Posted by Jorge on 2018-04-20
Azure Multi-Factor Authentication Server provides a way to secure resources with MFA capabilities
–
Download "Azure Multi-Factor Authentication Server"
–
Azure Multi-Factor Authentication Server
8.0.0.3
Released: 4/9/2018
–
Microsoft has released a newer version of the Azure AD MFA server. If you start the MFA Server Console you should see a notification about a newer version being available.
–
Version 8.0.0.3 of the Azure Multi-Factor Authentication Server adds the following additional functionality:
- Registration experience improvements on mobile
- Improved interaction with AD Sync
- Support for TLS 1.2 for LDAP, User Portal to Web Service SDK, and SChannel replication
- Compliance with General Data Protection Regulation
- Accessibility improvements to User Portal, MFA Server management, and installation
- Fixed issue with fallback to security questions
- Fixed issue with security questions appearing multiple times
- Miscellaneous bug fixes and improvements
- NOT MENTIONED IN RELEASE NOTES: It now DOES install on Server Core!
–
Known Issues:
- Windows Authentication for Terminal Services is not supported for Windows Server 2012 R2
–
Upgrade Considerations:
- Must upgrade MFA Server and Web Service SDK before upgrading User Portal And AD FS adapter
- All other features and components are backwards-compatible with all previous versions
- Installation of the mobile app web service is not necessary for v8.0 or higher. Complete only the steps under Configure the mobile app. After the upgrade you may want to uninstall the previous mobile app web service, remove the virtual directory and application pool from IIS. If you have published the mobile app web service, then that is not required anymore
–
More information about Azure AD MFA Server can be found here.
–
Upgrade steps can be found here, but also take the following info into account
–
For this version of the MFA server:
- you need to have MS-KB2919355 installed on the MFA server before starting the installation (check with Get-HotFix KB2919355)
- you need to have the following installed on any server with any MFA server component: The Visual C++ 2017 Redistribution packages (a.k.a. Visual C++ "14" Runtime Libraries) are also available from here
- you need to have the at least following version installed on any server with any MFA server component: .NET Framework 4.6.2 is available from here.
–
Before upgrading/installing the new ADFS adapter, you need to unselect and unregister the previous ADFS adapter
- Using WID?: Execute the commands below on primary ADFS server and wait at least 5 minutes to allow WID replication to take place and finish
- Using SQL?: Execute the commands below on any ADFS server
# Unselecting The Use Of Azure AD MFA Adapter To Be Listed
$listOfCurrentMFAProviders = (Get-AdfsGlobalAuthenticationPolicy).AdditionalAuthenticationProvider
$listOfNewMFAProviders = $listOfCurrentMFAProviders
$listOfNewMFAProviders.Remove("WindowsAzureMultiFactorAuthentication") # Use THIS line if the old version is v6.3.0 or lower
$listOfNewMFAProviders.Remove("AzureMfaServerAuthentication") # Use THIS line if the old version is v7.0.0.9 or higher
Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider $listOfNewMFAProviders# Unregistering The Azure AD MFA Adapter Within ADFS
Unregister-AdfsAuthenticationProvider -Name WindowsAzureMultiFactorAuthentication # Use THIS line if the old version is v6.3.0 or lower
Unregister-AdfsAuthenticationProvider -Name AzureMfaServerAuthentication # Use THIS line if the old version is v7.0.0.9 or higher
–
After installing the new ADFS adapter, you need to configure it, register it and configure it within ADFS
- Using WID?: EDIT The file “MultiFactorAuthenticationAdfsAdapter.config” on the primary ADFS server as explained below (use your previous settings where applicable), and SAVE it afterwards
- Using SQL?: EDIT The file “MultiFactorAuthenticationAdfsAdapter.config” on any ADFS server as explained below (use your previous settings where applicable), and SAVE it afterwards
FILE: MultiFactorAuthenticationAdfsAdapter.config
<ConfigurationData xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<UseWebServiceSdk><true OR false></UseWebServiceSdk>
<WebServiceSdkUrl><URL to the MFA Web Service SDK></WebServiceSdkUrl>
<WebServiceSdkUsername><the account (DOMAIN\SAMACCOUNTNAME) the user portal is also using in its web.config></WebServiceSdkUsername>
<WebServiceSdkPassword><the password of the account above the user portal is also using in its web.config></WebServiceSdkPassword>
<WebServiceSdkCertificateThumbprint><thumbprint of certificate of web service sdk></WebServiceSdkCertificateThumbprint>
<AutomaticallyTriggerUserDefaultMethod><true OR false></AutomaticallyTriggerUserDefaultMethod>
<TestMode><true OR false></TestMode>
</ConfigurationData>
–
Now we need to register and configure the new ADFS adapter within ADFS
# Registering The Azure AD MFA Adapter Within ADFS
$typeName = "pfadfs.AuthenticationAdapter, MultiFactorAuthAdfsAdapter, Version=8.0.0.3, Culture=neutral, PublicKeyToken=f300afd708cefcd3"
Register-AdfsAuthenticationProvider -TypeName $typeName -Name AzureMfaServerAuthentication –ConfigurationFilePath "<Provide Path To MultiFactorAuthenticationAdfsAdapter.config>"# Selecting The Use Of Azure AD MFA Adapter To Be Listed
$listOfCurrentMFAProviders = (Get-AdfsGlobalAuthenticationPolicy).AdditionalAuthenticationProvider
$listOfNewMFAProviders = $listOfCurrentMFAProviders + "AzureMfaServerAuthentication"
Set-AdfsGlobalAuthenticationPolicy -AdditionalAuthenticationProvider $listOfNewMFAProviders# Configuring Custom Display Name And Custom Description
Set-AdfsAuthenticationProviderWebContent -Name "AzureMfaServerAuthentication" -DisplayName "<Provide Custom DisplayName>" -Description "<Provide Custom Description>"
–
I upgraded from the previous version without any issues!
–
Cheers,
Jorge
————————————————————————————————————————————————————-
This posting is provided "AS IS" with no warranties and confers no rights!
Always evaluate/test everything yourself first before using/implementing this in production!
This is today’s opinion/technology, it might be different tomorrow and will definitely be different in 10 years!
DISCLAIMER: https://jorgequestforknowledge.wordpress.com/disclaimer/
————————————————————————————————————————————————————-
########################### Jorge’s Quest For Knowledge ##########################
#################### http://JorgeQuestForKnowledge.wordpress.com/ ###################
————————————————————————————————————————————————————-
This entry was posted on 2018-04-20 at 19:00 and is filed under Active Directory Federation Services (ADFS), Azure AD MFA Adapter, Multi-Factor AuthN, Windows Azure Active Directory. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
5 Responses to “(2018-04-20) Azure AD MFA Server v8.0.0.3 Has Been Released”
Leave a Reply Cancel reply
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Jeffery Birks said
Windows Azure officially supports DeepNet SafeID hardware tokens which are OATH compliant. You might want to check it out:
http://www.deepnetsecurity.com/authenticators/one-time-password/safeid/
http://wiki.deepnetsecurity.com/display/KB/How+to+Import+SafeID+Token+into+Azure+MFA+Server
LikeLike
Jorge said
Hi,
Very nice indeed. I would want to try that our of course. How would I be able to try that out? Are you able to help me with the required hardware?
regards,
jorge
LikeLike
Jeffery Birks said
Just send us an email to sales@deepnetsecurity.com and we will help you through the process.
LikeLike
Jeffery Birks said
We have extensive instructions on the wiki site (link above), and will be putting more azure and office 365 related details on our main website on a dedicated web page that we created;
http://www.deepnetsecurity.com/authenticators/one-time-password/safeid/hardware-mfa-tokens-office-365-azure-multi-factor-authentication/
LikeLike
Jeffery Birks said
We put up a new page here that should help …
http://www.deepnetsecurity.com/authenticators/one-time-password/safeid/hardware-mfa-tokens-office-365-azure-multi-factor-authentication/
Alternatively, just contact our sales or support team.
LikeLike