Skip to content

Commit

Permalink
Add deprecation note.
Browse files Browse the repository at this point in the history
  • Loading branch information
TimShererWithAquent committed Mar 20, 2024
1 parent 9bd7a77 commit c4f5dc8
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: "Microsoft Entra authentication methods API overview"
description: "Authentication methods are how users authenticate in Azure AD."
ms.localizationpriority: medium
ms.custom: has-azure-ad-ps-ref
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
author: "jpettere"
ms.reviewer: intelligentaccesspm
ms.subservice: "entra-sign-in"
Expand Down Expand Up @@ -50,6 +50,8 @@ The following authentication methods are not yet supported in Microsoft Graph v1
|Hardware token | Allow users to perform multifactor authentication using a physical device that provides a one-time code. | Get a hardware token assigned to a user.|
|Security questions and answers | Allow users to validate their identity when performing a self-service password reset. |Delete a security question a user registered.|

[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]

## Require re-register multifactor authentication

To require users to set up a new multifactor authentication the next time they sign in, call the individual DELETE authentication method operations to delete each of the user's current authentication methods. After the user has no more methods, they're prompted to register the next time they sign in where strong authentication is required.
Expand Down
4 changes: 3 additions & 1 deletion concepts/auth-cloudsolutionprovider.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: "This article describes how to enable application access to partner
author: koravvams
ms.localizationpriority: high
ms.subservice: "partner-customer-administration"
ms.custom: graphiamtop20, has-azure-ad-ps-ref
ms.custom: graphiamtop20, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
---

# Call Microsoft Graph from a Cloud Solution Provider application
Expand Down Expand Up @@ -40,6 +40,8 @@ The initial steps required here follow most of the same steps used to register a

Finally grant your partner-managed app those configured permissions for all your customers. You can do this by adding the **servicePrincipal** that represents the app to the *Adminagents* group in your Partner tenant, using [Azure AD PowerShell V2](https://www.powershellgallery.com/packages/AzureAD) or [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation). Follow these steps to find the *Adminagents* group, the **servicePrincipal** and add it to the group.

[!INCLUDE [Azure AD PowerShell deprecation note](~/../api-reference/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]

# [Azure AD PowerShell](#tab/azuread)

1. Open a PowerShell session and connect to your partner tenant by entering your admin credentials into the sign-in window.
Expand Down

0 comments on commit c4f5dc8

Please sign in to comment.