一次性旁路 [英] One-Time Bypass
本文介绍了一次性旁路的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!
问题描述
之前我见过这个帖子,但它已经很老了,所以我想再提出一个问题,因为我们已经创建了新模块并引入了新功能。
I've seen this thread before, but it's very old so I wanted to pose the question again since we've had new modules created and new functionality introduced.
Azure AD门户中的MFA一次性旁路功能,是否可以使用任何可用模块中的Powershell进行使用?
The MFA One-Time bypass functionality in the Azure AD portal, can it be utilized using Powershell from any of the available modules?
如果没有,是否有办法在不授予Azure AD中其他功能的权限的情况下授予此功能的权限?
If not, is there a way to grant permission to this feature while not granting permission to other functionality in Azure AD?
如果没有,从故障排除的角度看,这似乎非常有限。
If not, this seem extremely limited from a troubleshooting standpoint.
推荐答案
据我所知没有可用于一次性启用MFA的特定PowerShell cmdlet。 但是,您可以尝试创建自己的PowerShell脚本,因为使用Set-MsolUser
和-StrongAuthenticationRequirements参数可以启用或禁用用户状态的MFA。 请参阅
启用Azure MFA更改用户状态。 您也可以将此作为反馈发布到 https://feedback.azure.com/forums/169401-azure-active-directory
和t 他将允许社区赞成和让产品团队纳入他们的计划。
As far as I know there is no specific PowerShell cmdlet available to enable MFA one-time by pass. However, you can try creating your own PowerShell script as enabling or disabling MFA by User State is available using the Set-MsolUser with -StrongAuthenticationRequirements parameters. Please refer to Enable Azure MFA by changing user state. You can also post this as a feedback to https://feedback.azure.com/forums/169401-azure-active-directory and this will allow the community to upvote and for the product team to include into their plans.
这篇关于一次性旁路的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!
查看全文