一次性旁路 [英] One-Time Bypass

查看:96
本文介绍了一次性旁路的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

之前我见过这个帖子,但它已经很老了,所以我想再提出一个问题,因为我们已经创建了新模块并引入了新功能。

I've seen this thread before, but it's very old so I wanted to pose the question again since we've had new modules created and new functionality introduced.

Azure AD门户中的MFA一次性旁路功能,是否可以使用任何可用模块中的Powershell进行使用?

The MFA One-Time bypass functionality in the Azure AD portal, can it be utilized using Powershell from any of the available modules?

如果没有,是否有办法在不授予Azure AD中其他功能的权限的情况下授予此功能的权限?

If not, is there a way to grant permission to this feature while not granting permission to other functionality in Azure AD?

如果没有,从故障排除的角度看,这似乎非常有限。

If not, this seem extremely limited from a troubleshooting standpoint.

推荐答案

据我所知没有可用于一次性启用MFA的特定PowerShell cmdlet。 但是,您可以尝试创建自己的PowerShell脚本,因为使用Set-MsolUser
和-StrongAuthenticationRequirements参数可以启用或禁用用户状态的MFA。 请参阅
启用Azure MFA更改用户状态
。 您也可以将此作为反馈发布到 
https://feedback.azure.com/forums/169401-azure-active-directory
和t
他将允许社区赞成和让产品团队纳入他们的计划。
As far as I know there is no specific PowerShell cmdlet available to enable MFA one-time by pass.  However, you can try creating your own PowerShell script as enabling or disabling MFA by User State is available using the Set-MsolUser with -StrongAuthenticationRequirements parameters.  Please refer to Enable Azure MFA by changing user state.  You can also post this as a feedback to https://feedback.azure.com/forums/169401-azure-active-directory and this will allow the community to upvote and for the product team to include into their plans.


这篇关于一次性旁路的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆