From fc8c369a2437f523dcb7514c48cfe3542d18773a Mon Sep 17 00:00:00 2001 From: ahaenggli Date: Fri, 21 Jul 2023 12:50:43 +0200 Subject: [PATCH] v2.0.1 --- configuration/bypass-mfa/index.html | 10 +++++----- configuration/settings/index.html | 4 ++-- installation/run-ldap-wrapper/index.html | 4 ++-- search/en.data.min.json | 2 +- sitemap.xml | 6 +++--- 5 files changed, 13 insertions(+), 13 deletions(-) diff --git a/configuration/bypass-mfa/index.html b/configuration/bypass-mfa/index.html index 31c1371..c820fee 100644 --- a/configuration/bypass-mfa/index.html +++ b/configuration/bypass-mfa/index.html @@ -49,7 +49,7 @@ @@ -69,7 +69,7 @@ "url" : "https://ahaenggli.github.io/AzureAD-LDAP-wrapper/configuration/bypass-mfa/", "headline": "Bypass MFA", "description": "Officially MFA is not supported by this LDAP-wrapper. The login for users with activated MFA simply fails, as mentioned here and here. There is no interactive window to enter another factor, and LDAP does not support this either. If you need to use this LDAP-wrapper despite of activated MFA, there are two options:\nDisable MFA for this application in AzureAD (preferred).\nThere are several ways to define MFA, but only some of them allows you to disable MFA.", - "wordCount" : "350", + "wordCount" : "359", "inLanguage": "en", "isFamilyFriendly": "true", "mainEntityOfPage": { @@ -80,7 +80,7 @@ "copyrightYear" : "0001", "dateCreated": "0001-01-01T00:00:00.00Z", "datePublished": "0001-01-01T00:00:00.00Z", - "dateModified": "2023-03-04T20:54:20.00Z", + "dateModified": "2023-07-21T12:16:16.00Z", "publisher":{ "@type":"Organization", "name": "AzureAD-LDAP-wrapper", @@ -1159,7 +1159,7 @@

Bypass MFA

Conditional Access can be used to require MFA for some or all the users. This is the most flexible way to activate MFA, but it is a premium feature. The settings allows to exclude certain apps. If a login fails due to this MFA method, the error code is AADSTS50079, too. As a simple workaround, the app used by the LDAP-wrapper can be excluded: +>Conditional Access can be used to require MFA for some or all the users. This is the most flexible way to activate MFA, but it is a premium feature. The settings allows to exclude certain apps. If a login fails due to this MFA method, the error codea are either AADSTS50158 (for external MFA like Duo) or also AADSTS50079. As a simple workaround, the app used by the LDAP-wrapper can be excluded: