From ff5b255a52866bab04bf0b68ab45afc2ed19ef2d Mon Sep 17 00:00:00 2001 From: TimShererWithAquent <28902327+TimShererWithAquent@users.noreply.github.com> Date: Fri, 21 Mar 2025 14:06:45 -0700 Subject: [PATCH 1/2] 368370 PowerShell rebrand --- .../adfs/New-AdfsAzureMfaTenantCertificate.md | 7 ++----- docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md | 4 ++-- .../adfs/New-AdfsAzureMfaTenantCertificate.md | 7 ++----- docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md | 4 ++-- .../adfs/New-AdfsAzureMfaTenantCertificate.md | 7 ++----- docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md | 4 ++-- .../adfs/New-AdfsAzureMfaTenantCertificate.md | 7 ++----- docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md | 4 ++-- 8 files changed, 16 insertions(+), 28 deletions(-) diff --git a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index c2dc606fbf..3fe982b640 100644 --- a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done +ms.custom: no-azure-ad-ps-ref online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2016-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: New-AdfsAzureMfaTenantCertificate @@ -36,15 +36,12 @@ If it does not find one, it generates it. ### Example 1: Create a certificate and enable Azure MFA on an AD FS farm ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> New-AzureADServicePrincipalKeyCredential -ObjectId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64 +PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm. -> [!NOTE] -> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module. - ### Example 2: Determine which certificate Azure MFA is using ``` $CertInBase64 = New-AdfsAzureMfaTenantCertificate -TenantID diff --git a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md index 1adb2c053a..052f16425c 100644 --- a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: no-azure-ad-ps-ref online version: https://learn.microsoft.com/powershell/module/adfs/set-adfsazuremfatenant?view=windowsserver2016-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Set-AdfsAzureMfaTenant @@ -28,7 +28,7 @@ The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Ser ### Example 1: Enable Azure MFA ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> New-MsolServicePrincipalCredential -AppPrincipalId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64 +PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 4d8601d150..4d000bdb93 100644 --- a/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done +ms.custom: no-azure-ad-ps-ref online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2019-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: New-AdfsAzureMfaTenantCertificate @@ -36,15 +36,12 @@ If it does not find one, it generates it. ### Example 1: Create a certificate and enable Azure MFA on an AD FS farm ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> New-AzureADServicePrincipalKeyCredential -ObjectId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64 +PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm. -> [!NOTE] -> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module. - ### Example 2: Determine which certificate Azure MFA is using ``` $CertInBase64 = New-AdfsAzureMfaTenantCertificate -TenantID diff --git a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md index 35eea27491..c5a5502edf 100644 --- a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: no-azure-ad-ps-ref online version: https://learn.microsoft.com/powershell/module/adfs/set-adfsazuremfatenant?view=windowsserver2019-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Set-AdfsAzureMfaTenant @@ -28,7 +28,7 @@ The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Ser ### Example 1: Enable Azure MFA ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> New-MsolServicePrincipalCredential -AppPrincipalId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64 +PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 527a6f9674..88e25ad73d 100644 --- a/docset/winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: no-azure-ad-ps-ref online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: New-AdfsAzureMfaTenantCertificate @@ -36,15 +36,12 @@ If it does not find one, it generates it. ### Example 1: Create a certificate and enable Azure MFA on an AD FS farm ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> New-AzureADServicePrincipalKeyCredential -ObjectId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64 +PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm. -> [!NOTE] -> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module, see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0). - ### Example 2: Determine which certificate Azure MFA is using ``` $CertInBase64 = New-AdfsAzureMfaTenantCertificate -TenantID diff --git a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md index cb3d9cf62a..e66fb53aa8 100644 --- a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: no-azure-ad-ps-ref online version: https://learn.microsoft.com/powershell/module/adfs/set-adfsazuremfatenant?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Set-AdfsAzureMfaTenant @@ -28,7 +28,7 @@ The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Ser ### Example 1: Enable Azure MFA ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> New-MsolServicePrincipalCredential -AppPrincipalId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64 +PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 639dcd0a18..3a3e6d22b2 100644 --- a/docset/winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: no-azure-ad-ps-ref online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2025-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: New-AdfsAzureMfaTenantCertificate @@ -36,15 +36,12 @@ If it does not find one, it generates it. ### Example 1: Create a certificate and enable Azure MFA on an AD FS farm ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> New-AzureADServicePrincipalKeyCredential -ObjectId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64 +PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm. -> [!NOTE] -> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module, see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0). - ### Example 2: Determine which certificate Azure MFA is using ``` $CertInBase64 = New-AdfsAzureMfaTenantCertificate -TenantID diff --git a/docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md index 06012b4342..0181500456 100644 --- a/docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: no-azure-ad-ps-ref online version: https://learn.microsoft.com/powershell/module/adfs/set-adfsazuremfatenant?view=windowsserver2025-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Set-AdfsAzureMfaTenant @@ -28,7 +28,7 @@ The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Ser ### Example 1: Enable Azure MFA ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> New-MsolServicePrincipalCredential -AppPrincipalId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64 +PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` From f6ac33d6dce9057ae01c119ef10ada7472679e5f Mon Sep 17 00:00:00 2001 From: TimShererWithAquent <28902327+TimShererWithAquent@users.noreply.github.com> Date: Mon, 24 Mar 2025 08:28:26 -0700 Subject: [PATCH 2/2] Fix typo. --- .../winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md | 2 +- docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md | 2 +- .../winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md | 2 +- docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md | 2 +- .../winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md | 2 +- docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md | 2 +- .../winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md | 2 +- docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md | 2 +- 8 files changed, 8 insertions(+), 8 deletions(-) diff --git a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 3fe982b640..282b659773 100644 --- a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -36,7 +36,7 @@ If it does not find one, it generates it. ### Example 1: Create a certificate and enable Azure MFA on an AD FS farm ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Add-MgServicePrincipalKey -ServicePrincipalId -KeyCredential $certbase64 PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md index 052f16425c..f7930c87d2 100644 --- a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -28,7 +28,7 @@ The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Ser ### Example 1: Enable Azure MFA ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Add-MgServicePrincipalKey -ServicePrincipalId -KeyCredential $certbase64 PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 4d000bdb93..68bc3b9740 100644 --- a/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -36,7 +36,7 @@ If it does not find one, it generates it. ### Example 1: Create a certificate and enable Azure MFA on an AD FS farm ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Add-MgServicePrincipalKey -ServicePrincipalId -KeyCredential $certbase64 PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md index c5a5502edf..b7f724cade 100644 --- a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -28,7 +28,7 @@ The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Ser ### Example 1: Enable Azure MFA ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Add-MgServicePrincipalKey -ServicePrincipalId -KeyCredential $certbase64 PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 88e25ad73d..818edca3b0 100644 --- a/docset/winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2022-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -36,7 +36,7 @@ If it does not find one, it generates it. ### Example 1: Create a certificate and enable Azure MFA on an AD FS farm ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Add-MgServicePrincipalKey -ServicePrincipalId -KeyCredential $certbase64 PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md index e66fb53aa8..a3556bf1ce 100644 --- a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -28,7 +28,7 @@ The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Ser ### Example 1: Enable Azure MFA ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Add-MgServicePrincipalKey -ServicePrincipalId -KeyCredential $certbase64 PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 3a3e6d22b2..bc3cfcb465 100644 --- a/docset/winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2025-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -36,7 +36,7 @@ If it does not find one, it generates it. ### Example 1: Create a certificate and enable Azure MFA on an AD FS farm ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Add-MgServicePrincipalKey -ServicePrincipalId -KeyCredential $certbase64 PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ``` diff --git a/docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md index 0181500456..c4e9993107 100644 --- a/docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2025-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -28,7 +28,7 @@ The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Ser ### Example 1: Enable Azure MFA ``` PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID -PS C:\> Add-MgServicePrincipalKey -ServicePrincipalId Add-MgServicePrincipalKey -ServicePrincipalId -KeyCredential $certbase64 PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720 ```