Edit

Share via


System-preferred authentication

System-preferred authentication prompts users to sign in by using the most secure method they registered. It's an important security enhancement for users who authenticate by using phone-based methods. Administrators can enable system-preferred authentication to improve sign-in security and discourage less secure sign-in methods like Short Message Service (SMS).

For example, if a user registered both SMS and Microsoft Authenticator push notifications as methods for MFA, system-preferred authentication prompts the user to sign in by using the more secure push notification method. The user can still choose to sign in by using another method, but they're first prompted to try the most secure method they registered.

System-preferred authentication is a Microsoft managed setting, which is a tristate policy:

  • Enabled - Applies system-preferred authentication to the second factor (MFA) only.
  • Microsoft managed - While in preview, a toggle for Apply to both primary and multifactor authentication (preview) controls whether the feature also applies to primary authentication. When the toggle is off (default), system-preferred authentication applies to the second factor only. When the toggle is on, it applies to both the first and second factor.
  • Disabled - Turns off system-preferred authentication.

If you don't want to enable system-preferred authentication, change the state to Disabled, or exclude users and groups from the policy.

After system-preferred authentication is enabled, the authentication system does all the work. Users don't need to set any authentication method as their default because the system always determines and presents the most secure method they registered.

Known limitations

  • When you change the policy for a target group, the change might not take effect on the user's very next sign-in. It applies to all subsequent sign-ins after that.
  • Conditional Access policy is validated only for MFA and doesn't apply to first-factor authentication.

Enable system-preferred authentication in the Microsoft Entra admin center

To enable system-preferred authentication, follow these steps:

  1. Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.

  2. Browse to Microsoft Entra ID > Authentication methods > Settings.

  3. For System-preferred authentication, choose a state (Microsoft managed or Enabled) based on whether you want to apply system-preferred authentication to both factors or to the second factor only. You can also include or exclude any users or groups. Excluded groups take precedence over included groups.

    When you set the state to Microsoft managed, a toggle for Apply to both primary and multifactor authentication (preview) appears. Turn on the toggle to apply system-preferred authentication to both primary and secondary authentication. When the toggle is off (default), system-preferred authentication applies to the second factor only.

    For example, the following screenshot shows how to enable system-preferred authentication for only the Engineering group.

    Screenshot of the system-preferred authentication settings in the Microsoft Entra admin center, showing the feature enabled for the Engineering group.

  4. After you finish making any changes, select Save.

Enable system-preferred authentication by using Graph APIs

To enable system-preferred authentication in advance, you need to choose a single target group for the schema configuration, as shown in the Request example.

Authentication method feature configuration properties

By default, system-preferred authentication is Microsoft managed.

Property Type Description
excludeTarget featureTarget A single entity that is excluded from this feature.
You can only exclude one group from system-preferred authentication, which can be a dynamic or nested group.
includeTarget featureTarget A single entity that is included in this feature.
You can only include one group for system-preferred authentication, which can be a dynamic or nested group.
State advancedConfigState Possible values are:
enabled explicitly enables the feature for the selected group. Applies to the second factor (MFA) only.
disabled explicitly disables the feature for the selected group.
default allows Microsoft Entra ID to manage whether the feature is enabled or not for the selected group.

Feature target properties

System-preferred authentication can be enabled only for a single group, which can be a dynamic or nested group.

Property Type Description
ID String ID of the entity targeted.
targetType featureTargetType The kind of entity targeted, such as group, role, or administrative unit. The possible values are: 'group', 'administrativeUnit', 'role', 'unknownFutureValue'.

Use the following API endpoint to enable systemCredentialPreferences and include or exclude groups:

https://graph.microsoft.com/v1.0/policies/authenticationMethodsPolicy

Note

In Graph Explorer, you need to consent to the Policy.ReadWrite.AuthenticationMethod permission.

Request

The following example excludes a sample target group and includes all users. For more information, see Update authenticationMethodsPolicy.

PATCH https://graph.microsoft.com/v1.0/policies/authenticationMethodsPolicy
Content-Type: application/json

{
    "systemCredentialPreferences": {
        "state": "enabled",
        "excludeTargets": [
            {
                "id": "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb",
                "targetType": "group"
            }
        ],
        "includeTargets": [
            {
                "id": "all_users",
                "targetType": "group"
            }
        ]
    }
}

FAQ

How does system-preferred authentication determine the most secure method?

When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign in with the most secure method according to the following order. The order of authentication methods is dynamic, and updated as the security landscape changes and as better authentication methods emerge. Users can always cancel and choose a different available sign-in method. If your organization has Conditional Access policies that require specific authentication methods, those policies continue to take priority over the system-preferred authentication order.

Rank Credential Category Meets requirement for
1 Temporary Access Pass (TAP) Recovery 1FA + MFA
2 Passkey1 Phishing-resistant 1FA + MFA
3 Certificate-based authentication (CBA) Phishing-resistant 1FA or 1FA + MFA
4 Microsoft Authenticator notifications Passwordless 1FA + MFA
5 External multifactor authentication (MFA) MFA
6 Time-based one-time password (TOTP)2 MFA
7 Telephony3 MFA
8 QR code Frontline worker 1FA
9 Password 1FA

1Includes security keys, passkeys in Authenticator app, synced passkeys, Windows Hello for Business, and macOS Platform SSO.

2Includes hardware or software TOTP from Microsoft Authenticator, Authenticator Lite, or third-party applications.

3Includes SMS and voice calls.

Important

Certificate-based authentication (CBA) was previously placed last in the system-preferred authentication order due to known issues with CBA and system-preferred authentication. Now that those issues are resolved, starting March 18th, 2026, certificate-based authentication moved to the third position in the authentication order.

How does system-preferred authentication affect the NPS extension?

System-preferred authentication doesn't affect users who sign in by using the Network Policy Server (NPS) extension. Those users don't see any change to their sign-in experience.

What happens for users who aren't specified in the Authentication methods policy but enabled in the legacy MFA tenant-wide policy?

System-preferred authentication also applies for users who are enabled for MFA in the legacy MFA policy.

Screenshot of legacy MFA settings.

Can users still choose a different sign-in method?

Yes. System-preferred authentication prompts users with the most secure registered credential, but users can still choose other allowed methods during sign-in.

Next steps