A cloud-based identity and access management service for securing user authentication and resource access
Hello Glenn Maxwell
Thank you for reaching out to Microsoft Q&A.
It sounds like you’re planning to roll out a “Require MFA” Conditional Access (CA) policy across your hybrid Okta + Entra ID environment. Here’s what to watch out for and some best practices folks usually follow:
- Okta MFA/SSO flows
- If your users federate to Okta for primary authentication, Entra CA will still evaluate and enforce its own MFA step after the Okta token is issued. In practice you can end up with “double” MFA prompts unless you scope carefully.
- Best practice: pilot with a small group, confirm your Okta IdP trust and SAML/OIDC flows work end-to-end, then expand.
- Enterprise apps, app registrations & non-interactive/service accounts
- Service principals, automation accounts, CI/CD pipelines and other non-interactive flows can break if they hit an MFA gate.
- Exclude these by: • Using CA filters for “client apps” (e.g. exclude “Service principals”) • Putting SPNs and managed identities into an exclusion group • If you use app passwords or legacy protocols, plan to disable or carve those out.
- Intune- and Jamf-managed devices
- Requiring MFA won’t prevent device enrollment or compliance checks, but users will see an MFA prompt at user sign-in.
- No known blockers with Intune or Jamf – just make sure your device-compliance and CA policies don’t contradict each other (e.g. requiring device compliance + MFA shouldn’t chain loops).
- Full “All cloud apps” scope & unexpected prompts
- Applying to “All cloud apps” is fine, but watch out for Microsoft-managed apps (Azure portal, Graph API) and management endpoints. If you protect those without exception, you can lock out admins or break infrastructure automation.
- Always exclude a break-glass emergency account and exclude the “Azure management” built-in apps or your own admin roles.
- Typical exclusions before going broadly
- Break-glass/emergency access accounts
- Service principals, managed identities, automation/service accounts
- Legacy/authentication protocols not supporting MFA (Exchange ActiveSync, SMTP, IMAP, POP)
- Any RADIUS/NPS integration endpoints you need to stay up
- B2B guests & external SharePoint sharing
- Guests will also be MFA-challenged if they’re in scope of the policy. You can either: • Create a separate CA policy scoped to “Guests + external users” with its own controls (e.g. lighter enforcement, or OTP via email) • Exclude the “Guest” directory role from your “All users” policy and handle them in a dedicated guest policy
Quick wins for a smooth rollout:
- Implement a break-glass emergency admin account (excluded from CA)
- Group your service and automation principals into an exclusion group
- Start with pilot users before flipping to “All users”
- Monitor sign-in logs for MFA failures especially from service principals
- Migrate legacy per-user MFA and SSPR policies into the new Authentication methods policy before disabling the old ones
Reference list
- Plan MFA Deployment scenarios (free vs. P1 vs. P2) – https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mfa-licensing#compare-multifactor-authentication-policies
- How to migrate MFA/SSPR to Authentication methods policy – https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-methods-manage
- Emergency access admin accounts (break-glass) – https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/security-emergency-access
- Conditional Access policy templates & exclusions – https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-policy-common
- App passwords for legacy protocols – https://learn.microsoft.com/en-us/entra/identity/authentication/howto-mfa-app-passwords
If the answer is helpful, kindly upvote it. If you have extra questions about this answer, please click "Comment".