Events
Nov 19, 11 PM - Nov 21, 11 PM
Gain in-demand skills with online sessions designed to meet the industry’s challenges head-on at Microsoft Ignite.
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Applies to:
You can use Intune together with Microsoft Entra Conditional Access policies to require multifactor authentication (MFA) during device enrollment. If you require MFA, employees and students wanting to enroll devices must first authenticate with a second device and two forms of credentials. MFA requires them to authenticate using two or more of these verification methods:
To implement this policy, you must assign Microsoft Entra ID P1 or later to users.
Complete these steps to enable multi-factor authentication during Microsoft Intune enrollment.
Important
Don't configure Device based access rules for Microsoft Intune enrollment.
Sign in to the Microsoft Intune admin center.
Go to Devices > Conditional Access. This area is the same as the Conditional Access area available in the Microsoft Entra admin center. For more information about the available settings, see Building a Conditional Access policy.
Choose Create new policy.
Name your policy.
Select the Users category.
Select the next category, Target resources.
For Apple automated device enrollments using Setup Assistant with modern authentication, you have two options to choose from. The following table describes the difference between the Microsoft Intune option and Microsoft Intune Enrollment option.
Cloud app | MFA prompt location | Automated Device Enrollment notes |
---|---|---|
Microsoft Intune | Setup Assistant, Company Portal app |
With this option, MFA is required during enrollment and each time the user signs into the Company Portal app or website. The MFA prompts appear on the Company Portal sign-in page. |
Microsoft Intune Enrollment | Setup Assistant | With this option, MFA is required during device enrollment and appears as a one-time MFA prompt on the Company Portal sign-in page. |
Note
The Microsoft Intune Enrollment cloud app isn't created automatically for new tenants. To add the app for new tenants, a Microsoft Entra administrator must create a service principal object, with app ID d4ebce55-015a-49b5-a083-c84d1797ae8c, in PowerShell or Microsoft Graph.
Select the Grant category.
Select the Session category.
For Enable policy, select On.
Select Create to save and create your policy.
After you apply and deploy this policy, users will see a one-time MFA prompt when they enroll their device.
Note
A second device or a Temporary Access Pass is required to complete the MFA challenge for these types of corporate-owned devices:
The second device is required because the primary device can't receive calls or text messages during the provisioning process.
Events
Nov 19, 11 PM - Nov 21, 11 PM
Gain in-demand skills with online sessions designed to meet the industry’s challenges head-on at Microsoft Ignite.
Register nowTraining
Learning path
Multifactor authentication helps secure your environment and resources by requiring that your users confirm their identity by using multiple authentication methods, like a phone call, text message, mobile app notification, or one-time password. You can use multifactor authentication both on-premises and in the cloud to add security for accessing Microsoft online services, remote access applications, and more. This learning path provides an overview of how to use multifactor authentication as part of a cyber
Certification
Microsoft 365 Certified: Endpoint Administrator Associate - Certifications
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.