A cloud-based identity and access management service for securing user authentication and resource access
Hello Abdulkareem Saad,
Yes, this is expected behavior in Microsoft Entra ID.
Microsoft Authentication Broker supports apps like Microsoft Teams and Microsoft Outlook with sign-in, token handling, and single sign-on. It is not usually the application where Conditional Access is enforced.
Because of this, broker sign-ins may show:
Authentication Requirement: Single-factor authentication Conditional Access Status: Not Applied
This does not mean MFA was bypassed.
Conditional Access is typically evaluated on the target application such as Teams, SharePoint, or Exchange Online. If MFA was already completed through Primary Refresh Token (PRT), device compliance, or a previous sign-in, the broker event can still appear as single-factor.
That is why Teams may show Conditional Access: Success and Multifactor authentication, while Microsoft Authentication Broker shows Not Applied.
This is expected by design.
To confirm MFA enforcement, review the sign-in log of the target application rather than relying only on the broker sign-in event.