Hi @Karthick G • Thank you for reaching out.
Azure AD PIM can be configured to trigger MFA on activation of a role only when the user has not already done MFA during the same session.
If the user has already performed MFA during the initial sign-in to the Azure Portal, this information is stored in the ESTSAuth cookies. When the user accesses the PIM service to activate the role, an access token is silently acquired using these cookies. The access token is then passed as the bearer token along with your call to api.azrbac.mspim.azure.com
, as highlighted below:
When you decode the token, you will see that the amr
claim contains the information about the authentication methods user has already performed which will contain MFA as well.
That way PIM identifies that the user has already done MFA and shouldn't be prompted for MFA again. If the user has not done MFA in the first place, amr
claim won't include MFA and the user would need to perform MFA to activate the role, provided you have configured the below setting for the privileged role such as Global Admin as shown below:
-----------------------------------------------------------------------------------------------------------
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.