Thank you for your post!
When it comes to using MS Entra ID MFA via Conditional Access Policies, you should be able to do this by following the Secure user sign-in events with Microsoft Entra multifactor authentication documentation. With Microsoft Entra MFA, you can use other MFA applications such as Duo, rather than the standard Microsoft Authenticator App.
- A working Microsoft Entra tenant with Microsoft Entra ID P1 or trial licenses enabled.
- If you need to, create one for free.
- An account with Conditional Access Administrator, Security Administrator, or Global Administrator privileges. Some MFA settings can also be managed by an Authentication Policy Administrator. For more information, see Authentication Policy Administrator.
Create a Conditional Access policy
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
- Browse to Protection > Conditional Access, select + New policy, and then select Create new policy.
- Walk through the entire CA policy configuration prior to saving.
Note: To prevent any type of lockout scenario, please ensure your Global Admin user or a Break Glass Account is created and excluded from the CA policy.
For more info - Manage emergency access accounts in Microsoft Entra ID.
Additional Links:
- Tutorial: Secure user sign-in events with Microsoft Entra multifactor authentication
- Authentication methods in Microsoft Entra ID - Microsoft Authenticator app
- Enable passwordless sign-in with Microsoft Authenticator
- Enable passwordless phone sign-in authentication methods
I hope this helps!
If you have any other questions, please let me know. Thank you for your time and patience throughout this issue.
If the information helped address your question, please Accept the answer. This will help us and also improve searchability for others in the community who might be researching similar information.