Hello Jamison,
Keep in mind that disabling MFA for a user account can reduce the security posture of your organization. Do you currently have a Conditional Access policy for the entire org that enables MFA? If not, you can do the following
- Create a security group for exclusion. You can call it "MFA Excluded users" for example.
- Configure Conditional Access Policy:
- Navigate to the Azure Active Directory admin center.
- Go to Security > Conditional Access.
- Select New policy.
- Name your policy (e.g., "Disable MFA for Volunteers").
- Under Assignments, select Users and Groups. Then, under Include, select All users. Under Exclude, choose the group "MFA Excluded Users" you created for shared accounts.
- Under Cloud apps or actions, you can select All Cloud apps or specify only Microsoft 365 apps as required.
- In the Conditions section, you can leave the default settings or adjust them as needed for your organization.
- Under Grant, select Grant access and ensure that Require multi-factor authentication is unchecked.
- Enable the policy by setting Enable policy to On.
- Click Create to apply the policy.
Notes: Make sure you have a break-glass account when enabling MFA. Also, you should look into Guest accounts as an alternative to this issue.
Let me know if that helps.