Azure MFA - What happens to users registered with a method (SMS TEXT) after you remove that registration method as an option under MFA services?

Pete Runyan Admin 31 Reputation points
2021-01-21T16:23:36.72+00:00

We have deployed Azure MFA to 260 users. When our users registered for Azure MFA, they were presented with four MFA registration methods:

Phone call
SMS Text
MS Authenticator OTP
MS Authenticator push notification

About 50% of our users selected the SMS Text method.

We now want to remove the SMS Text and MS Authenticator OTP registration methods for any NEW USERS that are created in O365/Azure.

It appears that I can do this here:

59232-image.png

If I remove the "text message to phone" and "Verification code from mobile app or hardware token" methods and save those changes, what happens to users who have already registered with those methods? Nothing? Do they have to re-register their MFA method? We want to turn off the text and OTP registration methods for any new users that get created in O365/Azure, but we do NOT want users that have registered with those methods to have to re-register or used a different method.

I can find nothing about what happens to users that have already registered for Azure MFA registration with a method that is then removed from the Azure MFA services setup.

Microsoft Security | Microsoft Entra | Microsoft Entra ID
0 comments No comments
{count} votes

Accepted answer
  1. Marilee Turscak-MSFT 37,206 Reputation points Microsoft Employee Moderator
    2021-01-22T01:14:54.853+00:00

    If you remove SMS as an option, a user who previously got a phone call with the option to change to another option will no longer be able to change options.

    Users who have phone or app as their defaults will not be affected, but users who set text message as their default will be required to re-register. In the registration they will be told that their organization needs further information and that they can only MFA using "call me." Users who previously had only the deselected options registered will be required to register again.

    If you have SSPR enabled, changing the authentication methods available may prevent users from being able to use SSPR. From the Changing authentication methods documentation,

    Changing the available authentication methods may also cause problems for users. If you change the types of authentication methods that a user can use, you might inadvertently stop users from being able to use SSPR if they don't have the minimum amount of data available.

    In that scenario as long as the user has enough registered options (which you can enforce if you want by requiring two or more methods for SSPR) , then you shouldn't have an issue.

    The main repercussion is that some users will need to re-register, but that shouldn't be that big of a deal.

    Interestingly enough there's a really good blog post on this topic by Microsoft MVP Brian Reid. It's also covered a bit in the first document I linked but not as explicitly.


5 additional answers

Sort by: Most helpful
  1. prunyan 1 Reputation point
    2021-07-07T15:42:23.26+00:00

    Hi Ian,

    No, we are not entering passwords for the user accounts we are setting up on the WatchGuards. So there's no issue on having to update the WG user accounts passwords to match the user's AD account password. Another issue however, is there a bug in the WG management web GUI that will cause the web management GUI to slow down and eventually become unresponsive and time out (in the VPN SSL section of the web GUI - everything else in the web GUI continues to work fine). This issue is caused by having such a large number of user accounts setup on the WatchGuard directly. We work around this issue by using the WG System Manager instead. WG knows about this bug in the web GUI, and it is supposed to be fixed with a firmware upgrade soon.

    Our experience with the WG and Azure MFA NPS extension is that either the phone call or Microsoft Authenticator PUSH methods work fine. It's only SMS TEXT and MS Authenticator OTP that don't work. Again, if you want the details of how we made all four methods work, we can discuss it. But long story short - you REALLY have to want all four of those methods to go through the setup hassle. And we REALLY wanted it. :-)

    Best Regards,

    -Pete


  2. Pete Runyan Admin 31 Reputation points
    2021-01-27T14:26:50.6+00:00

    I also want to highlight the broader issue that forced our company into this situation with Azure MFA:

    We use a WatchGuard Firebox M370 firewall, and many of our users work remotely over a client VPN solution. We use the Azure MFA NPS extension, which allows our WatchGuard firewall to use RADIUS to talk to our NPS server, which then talks to Azure MFA over the Azure MFA NPS extension when our users connect with the WatchGuard VPN client.

    The Azure MFA NPS extension does NOT properly return RADIUS attribute 11 when using SMS TEXT or Microsoft Authenticator OTP as the MFA method. (RADIUS attribute 11 includes the group name that user belongs to in our Azure MFA conditional access policies. Since the Azure MFA NPS extension does not return RADIUS attribute 11 with the user's group name, our WatchGuard firewall cannot respond properly and complete the authentication for remote VPN users that registered with SMS TEXT or the Microsoft Authenticator OTP methods.) The Azure MFA NPS extension works fine for our WatchGuard firewall VPN connections for users that registered with the Phone call or Microsoft Authenticator MFA methods, because the Azure MFA NPS extension returns RADIUS attribute 11 for these methods.

    This is a known issue. See this link: https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension

    Here's the relevant quote from that link explaining the problem:

    "Also, regardless of the authentication protocol that's used (PAP, CHAP, or EAP), if your MFA method is text-based (SMS, mobile app verification code, or OATH hardware token) and requires the user to enter a code or text in the VPN client UI input field, the authentication might succeed. But any RADIUS attributes that are configured in the Network Access Policy are not forwarded to the RADIUS cient (the Network Access Device, like the VPN gateway). As a result, the VPN client might have more access than you want it to have, or less access or no access."

    What I would like to know is WHY the Azure MFA NPS extension does NOT return RADIUS attribute 11 with the user's group membership for the SMS TEXT or Microsoft Authenticator OTP MFA methods? This lack of functionality is the main reason we will be forced to make half our users re-register with a different MFA method.

    1 person found this answer helpful.

  3. prunyan 1 Reputation point
    2021-07-07T14:59:59.923+00:00

    Hello Ian,

    MS will not be able to help you with your problem with the WatchGuard M470. We were able, however, to come up with a workaround to the MFA method problem. It allows your users to use any of the four MFA methods available via Azure MFA. Caveat - the workaround is not fun, and requires lots of initial manual setup work. The workaround is implemented entirely on the WatchGuard. I do not believe WatchGuard support is aware of this workaround. We came up with it ourselves. A quick summary is as follows:

    1) You will need to create some additional authentication servers on your WatchGuard.
    2) You will need to create matching local users on the WatchGuard that match your AD accounts. In our case, that meant adding 260 users to the WatchGuard manually. This was distinctly not fun. There is no way to add them in any sort of automated fashion.
    3) You will then have to make sure that your authentication server order is setup correctly on the WatchGuard so that users get processed correctly.

    Let me know if you want the details, and I can send them along to you.

    Best Regards,

    -Pete


  4. prunyan 1 Reputation point
    2021-07-08T18:51:38.793+00:00

    Hi Ian,

    That sounds good. I hate to see anyone have to go through as much work as we did! The secret sauce (should you come to need it) is understanding the WG authentication servers and the authentication process flow.

    1) In our case, we have our default authentication server setup with our internet domain name, and then it is configured to use the WatchGuard Firebox-DB, & RADIUS (to communicate with the on-prem NPS/Azure MFA), and Active Directory authentication processes.
    2) Our second authentication server points to our local active directory and uses LDAP. But it's configured in such a way that you need to use some special logon formatting in the WG SSL VPN client to have it work. It's a kind of safety valve in the case the MS MFA service has issues and we have give users some other method for getting in. So it's not really in play in this scenario.
    3) Finally we have the regular Firebox-DB authentication server for local accounts on the Firebox. Anyone who gets a local account on the firebox (which is all of our users that use the SSL VPN) get accounts here. It can use the Firebox-DB (and therefore the SSLVPN-Users built-in group) the RADIUS/NPS and LDAP connection pointing to the on-prem AD domain controllers.
    4) The authentication server list and the priority order is what makes it all work. Number 1 allows our SSL VPN users to go ahead and authenticate with Azure MFA via NPS/Azure MFA extension and covers the phone call and MS Authenticator push method. If the user is setup to use SMS or MS Authenticator OTP methods, authentication server number 3 kicks in, and despite the fact that the NPS MFA extension does not properly return RADIUS attribute 11 for SMS or MS Authenticator OTP methods when those methods return a success for authentication, number 3 above allows those users to be processed by matching their local accounts in the Firebox-DB setup.

    I hope that makes sense. Best of luck to you!

    Best Regards,

    -Pete


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.