Managing external identities to enable secure access for partners, customers, and other non-employees
To activate MFA for users in Microsoft Entra External ID while still adhering to Microsoft’s standard security settings, you can utilize the built-in security defaults. Security defaults require all users to register for Microsoft Entra multifactor authentication (MFA) and will prompt users for MFA based on risk factors such as location and device. However, if you want to avoid prompting for MFA on every login attempt, you may need to adjust your settings accordingly.
Here are steps you can take:
- Enable Security Defaults: Ensure that security defaults are enabled in your Microsoft Entra ID settings. This will enforce MFA registration and prompt users for MFA when necessary without requiring it on every login.
- Conditional Access Policies: Consider creating Conditional Access policies that define specific conditions under which MFA is required. This allows you to set parameters such as location, device compliance, and risk level to determine when MFA should be triggered.
- Monitor Sign-in Activity: Use the Conditional Access insights and reporting workbook to analyze sign-in logs and understand how MFA is impacting your users. This can help you fine-tune your policies to balance security and user experience.
- Test Different Scenarios: Since you mentioned trying to trigger MFA using a VPN and logging in from abroad, ensure that your Conditional Access policies are configured to recognize these scenarios as risky. You may need to adjust the conditions under which MFA is prompted to ensure it activates under the desired circumstances.
By implementing these strategies, you can maintain compliance with Microsoft’s standard security settings while still ensuring that MFA is triggered appropriately based on risk assessments.