A cloud-based identity and access management service for securing user authentication and resource access
Hey there! It sounds like your user is stuck in an endless MFA loop—even though you believe MFA is turned off—which usually means there’s some other enforcement (Security Defaults, Conditional Access, per-user MFA or the “Admin portals must use MFA” rule) kicking in behind the scenes. Here’s a plan to get them back in:
- Find out what’s really enforcing MFA • In the Azure portal go to Azure Active Directory > Monitoring > Sign-ins • Filter on the user and open the latest “Interrupted” or “Failure” entry • Under the Authentication Details tab check “Authentication policies applied.” – If you see Security Defaults, that can’t be scoped per user (you’d have to turn it off tenant-wide) – If you see a Conditional Access policy, open it or run the “What-if” tool to see why that user is in scope – If it’s “App requires multifactor authentication,” it might be the Azure/Entra Admin portals enforcement
- Verify per-user MFA status • In Azure AD admin center go to Users > Multi-factor authentication > ensure your user is Disabled here • If it’s Enabled, click Disable to clear it out
- Clear their stale methods and force re-registration • In Azure AD go to Users > [your user] > Authentication methods • Under “Require re-register MFA” turn that on. This deletes their old Authenticator registration. • Ask the user to log in again (they’ll see the fresh registration flow).
- Give them a password reset that doesn’t trigger MFA • In Azure AD go to Users > [your user] > Reset password • Ensure Self-Service Password Reset (SSPR) is configured with at least one non-MFA method (email or SMS) so they can break out of the loop
- If it’s Conditional Access or Admin-portal MFA • Edit or temporarily disable the policy for that user (or create an exclusion group) • Use a “break-glass” Global Admin account that you’ve excluded from CA to sign in and fix settings
Bonus Trick (PowerShell):
You can also remove all their auth methods in bulk with Remove-AzureADUserAuthenticationMethod and then let them re-add phone or authenticator.
Hope this gets them unstuck—once they’re back in you can fine-tune your CA or Security Defaults settings so it doesn’t happen again!
Reference docs
• Resolve MFA failures & force re-registration: https://learn.microsoft.com/entra/identity/authentication/howto-mfa-userstates#reset-mfa-methods
• Troubleshoot MFA prompts & determine source: https://learn.microsoft.com/entra/identity/conditional-access/what-if-tool
• Security Defaults overview: https://learn.microsoft.com/entra/fundamentals/security-defaults
• Mandatory Admin portal MFA: https://learn.microsoft.com/entra/identity/authentication/concept-mandatory-multifactor-authentication?tabs=dotnet
• Self-Service Password Reset setup: https://learn.microsoft.com/entra/identity/authentication/howto-registration-mfa-sspr-combined
Note: This content was drafted with the help of an AI system. Please verify the information before relying on it for decision-making.