The first part is the MFA trigger:
c:[type ==
"http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork", value == "false"] => issue(type =
"http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod", value =
"http://schemas.microsoft.com/claims/multipleauthn" );
So MFA will be triggered only if the user is connected externally (and through a Web Application Proxy).
If you want enforce MFA regardless of the user location, you can do this instead:
Set-AdfsRelyingPartyTrust -TargetName AppA -AdditionalAuthenticationRules 'c:[] => issue(type =
"http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod", value =
"http://schemas.microsoft.com/claims/multipleauthn" );
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
"YourGroupSID"] => issue(Type = "http://schemas.microsoft.com/claims/authnmethodsproviders",
Value = "AzureMfaAuthentication");
not exists([Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
Value=="YourGroupSid"]) => issue(Type =
"http://schemas.microsoft.com/claims/authnmethodsproviders", Value =
"AzureMfaServerAuthentication");'
What are your access rules then? Do you mid sharing the output of
Get-ADFSRelyingPartyTrust -identifier <RP ID>
?Please see the code attached, I did play with the IAR (permit all users), permit all users and mfa externally. No matter what I did it seemed like the AAR were never considered.
235442-rp.txt
Hehe my bad, I copy/paste the wrong stuff... There's no https it is http for the claim types.
I'll update the documentation (I also edited the response above).
Here is the PR for the doc fix: https://github.com/MicrosoftDocs/azure-docs/pull/97659 feel free to comment on it :) And thank you for spotting it!
Sign in to comment