Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
This topic covers steps to verify that users in your organization are set up to meet requirements to use MFA to sign in to Microsoft admin portals. For more information about which applications and accounts are affected and how the rollout works, see Planning for mandatory multifactor authentication for Azure and other admin portals.
A user might use their personal account to create a Microsoft Entra tenant for only a few users. If you used your personal account to subscribe to Azure, complete the following steps to confirm that your account is set up for MFA.
For more information, see How to use two-step verification with your Microsoft account.
Use the following resources to find users who sign in with and without MFA:
All users who access admin portals and Azure clients that require MFA must be set up to use MFA. Mandatory MFA isn't restricted to privileged roles. As a best practice, all users who access any administration portal should use MFA.
Use the following steps to verify that MFA is set up for your users, or to enable it if needed.
Sign in to Azure portal as a Global Reader.
Browse to Identity > Overview.
Check the license type for the tenant subscription.
Follow the steps for your license type to verify MFA is enabled, or enable it if needed. To complete these steps, you need to sign out as a Global Reader, and sign back in with a more privileged role.
If you have a Microsoft Entra ID P1 or Microsoft Entra ID P2 license, you can create a Conditional Access policy to require MFA for users who access Microsoft admin portals:
For more information, see Common Conditional Access policy: Require multifactor authentication for admins accessing Microsoft admin portals.
If you have a Microsoft 365 or Microsoft Entra ID Free license, you can enable MFA by using security defaults. Users are prompted for MFA as needed, but you can't define your own rules to control the behavior.
To enable security defaults:
For more information about security defaults, see Security defaults in Microsoft Entra ID.
If you don't want to use security defaults, you can enable per-user MFA. When you enable users individually, they perform MFA each time they sign in. An Authentication Administrator can enable some exceptions. To enable per-user MFA:
After you enable users, notify them by email. Tell the users that a prompt is displayed to ask them to register the next time they sign in. For more information, see Enable per-user Microsoft Entra multifactor authentication to secure sign-in events.
Review the following topics to learn more about MFA:
Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register Now