Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Accounts that are assigned privileged administrative roles are frequent targets of attackers. Requiring phishing-resistant multifactor authentication (MFA) on those accounts is an easy way to reduce the risk of those accounts being compromised.
Caution
Before creating a policy requiring phishing-resistant multifactor authentication, ensure your administrators have the appropriate methods registered. If you enable this policy without completing this step you risk locking yourself out of your tenant. Administrators can Configure Temporary Access Pass to register passwordless authentication methods or follow the steps in Register a passkey (FIDO2).
Microsoft recommends you require phishing-resistant multifactor authentication on the following roles at a minimum:
Organizations might choose to include or exclude roles based on their own requirements.
Organizations can use this policy in conjunction with features like Privileged Identity Management (PIM) and its ability to require MFA for role activation.
The guidance in this article helps your organization create an MFA policy for your environment using authentication strengths. Microsoft Entra ID provides three built-in authentication strengths:
You can use one of the built-in strengths or create a custom authentication strength based on the authentication methods you want to require.
For external user scenarios, the MFA authentication methods that a resource tenant can accept vary depending on whether the user is completing MFA in their home tenant or in the resource tenant. For more information, see Authentication strength for external users.
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policies:
Organizations can choose to deploy this policy using the steps outlined below or using the Conditional Access templates.
Warning
If you use external authentication methods, these are currently incompatible with authentication strength and you should use the Require multifactor authentication grant control.
Under Include, select Directory roles and choose at least the previously listed roles.
Warning
Conditional Access policies support built-in roles. Conditional Access policies are not enforced for other role types including administrative unit-scoped or custom roles.
Under Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts.
After administrators confirm the settings using report-only mode, they can move the Enable policy toggle from Report-only to On.
Events
Apr 9, 3 PM - Apr 10, 12 PM
Code the Future with AI and connect with Java peers and experts at JDConf 2025.
Register NowTraining
Learning path
Multifactor authentication helps secure your environment and resources by requiring that your users confirm their identity by using multiple authentication methods, like a phone call, text message, mobile app notification, or one-time password. You can use multifactor authentication both on-premises and in the cloud to add security for accessing Microsoft online services, remote access applications, and more. This learning path provides an overview of how to use multifactor authentication as part of a cyber
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance.