Jump to content

GA: System-preferred multifactor authentication


Recommended Posts

Guest Alex Weinert
Posted

In previous blogs, we've emphasized the importance of multifactor authentication (MFA). Today, organizations and end users are using various authentication methods, providing varying levels of security. Users often choose less secure MFA methods, despite having access to more secure options due to a range of factors such as convenience, lack of awareness, or technical limitations.

 

 

 

To encourage users to authenticate with the strongest method available to them, we’re announcing system-preferred authentication for MFA. This system prompts the user to sign in with the most secure method they’ve registered and the method that’s enabled by admin policy. This will transition users from choosing a default method to use first to always using the most secure method available. If they can’t use the method they were prompted to use they can choose a different MFA method to sign in.

 

 

 

Administrators can roll out the feature by using the admin UX in the Azure Portal or via GraphAPI. For example, the user "John Doe" has registered both SMS and Microsoft Authenticator, and SMS is the default option that they used to sign in with. Once this feature has been enabled, the system-preferred method (Authenticator) will be presented to the user.

 

 

 

Admins can enable system-preferred MFA in Settings for Authentication methods.

 

 

 

836x348vv2.jpg.a4847678b8207aabd4fa8f9cd45df69c.jpg

 

 

 

 

This is how the Security info page appears when a user is enabled for system-preferred MFA:

 

 

 

840x342vv2.png.bcd83682311c466f39d1bb8fe1ac9e62.png

 

 

 

 

 

The most secure method for the user in this example is Microsoft Authenticator:

 

 

 

mediumvv2px400.png.3795640fd26eed2139a3b4df8a4a1134.png

 

 

 

mediumvv2px400.png.5507dcadcd68bd50e0b24922598cd1d1.png

 

 

 

With an ever-changing threat landscape, it’s now more important than ever for organizations to stay ahead of bad actors. With that in mind,

 

 

 

  • This feature was introduced in April 2023, set to Microsoft managed (Disabled) by default.
  • After this initial phase, the feature will be rolled out as Microsoft managed (Enabled) for all tenants, with admins retaining the option to disable it as needed.
  • Finally, the feature will be set to Microsoft managed (Enabled) for all tenants, and the control to disable the feature will be removed.

 

 

 

To ensure organizations have adequate time to prepare for the rollout, we plan to share more detailed timelines by June.

 

 

 

To best secure your organization and its end users, we highly encourage you to use the rollout controls and deploy this new feature as soon as you can. It’s now available in your tenant, making it easy to ensure users always use the most secure authentication method first.

 

 

 

As always, we want to hear from you! Feel free to share your comments or reach out to us on aka.ms/AzureADFeedback.

 

 

Best regards,

 

Alex Weinert (@Alex_T_Weinert)

 

VP Director of Identity Security, Microsoft

 

 

 

Learn more about Microsoft identity:

 

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...