{"id":93022,"date":"2021-12-27T18:00:46","date_gmt":"2021-12-27T18:00:46","guid":{"rendered":"https:\/\/www.red-gate.com\/simple-talk\/?p=93022"},"modified":"2021-12-27T17:33:00","modified_gmt":"2021-12-27T17:33:00","slug":"azure-and-mfa-secrets","status":"publish","type":"post","link":"https:\/\/www.red-gate.com\/simple-talk\/blogs\/azure-and-mfa-secrets\/","title":{"rendered":"Azure and MFA Secrets"},"content":{"rendered":"<p>MFA and conditional access policies are powerful tools for our cloud security, but they are full of tricks.<\/p>\n<p>I don&#8217;t pretend to cover the basics here. You know you can create conditional access policies to request MFA authentication from the users. You also know the fact the default configuration (which you should avoid) will request MFA from everyone.<\/p>\n<p>However, for the user to fulfill the requirement, the user needs to be registered for the MFA. There are some different ways to control the user registration for MFA.<\/p>\n<p>It&#8217;s recommended to ensure the registration of the users for MFA before the conditional access policies jumps in and start requesting MFA from the users.<\/p>\n<h2>\nDirect Registration Requirement<\/h2>\n<p>\nOn <strong>Active Directory -&gt; Security -&gt; Identity Protection -&gt; MFA Registration Policy<\/strong> you can define the users who will be required to register a 2nd authentication method for MFA.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-93064\" src=\"https:\/\/www.red-gate.com\/simple-talk\/wp-content\/uploads\/2021\/12\/MFA01.png\" alt=\"\" width=\"648\" height=\"354\" \/><\/p>\n<p>MFA give the\u00a0 user 14 days for the registration before making it required. However, this will be a registrations of a single alternate method which by default is the Authenticator App.<\/p>\n<p>The user has the option to choose a different method instead of the authenticator app, but not many users do so. A request for a new registration will never appear for the user again, or that&#8217;s what most people believe.<\/p>\n<h2>Self-Service Password Reset<\/h2>\n<p>\nIt&#8217;s undeniable that SSPR is a very interesting feature, but what&#8217;s its relation to MFA registration?<\/p>\n<p>SSPR requires MFA authentication methods. You can check the authentication methods required by SSPR on <strong>Active Directory -&gt; Password Reset -&gt; Authentication Methods<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-93066\" src=\"https:\/\/www.red-gate.com\/simple-talk\/wp-content\/uploads\/2021\/12\/MFA03.png\" alt=\"\" width=\"603\" height=\"489\" \/><\/p>\n<p>The enabled authenticator methods don&#8217;t includ the authenticator app\u00a0 by default. You can include it, but it&#8217;s not by default.<\/p>\n<p>On the item below, <strong>Active Directory -&gt; Password Reset -&gt; Registration<\/strong> the default configuration is to require every user registered for SSPR to register an MFA method on their next login and by default will be a different one than the default Authenticator App.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-93065\" src=\"https:\/\/www.red-gate.com\/simple-talk\/wp-content\/uploads\/2021\/12\/MFA02.png\" alt=\"\" width=\"1110\" height=\"292\" \/><\/p>\n<p>This becomes the second option the user has to register a secondary MFA method.<\/p>\n<h2>\nThe Problem<\/h2>\n<p>It&#8217;s not very good the idea to depend on SSPR for the registration of a secondary MFA method. What happens if the user is in the middle of a trip and don&#8217;t have access to the main MFA methods registered? How could the user authenticate with alternate methods?<\/p>\n<p>It&#8217;s not a good idea to have a single MFA method registered, how could you configure additional ones?<\/p>\n<h2>The Solution<\/h2>\n<p>There are two addresses the user can access directly to register additional MFA methods:<\/p>\n<ul>\n<li>First Option: <a href=\"https:\/\/aka.ms\/mfasetup\">https:\/\/aka.ms\/mfasetup<\/a><\/li>\n<li>Second Option: <a href=\"https:\/\/aka.ms\/setupsecurityinfo\">https:\/\/aka.ms\/setupsecurityinfo<\/a>\u00a0<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-93067\" src=\"https:\/\/www.red-gate.com\/simple-talk\/wp-content\/uploads\/2021\/12\/MFA04.png\" alt=\"\" width=\"1198\" height=\"720\" \/><\/p>\n<h2>Conclusion<\/h2>\n<p>It may be a good idea for the IT team to make these addresses available to the users so they can control their own MFA registration methods and ensure that, when in trouble, they still have alternate options to authenticate on the systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MFA and conditional access policies are powerful tools for our cloud security, but they are full of tricks. I don&#8217;t pretend to cover the basics here. You know you can create conditional access policies to request MFA authentication from the users. You also know the fact the default configuration (which you should avoid) will request&#8230;&hellip;<\/p>\n","protected":false},"author":50808,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[5364,145788,145791,145790,4619],"coauthors":[6810],"class_list":["post-93022","post","type-post","status-publish","format-standard","hentry","category-blogs","tag-azure","tag-azure-active-directory","tag-conditional-access-policy","tag-mfa","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/posts\/93022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/users\/50808"}],"replies":[{"embeddable":true,"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/comments?post=93022"}],"version-history":[{"count":3,"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/posts\/93022\/revisions"}],"predecessor-version":[{"id":93069,"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/posts\/93022\/revisions\/93069"}],"wp:attachment":[{"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/media?parent=93022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/categories?post=93022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/tags?post=93022"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.red-gate.com\/simple-talk\/wp-json\/wp\/v2\/coauthors?post=93022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}