- last edited on
We've had MFA configured for a couple of years now, and are just starting to configure devices so they log into an Azure AD profile on a device with Intune.
With this configuration more or less out of the box, after logging into Windows, the user is automatically logged into Office.com in Edge and Office products (except Outlook). In effect, it's bypassing MFA.
Is it possible to configure Windows so it requires people to authenticate with the app or text when logging into Windows, or otherwise is it possible to remove the SSO experience from Edge? We cannot allow users to get to certain SharePoint sites without 2 factors from a new windows session if we want to stay in compliance with our client's security requirements.
10-11-2018 08:33 AM - edited 10-11-2018 08:34 AMSolution
It's not bypassing MFA, when you join the machine to Azure AD it requires MFA to join the machine, which can use windows hello to use the TPM chip, turning your device into something you have and your Password / PIN(Hello) as part of the MFA so you no longer have to do MFA to access your office resources from the device itself. The idea is anyone accessing your o365 account on anything other than that device or another joined device you setup, will still need to do MFA to access your resources. If your machine gets stolen lost, they must crack the password, but the machine can be disabled, which will force MFA again.
10-11-2018 09:09 AM
That makes sense, as long as I can document it and defend it we should be good, so thanks for explaining. I disable Windows Hello to ensure the password complexity and password change requirements are met, but I assume BitLocker w/ TPM has the same effect as making it the 'something you have', or is there something fundamentally different about Hello?
10-11-2018 09:11 AM
10-11-2018 10:29 AM
I know :p Well, Jairo knows, and has documented it pretty well on his blog: https://jairocadena.com/2016/11/08/how-sso-works-in-windows-10-devices/
Make sure to review all the other articles as well.
10-11-2018 10:32 AM