%3CLINGO-SUB%20id%3D%22lingo-sub-1450170%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1450170%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20for%20the%20great%20content!%3C%2FP%3E%3CP%3EThe%20video%20in%20the%20YouTube%20link%20is%20mirrored%2C%20no%20magic%20whiteboard%20involved%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1450274%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1450274%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Michael%2C%3C%2FP%3E%3CP%3EGreat%20post!%20I%20indeed%20did%20not%20know%20about%20the%20MFA%20%26amp%3B%20PRT%20validity%20period.%3C%2FP%3E%3CP%3EI'm%20curious.%20What's%20your%20view%20on%20not%20having%20to%20fulfill%20MFA%20and%20the%20device%20gets%20stolen%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1453388%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1453388%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F175162%22%20target%3D%22_blank%22%3E%40Michael%20Hildebrand%3C%2FA%3E%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAny%20chance%20you%20are%20or%20know%20the%20person%20who%20can%20help%20me%20with%20a%20related%20question....%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20use%20Azure%20MFA%2C%20we%20are%20at%20the%20final%20stage%20were%20we%20have%20risk%20based%20CA%20policies.%20Its%20great%2C%20MFA%20only%20prompts%20when%20Azure%20Security%20Graph%20feels%20its%20needed.%20However%2C%20we%20have%20a%20limited%20handful%20of%20tools%20like%20password%20vaults%20where%20we%20MUST%20MFA%20prompt%20every%20single%20time.%20No%20allowing%2014%20days%2C%20no%20using%20risk%20scores%2C%20MUST%20MUST%20MUST%20prompt%20for%20MFA.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPlease%20tell%20me%20there%20is%20some%20obscure%20thing%20we%20can%20put%20in%20the%20app%20registration%20manifest%20or%20strange%20powershell%20command%20we%20can%20run%20against%20the%20enterprise%20app%20entry%20to%20make%20this%20happen.%26nbsp%3B%20If%20there%20is%20not%20can%20we%20PLEASE%20have%20one%3F%20Its%20the%20only%20thing%20that%20stops%20us%20from%20dumping%20another%20MFA%20vendor%20we%20have.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIf%20your%20not%20the%20right%20person%20would%20you%20kindly%20forward%20it%20on%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1458318%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1458318%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20for%20blogging%20this.%3C%2FP%3E%3CP%3ENow%2C%20I%20know%20you're%20just%20a%20blogger%2C%20but%20I%20hope%20some%20smart%20people%20like%20Caleb%20Baker%20or%20others%20on%20the%20Azure%20AD%2FAzure%20MFA%2FConditional%20Access%20product%20teams%20are%20reading%20and%20following%20me.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENow%2C%20to%20forward%20a%20question%20from%20the%20CEO%2C%20paraphrased%3A%3C%2FP%3E%3CP%3E%22%3CEM%3EMicrosoft%20can%20make%20such%20an%20overcomplicated%2C%20interconnected%20solution%2C%20but%20they%20can't%20force%20MFA%20on%20connection%20to%20the%20corporate%20VPN%20like%20every%20other%20vendor%3F%3C%2FEM%3E%22%3C%2FP%3E%3CP%3EWe%20have%20placed%20an%20order%20to%20a%20competitor%20VPN%20vendor%20because%20of%20this%20problem.%20We're%20not%20ready%20for%20a%20complete%20zero-trust%20transformation%2C%20we%20need%20the%20corporate%20VPN%2C%20and%20our%20CISO%20and%20risk%20manager%20won't%20budge%20this%20need%20for%20MFA%20every%20time.%20We're%20government%2C%20it's%20just%20more%20complicated.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EA%20very%20simple%20workaround%20would%20be%20for%20us%20admins%20to%20be%20able%20to%20ignore%20the%20MFA%20claim%20on%20the%20PRT%20for%20specific%20cloud%20apps%2C%20either%20on%20the%20cloud%20app%20itself%2C%20or%20in%20a%20Conditional%20Access%20policy.%20That%20way%2C%20I'd%20ignore%20the%20MFA%20claim%20for%20the%20%22VPN%20Server%22%20cloud%20app%20(automatically%20created%20by%20RRAS)%2C%20and%20our%20users%20would%20get%20the%20ideal%20experience%20when%20connecting%20to%20the%20corporate%20VPN%20(given%20we%20still%20had%20Microsoft%20RRAS%20..%20).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESign-in%20frequency%20isn't%20enough.%20Even%20if%20you%20set%20it%20to%20its%20minimum%20of%201%20hour%2C%20it's%20still%20an%20entire%20hour%20where%20users%20won't%20need%20to%20perform%20MFA.%20To%20add%2C%20requiring%20users%20to%20input%20password%20is%20a%20bad%20experience.%20We%20require%20MFA%20for%20the%20VPN%20connection%2C%20but%20not%20necessarily%20password.%3C%2FP%3E%3CP%3EIt%20isn't%20too%20late%2C%20I'm%20a%20big%20fan%20of%20RRAS%2C%20and%20a%20big%20fan%20of%20Azure%20MFA%20and%20Conditional%20Access.%20Get%20this%20out%20the%20door%20ASAP%20and%20save%20yourself%20a%20customer%20%3B)%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20mean%2C%20there%20are%20lots%20of%20other%20use%20cases%20where%20%22just%22%20ignoring%20logon%20is%20a%20policy%20nightmare.%20Password%20managers%2C%20identity%2Faccess%20management%20systems%2C%20internal%20documentation%2C%20etc.%20It%20shows%20some%20ignorance%20to%20customer%20demand%20if%20you%20%22just%22%20excuse%20the%20lack%20of%20MFA%20because%20there's%20a%20lot%20of%20conditions%20behind%20the%20scenes.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAzure%20MFA%20NPS%20Extension%20is%20the%20only%20alternative%2C%20and%20it's%20a%20bad%20experience.%20When%20initiating%20VPN%20connection%2C%20it%20simply%20idles%2C%20and%20there's%20no%20way%20for%20the%20user%20to%20know%20that%20they%20need%20to%20use%20the%20Authenticator%20app%20on%20their%20phone.%20It%20increases%20the%20need%20for%20education%2C%20and%20it%20requires%20the%20user%20to%20have%20Authenticator%20set%20up%20already%2C%20or%20it%20will%20just%20time%20out.%20As%20I%20said%2C%20it's%20a%20bad%20experience%2C%20whereas%20the%20WAM%20interactive%20sign-in%20dialog%20is%20much%20more%20user-friendly%20and%20can%20even%20get%20the%20user%20through%20Authenticator%20registration%20if%20needed.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1463205%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1463205%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F175162%22%20target%3D%22_blank%22%3E%40Michael%20Hildebrand%3C%2FA%3E%26nbsp%3Bthanks%20for%20the%20reply.%20I%20have%20voted%20and%20commented%20there%20per%20your%20suggestion.%20I%20will%20still%20shamelessly%20beg%20you%20to%20raise%20it%20with%20those%20who%20actually%20might%20consider%20it.%20You%20must%20know%20who%20that%20is%20to%20have%20gained%20the%20insight%20this%20article%20has.%20Just%20pointing%20them%20at%20that%20user%20voice%20could%20do%20alot%20to%20raise%20its%20profile.%20Cheers!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1463182%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1463182%22%20slang%3D%22en-US%22%3E%3CP%3EMan%20-%20I%20have%20some%20catching%20up%20to%20do%20here%20...%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EFilip%20-%20re%3A%20mirrored%20whiteboard%20-%20I%20tested%20it%20and%20I%20think%20you're%20right.%26nbsp%3B%20A%20darkened%20background%2C%20a%20bright%20pen%20color%20and%20'just%20the%20right%20angle.'%26nbsp%3B%20Plus%2C%20I%20have%20it%20on%20good%20authority%20that%20Stuart%20isn't%20left-handed.%26nbsp%3B%26nbsp%3B%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Fcool_40x40.gif%22%20alt%3D%22%3Acool%3A%22%20title%3D%22%3Acool%3A%22%20%2F%3E%3C%2FLI%3E%0A%3CLI%3EStefan%20-%20re%3A%20issue%20of%20stolen%20devices%20-%20physical%20possession%20of%20a%20device%20by%20an%20attacker%20opens%20up%20alot%20of%20'what%20ifs.'%26nbsp%3B%20I%20don't%20claim%20to%20have%20the%20perfect%20answer%20but%20there%20are%20several%20options%20I%20could%20think%20of%20-%20for%20starters%2C%20I%20did%20a%20quick%20test%20and%20I%20locked%20out%20my%20device%20w%2F%205-6%20failed%20PIN%20attempts%20-%20that%20is%20the%20initial%20control.%26nbsp%3B%20Further%2C%20one%20could%20issue%20a%20wipe%2Freset%20or%20reboot%20of%20the%20device%20via%20MDM%2Fmgmt%20tool%2C%20use%20the%20portals%2FPowerShell%20to%20revoke%2Finvalidate%20the%20tokens%2C%20disable%2Fdelete%20the%20device%20object%20in%20AAD%2C%20disable%20the%20user%2C%20and%2For%20reset%20the%20user's%20password.%3C%2FLI%3E%0A%3CLI%3EITEric%20and%20Kasper%20have%20similar%20comments%20-%20%22we%20need%20a%20per-app%20option%20to%20always%20require%20MFA%22%20-%20that%20requirement%20makes%20sense%20to%20me.%26nbsp%3B%20I%20am%20not%20'in%20the%20know'%20of%20plans%20for%20that%20but%20I%20did%20find%20a%20UserVoice%20item%20that%20seems%20to%20get%20at%20what%20you're%20needing%20(I%20see%20Kasper's%20prior%20comment%20there%20already)%20-%20take%20a%20look%20and%20vote%20it%20up%20(our%20PGs%20keep%20keen%20eyes%20on%20UserVoice)%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ffeedback.azure.com%2Fforums%2F169401-azure-active-directory%2Fsuggestions%2F33405382-option-to-enforce-authentication-every-time-you-ac%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Ffeedback.azure.com%2Fforums%2F169401-azure-active-directory%2Fsuggestions%2F33405382-option-to-enforce-authentication-every-time-you-ac%3C%2FA%3E%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1484192%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1484192%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%2C%20great%20article!%20All%20the%20stuff%20under%20dsregcmd%20%2Fstatus%20is%20endlessly%20confusing%20even%20after%20many%20attempts%20to%20learn%20it%20all%2C%20but%20this%20article%20helps%20a%20little!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1484358%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1484358%22%20slang%3D%22en-US%22%3E%3CP%3EHiya%20freds123%20-%20If%20you%20haven't%20seen%20these%2C%20have%20a%20look%3B%20they%20break%20down%20the%20elements%20in%20the%20output%20of%20DSREGCMD%20%2Fstatus%3A%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Ftroubleshoot-hybrid-join-windows-current%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Ftroubleshoot-hybrid-join-windows-current%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Ftroubleshoot-device-dsregcmd%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Ftroubleshoot-device-dsregcmd%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1449032%22%20slang%3D%22en-US%22%3E%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1449032%22%20slang%3D%22en-US%22%3E%3CP%3E%E2%80%9CMFA%E2%80%9D%20or%20%E2%80%98Multi-Factor%20Authentication%E2%80%99%20is%20a%20process%20where%20something%20more%20than%20just%20a%20username%20and%20password%20is%20required%20before%20granting%20access%20to%20a%20resource.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20could%20be%20a%20one-time%20code%20sent%20to%20a%20user%E2%80%99s%20cellphone%20via%20SMS%20text%2C%20a%20phone%20call%20to%20a%20user%E2%80%99s%20office%2Fdesk%20phone%2C%20a%20one-time%20code%20%E2%80%98pushed%E2%80%99%20to%20a%20mobile%20app%20on%20a%20cellphone%2C%20a%20code%20on%20a%20physical%20%E2%80%98fob%E2%80%99%20(also%20known%20as%20an%20OATH%20token%20or%20hard%20token).%26nbsp%3B%20More%20recently%2C%20biometrics%20have%20come%20into%20play%2C%20too%2C%20with%20MFA%20%E2%80%93%20perhaps%20you%20use%20your%20thumb%2Ffingerprint%20or%20a%20retina%20or%20face%20scan%2C%20instead%20of%20(or%20in%20addition%20to)%20a%20phone%20call%20or%20text.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20any%20event%2C%20your%20ID%20and%20password%20alone%20aren%E2%80%99t%20sufficient%20to%20access%20a%20system%2Fresource.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYou%E2%80%99ve%20likely%20set%20this%20up%20for%20bank%20accounts%2C%20credit%20cards%20or%20other%20financial%20transactions%20(and%20maybe%20even%20work%2C%20too).%26nbsp%3B%20This%20has%20helped%20make%20those%20services%2Ftransactions%20much%20more%20secure.%26nbsp%3B%20Now%2C%20if%20someone%20knows%2Fguesses%2Fbuys%20your%20password%20and%20email%20address%2C%20that%E2%80%99s%20%E2%80%98not%20enough%E2%80%99%20to%20get%20into%20your%20account.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%E2%80%99re%20going%20beyond%20MFA%2C%20too%2C%20where%20the%20idea%20is%20to%20not%20even%20require%20a%20password%20anymore%20%E2%80%93%20use%20other%20technologies%20to%20make%20sign-ins%20easier%20AND%20more%20secure%20-%20at%20the%20same%20time.%26nbsp%3B%20For%20example%2C%20below%2C%20our%20%E2%80%98passwordless%20sign-in%E2%80%99%20capability%20sends%20a%20prompt%20to%20the%20PC%20with%20a%20number%2C%20then%20moments%20later%2C%20the%20MS%20Authenticator%20app%20on%20a%20mobile%20device%20prompts%20for%20a%20number-match%2C%20followed%20by%20a%20biometric%3A%3C%2FP%3E%20%26nbsp%3B%3CP%3E%26nbsp%3B%26nbsp%3B%3C%2FP%3E%20%26nbsp%3B%3CP%3EStarting%20back%20with%20the%20-ERR%3AREF-NOT-FOUND-Jericho%20Forum%2C%20the%20corporate%20IT%20world%20has%20been%20moving%20towards%20a%20%E2%80%9C-ERR%3AREF-NOT-FOUND-zero%20trust%E2%80%9D%20model%20where%20Identity%20is%20the%20initial%20control%20point%20(vs%20the%20network%20perimeter%2Ffirewall).%26nbsp%3B%20This%20isn%E2%80%99t%20only%20your%20people%20(and%20their%20credentials)%20but%20the%20devices%20in%20your%20org%20also%20have%20an%20%E2%80%9Cidentity%E2%80%9D%20and%20are%20part%20of%20the%20access%20control%20system%2C%20usually%20completing%20mutual%20authentication%2C%20often%20based%20on%20PKI.%26nbsp%3B%20If%20you%20think%20about%20it%2C%20this%20makes%20sense%2C%20but%20is%20often%20taken%20for%20granted%20and%20it%20might%20not%20be%20obvious%20-%20a%20user%20needs%20a%20device%20to%20access%20a%20system%20or%20service.%26nbsp%3B%20We%E2%80%99re%20not%20yet%20able%20to%20plug%20humans%20directly%20into%20the%20Matrix.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHardware%20technology%20advances%20have%20made%20the%20Trusted%20Platform%20Module%20(TPM)%20or%20similar%20technology%20almost%20ubiquitous%20in%20PCs%20and%20mobile%20devices.%26nbsp%3B%20These%20provide%20a%20secure%20enclave%20for%20credential%20material%20that%20is%20ONLY%20present%2Fstored%2Favailable%20on%20a%20given%20device.%26nbsp%3B%20Information%20secured%20by%20a%20TPM%20isn%E2%80%99t%20technically%20exportable%20%E2%80%93%20if%20a%20TPM%20is%20used%20to%20secure%20a%20credential%2Fkey%20on%20a%20device%2C%20that%20credential%20only%20works%20on%20that%20given%20device.%20%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhile%20all%20this%20has%20been%20going%20on%2C%20teams%20at%20Microsoft%20continue%20to%20create%2Fdevelop%2Fiterate%20technologies%20and%20solutions%20such%20as%20Windows%2010%2C%20Windows%20Hello%20for%20Business%2C%20Azure%20AD%2C%20and%20on-prem%20Active%20Directory.%26nbsp%3B%20Further%2C%20this%20work%20includes%20on-going%20collaborative%20engineering%20between%20those%20teams.%26nbsp%3B%20As%20a%20result%2C%20we%20have%20some%20really%20great%20interoperability%20across%20our%20services%2Fproducts%20that%20you%20may%20or%20may%20not%20be%20aware%20of.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOne%20such%20integration%20occurs%20when%20a%20user%20signs-in%20to%20(or%20unlocks)%20a%20Windows%2010%20PC%20via%20Windows%20Hello%20for%20Business%20(WH4B)%20%E2%80%93%20screenshots%20below.%26nbsp%3B%20This%20quick%20and%20seemingly%20uneventful%20sign-in%20process%20results%20in%20the%20user%2FWindows%2010%20device%20obtaining%20a%20new%20type%20of%20cloud-aware%20credential%20from%20Azure%20AD%20known%20as%20a%20%E2%80%9CPrimary%20Refresh%20Token%E2%80%9D%20%E2%80%93%20or%20PRT.%26nbsp%3B%20This%20is%20similar%20to%20the%20idea%20of%20a%20Kerberos%20ticket%20you%E2%80%99d%20get%20on-prem%20from%20an%20AD%20Domain%20Controller%20running%20the%20KDC.%26nbsp%3B%20Before%20Kerberos%2C%20NTLM%20and%20Windows%20NT%20PDC%2FBDCs%20were%20the%20rage.%26nbsp%3B%20From%20the%20cloud-era%2C%20we%20add%20web%20authentication%2C%20tokens%20and%20Azure%20AD%20to%20the%20list%20of%20authentication%20systems.%26nbsp%3B%3C%2FP%3ESemi-related%20bonus%20link%20%E2%80%93%20-ERR%3AREF-NOT-FOUND-Stuart%20Kwan%E2%80%99s%20YouTube%20%E2%80%98authentication%20basics%E2%80%99%20vid%26nbsp%3B%20-%20P.S.%20I%E2%80%99ve%20still%20not%20figured%20out%20how%20the%20%E2%80%9Cmirrored%20%E2%80%93%20but%20transparent%E2%80%9D%20whiteboard%20he%20uses%20works.%20%26nbsp%3B%3CP%3E%26nbsp%3B%3C%2FP%3E%20%26nbsp%3B%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESubtle%20point%20%231%20%E2%80%93%20The%20act%20of%20signing%20in%20with%20Windows%20Hello%20for%20Business%20requires%20so%20little%20effort%20that%2C%20to%20most%20people%2C%20it%20seems%20like%20nothing%20happened%2C%20let%20alone%20a%20%E2%80%98strong%20authentication.%E2%80%99%3C%2FP%3E%3CP%3E%E2%80%9CThat%E2%80%99s%20it%3F%26nbsp%3B%20That%20seemed%20like%20it%20was%20even%20less%20secure%20than%20a%20password%3F%3F%26nbsp%3B%20Only%20a%20glance%20of%20my%20face%20or%20a%20short%20PIN%3F%3F%20How%20can%20that%20be%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fhello-for-business%2Fhello-why-pin-is-better-than-password%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Emore%20secure%20than%20a%20long%2C%20complex%20password%3F%E2%80%9D%3C%2FA%3E%20%26nbsp%3B%3C%2FP%3E%3CP%3ESubtle%20point%20%232%20-%20Windows%20Hello%20for%20Business%20sign-in%20is%20a%20form%20of%20MFA%3C%2FP%3ESomething%20your%20user%20has%20-%20that%20device.%26nbsp%3B%20Something%20your%20user%20knows%20(or%20is)%20%E2%80%93%20a%20PIN%20or%20a%20fingerprint%20or%20face%20scan%3CP%3ESubtle%20point%20%233%20%E2%80%93%20After%20Windows%20Hello%20for%20Business%20sign%20in%2C%20the%20PRT%20has%20an%20added%20element%20(or%20%E2%80%98claim%E2%80%99)%2C%20indicating%20that%20the%20user%20completed%20MFA.%3C%2FP%3E%3CP%3ESubtle%20point%20%234%20%E2%80%93%20Azure%20AD%20honors%20the%20MFA%20claim%20from%20WH4B%20sign-in%20-%20just%20as%20it%20would%20any%20other%20%E2%80%98typical%E2%80%99%20MFA%20(SMS%20text%2C%20phone%20call%2C%20etc.).%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3ESubtle%20point%20%235%20%E2%80%93%20The%20MFA%20claim%20will%20persist%20in%20the%20PRT%2C%20as%20long%20as%20the%20PRT%20remains%20valid.%26nbsp%3B%3C%2FP%3E%3CP%3ESubtle%20point%20%236%20%E2%80%93%20The%20Azure%20MFA%20service%20isn%E2%80%99t%20involved%20in%20this%20MFA%20process%20%E2%80%93%20so%2C%20if%20users%20don%E2%80%99t%2Fcan%E2%80%99t%20use%20cellphones%2C%20or%20the%20location%20doesn%E2%80%99t%20have%20good%20cell%20signal%2C%20or%20whatever%2C%20you%20can%20still%20have%20successful%20MFA%20(including%20AAD%20Conditional%20Access).%3C%2FP%3E%3CP%3ESubtle%20point%20%237%20%E2%80%93%20There%20are%20a%20lot%20of%20technologies%20interwoven%20with%20this%20and%20each%20has%20a%20lot%20of%20variables%20(device%20registration%20level%3B%20managed%20vs%20federated%3B%20TPM%20vs%20no%3B%20version%20of%20Win10%2C%20etc.).%26nbsp%3B%20I%E2%80%99m%20not%20attempting%20to%20go%20into%20the%20depths%20of%20these%20here%3B%20I%20am%20merely%20discussing%20the%20end-results%3B%20the%20fruits%20of%20your%20labor.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMore%20on%20the%20PRT%3C%2FP%3E%3CP%3EThis%20PRT%20has%20a%20variety%20of%20info%20about%20the%20user%20and%20the%20device%20%E2%80%93%20you%20can%20review%20the%20PRT%20from%20CMD%20or%20PowerShell%20console%3A%20DSREGCMD%20%2Fstatus%3C%2FP%3E%3CP%3EFor%20example%2C%20below%2C%20we%20see%20the%20device%20in%20the%20screen%20shots%20above%20is%20Azure%20AD%20Joined%20(%3D%20%E2%80%9CYES%E2%80%9D)%20and%20we%20see%20some%20of%20the%20information%20from%20the%20certificate%20the%20device%20obtained%20from%20AAD%20during%20the%20AAD%20Join%20process%3A%26nbsp%3B%3C%2FP%3ENOTE%3A%20The%20validity%20date%2Ftime%20here%20is%20for%20the%20certificate%20obtained%20during%20device%20registration%20%E2%80%93%20it%20is%20not%20the%20validity%20date%2Ftime%20for%20the%20PRT%20(that%E2%80%99s%20further%20below).%3CP%3E%3C%2FP%3E%3CP%3EWe%20can%20correlate%20that%20information%20with%20the%20AAD-issued%20certificate%20from%20the%20cert%20store%20on%20the%20device%20itself%3A%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3EWe%20can%20also%20see%20the%20validity%20and%20expiration%20dates%20for%20the%20PRT%20%E2%80%93%20however%2C%20the%20PRT%20will%20refresh%20if%20the%20device%20is%20in%20use%2C%20so%20the%20expiry%20time%20will%20continue%20to%20%E2%80%98slide%E2%80%99%20into%20the%20future.%3C%2FP%3EIMPORTANT%3A%20As%20the%20PRT%20is%20used%2Frefreshed%2C%20the%20MFA%20claim%20persists%20(if%20there%20is%20one).%26nbsp%3B%20See%20%E2%80%9CSubtle%20point%20%235%20above.%E2%80%9D%26nbsp%3B%3CP%3E%3C%2FP%3E%3CP%3E%E2%80%9CSo%20what%3F%E2%80%9D%3C%2FP%3E%3CP%3EWith%20this%20information%20in%20mind%2C%20you%20might%20be%20thinking%20just%20that%3A%20%E2%80%9CSo%3F%E2%80%9D%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%2C%20when%20this%20user%20attempts%20to%20access%20a%20resource%20that%20has%20an%20Azure%20AD%20Conditional%20Access%20Policy%20requiring%20MFA%2C%20Azure%20AD%20silently%20%E2%80%9Csees%E2%80%9D%20the%20PRT%20and%20the%20existing%20MFA%20claim%20%E2%80%93%20and%20the%20user%20won%E2%80%99t%20be%20prompted%20for%20MFA.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYour%20user%20MFA%E2%80%99d%20-%20without%20knowing%20it.%26nbsp%3B%20No%20pop-up.%26nbsp%3B%20No%20phone%20call.%26nbsp%3B%20No%20SMS%20code%20to%20put%20in.%26nbsp%3B%20Just%20the%20act%20of%20looking%20at%20the%20PC%20completed%20the%20MFA.%26nbsp%3B%20In%20terms%20of%20level%20of%20effort%2C%20is%20there%20anything%20easier%20than%20looking%20at%20something%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20is%20all%20due%20to%20the%20%E2%80%98under%20the%20covers%E2%80%99%20interop%20between%20Windows%2C%20the%20TPM%20hardware%2C%20Windows%20Hello%20for%20Business%2C%20Active%20Directory%20and%20Azure%20AD.%26nbsp%3B%20Here%E2%80%99s%20a%20special%20%E2%80%98shout-out%E2%80%99%20to%20those%20people%20in%20the%20Microsoft%20Product%20Groups%20who%20made%20this%20possible.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENow%2C%20be%20honest.%26nbsp%3B%20Did%20you%20know%20that%3F%26nbsp%3B%20I%20bet%20at%20least%20some%20of%20you%20didn%E2%80%99t.%26nbsp%3B%20Sure%2C%20you%20may%20have%20seen%20the%20behavior%20-%20and%20possibly%20even%20been%20puzzled%20by%20it.%26nbsp%3B%20Hence%2C%20the%20title%20of%20this%20post.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%E2%80%9CWRONG%20Hilde.%26nbsp%3B%20Wrong.%26nbsp%3B%20SO%20wrong.%26nbsp%3B%20I%20don%E2%80%99t%20have%20Windows%20Hello%20for%20Business%20setup%20and%20my%20users%20are%20still%20not%20getting%20MFA%E2%80%99d%20as%20expected%3F%E2%80%9D%3C%2FP%3E%3CP%3EOk%2C%20not%20everyone%20is%20using%20Windows%20Hello%20for%20Business%20yet.%26nbsp%3B%20However%2C%20recall%20the%20PRT.%26nbsp%3B%20It%E2%80%99s%20not%20the%20%E2%80%9CWindows%20Hello%20for%20Business%20PRT%E2%80%9D%20it%E2%80%99s%20just%20%E2%80%9Cthe%20PRT.%E2%80%9D%26nbsp%3B%20The%20PRT%20and%20%E2%80%9CModern%20Authentication%E2%80%9D%20makes%20end-user%E2%80%99s%20lives%20easier%2C%20even%20without%20Windows%20Hello%20for%20Business.%3C%2FP%3E%3CP%3ELet%E2%80%99s%20look%20at%20the%20same%20scenario%20but%20without%20WH4B.%26nbsp%3B%20A%20user%20signs%20into%20a%20Hybrid%20AAD%20Joined%20Windows%2010%20PC%20with%20a%20username%20and%20password.%26nbsp%3B%20The%20user%20attempts%20to%20access%20a%20resource%20that%20has%20the%20same%20AAD%20Conditional%20Access%20Policy%20requiring%20MFA%20as%20our%20prior%20example.%26nbsp%3B%20The%20first%20time%20that%20access%20attempt%20happens%2C%20AAD%20sees%20the%20PRT%20but%20it%20does%20NOT%20have%20the%20MFA%20claim%20(no%20Windows%20Hello%20for%20Business%20and%20no%20prior%20MFA).%26nbsp%3B%20As%20part%20of%20the%20authorization%20(authZ)%20that%20comes%20from%20the%20AAD%20CA%20policy%20processing%2C%20the%20%E2%80%98require%20MFA%E2%80%99%20control%20fires%20off%20%E2%80%93%20and%20the%20user%20gets%20an%20MFA%20prompt.%26nbsp%3B%20Assuming%20the%20user%20completes%20the%20MFA%2C%20AAD%20%E2%80%9Cstamps%E2%80%9D%20the%20PRT%20with%20the%20MFA%20claim.%26nbsp%3B%20Now%2C%20going%20forward%2C%20on%20subsequent%20access%20attempts%20requiring%20MFA%2C%20AAD%20sees%20the%20PRT%20with%20the%20MFA%20claim%20and%20says%20%E2%80%98I%20see%20you%20already%20did%20your%20MFA.%26nbsp%3B%20I%20won%E2%80%99t%20prompt%20you%20again.%E2%80%99%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%E2%80%9CIf%20that%E2%80%99s%20the%20MFA%20dream%2C%20I%E2%80%99m%20living%20the%20MFA%20nightmare.%26nbsp%3B%20I%E2%80%99m%20not%20even%20getting%20MFA%E2%80%99d%20when%20I%20access%20the%20app%20the%20first%20time%3F%3F%26nbsp%3B%20Either%20Azure%20MFA%20is%20broken%2C%20or%20my%20CA%20Policy%20is%20jacked%20up.%E2%80%9D%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3EThere%20is%20one%20more%20interplay%20of%20technologies%20we%E2%80%99ll%20cover%20here%20for%20this%20PRT%20%2B%20MFA%20business%20%E2%80%A6%20and%20that%20is%20device%20registration.%26nbsp%3B%20If%20you%20register%2Fjoin%20a%20device%20to%20AAD%20(i.e.%20Intune%20enrollment%20or%20setting%20up%20the%20MS%20Authenticator)%20and%20there%20is%20an%20MFA%20tied%20to%20that%20device%20join%2Fregistration%20process%2C%20that%20establishes%20this%20device-bound%20strong%20authentication%20(PRT%20%2B%20MFA%20claim).%26nbsp%3B%20From%20that%20point%20forward%2C%20from%20that%20device%2C%20AAD%20will%20see%20the%20PRT%20and%20the%20MFA%20claim%20-%20and%20honor%20it.%26nbsp%3B%20Silently.%26nbsp%3B%20That%20user%20will%20get%20few%20(if%20any)%20MFA%20prompts%20afterwards%20%E2%80%93%20until%20a%20password%20change%20or%20the%20device%20isn%E2%80%99t%20used%20for%20a%20while%20(the%20PRT%20expires%20on%20its%20own%20after%2014%20days%20of%20inactivity%20but%20it%E2%80%99s%20continually%20refreshed%20if%20it%E2%80%99s%20in%20use).%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%E2%80%9CWait%3F%26nbsp%3B%20I%20don%E2%80%99t%20get%20re-MFA%E2%80%99d%3F%3F%26nbsp%3B%20One%20MFA%20prompt%20and%20that%E2%80%99s%20it!%3F%26nbsp%3B%20I%20paid%20good%20money%20for%20this%20%E2%80%93%20I%20want%20my%20prompts!%E2%80%9D%26nbsp%3B%3C%2FP%3E%3CP%3EHang%20on%20%E2%80%A6%20let%E2%80%99s%20review%20some%20of%20the%20conditions%20that%20need%20to%20be%20met%20for%20Windows%2010%20to%20obtain%20that%20PRT%20with%20the%20MFA%20claim%3A%3C%2FP%3ETHAT%20specific%20device%20(the%20PRT%20is%20not%20exportable%20and%20is%20bound%20to%20a%20single%2C%20specific%20device)%20THAT%20user%E2%80%99s%20completion%20of%20a%20prior%20%E2%80%98strong%E2%80%99%20authentication%2C%20from%20THAT%20device%3F%26nbsp%3B%20Check.%20Which%20means%20the%20user%20successfully%20logged%20in%20AND%20completed%20an%20MFA%3F%26nbsp%3B%20Check.%20THAT%20device%20has%20been%20successfully%20AAD%20registered%20(at%20least)%20or%20AAD%20Joined%20or%20Hybrid%20AAD%20joined%3F%26nbsp%3B%20Check.%20Which%20means%20it%20has%20requested%20and%20obtained%20a%20device%20certificate%20from%20AAD%3F%20%26nbsp%3BCheck.%20Which%20means%20it%20has%20been%20successfully%20AD%20joined%3F%26nbsp%3B%20In%20the%20case%20of%20Hybrid%20AADJ%2C%20check.%20THAT%20device%20obtained%20a%20symmetrically%20encrypted%20session%20key%20from%20AAD%3F%26nbsp%3B%20Check.%3CP%3ETo%20me%2C%20that%E2%80%99s%20more%20than%20%E2%80%98good%20enough.%E2%80%99%26nbsp%3B%20There%20is%20more%20technical%20depth%20to%20it%2C%20but%20I%20think%20you%20get%20the%20point.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDon%E2%80%99t%20take%20my%20word%20for%20it%20though.%26nbsp%3B%20Recently%2C%20a%20large%20customer%20of%20mine%20(180k%20users%20in%20AAD)%20expressed%20significant%20angst%20when%20their%20users%20weren%E2%80%99t%20getting%20MFA%E2%80%99d%20as%20they%E2%80%99d%20expected%20(that%20convo%20was%20the%20tipping%20point%20for%20me%20finishing%2Fpublishing%20this%20post).%26nbsp%3B%20Once%20I%20explained%20what%E2%80%99s%20really%20going%20on%20under%20the%20covers%2C%20they%20realized%20the%20strength%20of%20Modern%20Authentication%20and%20their%20angst%20turned%20to%20glee.%26nbsp%3B%20There%20should%20be%20more%20glee%20in%20IT.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMore%20depth%20(these%20are%20excellent%20docs%2C%20by%20the%20way)%3A%20%26nbsp%3B%3C%2FP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Fconcept-primary-refresh-token%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Fconcept-primary-refresh-token%3C%2FA%3E%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fhello-for-business%2Fhello-how-it-works-device-registration%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fhello-for-business%2Fhello-how-it-works-device-registration%3C%2FA%3E%3CP%3EA%20few%20FAQs%3A%3C%2FP%3EQ%20%E2%80%93%20You%20explained%20that%20a%20PRT%20is%20a%20long-lived%20credential%20%E2%80%93%20how%20long%20lived%3F%26nbsp%3B%20When%20do%20I%20get%20a%20new%20one%3F%20A%20%E2%80%93%20As%20discussed%20above%2C%20the%20PRT%20is%20only%20issued%20after%20strong%20authentication%2C%20so%20it%20is%20indeed%20a%20long-lived%20credential.%26nbsp%3B%20Honestly%2C%20if%20you%20think%20about%20it%2C%20obtaining%20a%20PRT%20is%20WWWAAAYYYY%20stronger%20than%20setting%20a%20password.%26nbsp%3B%20It%20is%20refreshed%20every%204%20hours%2C%20expires%20after%2014%20days%20(if%20un-used).%26nbsp%3B%20It%20is%20invalidated%20when%20the%20user%E2%80%99s%20password%20changes%2C%20the%20user%20or%20device%20is%20deleted%20or%20disabled.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Fconcept-primary-refresh-token%23how-is-a-prt-invalidated%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fdevices%2Fconcept-primary-refresh-token%23how-is-a-prt-invalidated%3C%2FA%3E%26nbsp%3B%3CP%3E%26nbsp%3B%3C%2FP%3EQ%20-%20What%20about%20MacOS%2C%20mobile%2C%20etc%3F%26nbsp%3B%20Does%20a%20PRT%20get%20used%20by%20those%3F%26nbsp%3B%20A%20%E2%80%93%20I%E2%80%99m%20not%20very%20deep%20in%20those%20platforms%20but%20rather%20than%20punt%20and%20say%2C%20%E2%80%98out%20of%20scope%20for%20this%20post%2C%E2%80%99%20I%E2%80%99ll%20offer%20a%20high-level%2C%20non-developer%20answer.%26nbsp%3B%20We%20embed%20the%20AAD%20authentication%20code%20or%20%E2%80%98libraries%E2%80%99%20(-ERR%3AREF-NOT-FOUND-MSAL)%20into%20certain%20apps%20to%20%E2%80%9Cbroker%E2%80%9D%20this%20authentication%2FSSO%2FPRT%2FMFA%20activity.%26nbsp%3B%20Apps%20such%20as%20the%20Intune%20Company%20Portal%2C%20the%20MS%20Authenticator%2C%20as%20well%20as%20newer%20Office%20for%20Mac%20and%20Office%20Mobile%20apps%20can%20serve%20as%20broker%20apps.%26nbsp%3B%20As%20we%E2%80%99ve%20discussed%2C%20strong%20authentication%20is%20tied%20to%20a%20specific%20device%2C%20so%20it%20requires%20device%20registration%20-%20which%20is%20why%20setting%20up%20the%20MS%20Authenticator%20app%20or%20connecting%20Outlook%20to%20your%20mailbox%20may%20require%20device%20registration%20in%20AAD.%26nbsp%3B%20These%20authentication%20libraries%2Fcode%20can%20provide%20your%20Mac%2Fmobile%20users%20a%20similar%20%E2%80%98easy%20to%20use%2C%20yet%20secure%E2%80%99%20experience.%26nbsp%3B%3CP%3E%26nbsp%3B%3C%2FP%3EQ%20%E2%80%93%20What%20about%20the%20%E2%80%98Sign-In%20Frequency%E2%80%99%20setting%20in%20AAD%3F%26nbsp%3B%20Can%E2%80%99t%20I%20use%20that%20to%20force%20a%20re-MFA%3F%26nbsp%3B%20I%20really%20need%20to%20re-prompt%20my%20users.%20A%20%E2%80%93%20We%E2%80%99ve%20heard%20that%20feedback%20%E2%80%93%20some%20customer-requirements%20dictate%20more%20%E2%80%98active%E2%80%99%20re-prompting%20of%20users.%26nbsp%3B%20Silently%20extending%20the%20PRT%20and%20the%20MFA%20claim%20isn%E2%80%99t%20always%20acceptable.%26nbsp%3B%20So%2C%20we%20improved%20the%20Sign-In%20Frequency%20control%20in%20AAD%20to%20also%20apply%20to%20the%20MFA.%26nbsp%3B%20For%20example%2C%20if%20I%20use%20that%20setting%20to%20force%20a%20re-auth%20every%20four%20hours%2C%20in%20most%20cases.%20that%20will%20include%20a%20re-entry%20for%20password%20and%20a%20re-prompt%20for%20MFA.%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fmanage-authentication-sessions-in-azure-ad-conditional-access-is%2Fba-p%2F1421687%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fmanage-authentication-sessions-in-azure-ad-conditional-access-is%2Fba-p%2F1421687%3C%2FA%3E%3CP%3E%26nbsp%3B%3C%2FP%3EQ%20%E2%80%93%20I%20like%20the%20simplicity%20of%20Windows%20Hello%20for%20Business%20and%20passwordless%20but%20we%20have%20dozens%20of%20shift%20workers%20who%20sign%20in%20to%20shared%20devices%20and%20can%E2%80%99t%20use%20cellphones%20%E2%80%93%20what%20hope%20do%20we%20have%3F%26nbsp%3B%20A%20%E2%80%93%20There%20are%20multiple%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fauthentication%2Fconcept-authentication-passwordless%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Esolutions%20for%20passwordless%20sign%20in%3C%2FA%3E.%26nbsp%3B%20Liju%E2%80%99s%20-ERR%3AREF-NOT-FOUND-recent%20post%20here%2C%20covers%20FIDO2%20keys.%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20hope%20this%20helped%20shed%20some%20light%20on%20a%20topic%20that%20comes%20up%20very%20frequently.%26nbsp%3B%20If%20you%20weren%E2%80%99t%20aware%20of%20these%20layers%20of%20technology%20working%20together%20to%20help%20keep%20your%20users%20happier%20(easier%20logins%3B%20fewer%20pop-ups)%20and%20your%20org%20more%20secure%20(strong%2C%20compound%20authentication)%2C%20now%20you%20know.%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EA%20special%20thanks%20to%20several%20who%20helped%20in%20discussions%20around%20this%20topic%3A%20Ross%2C%20Amit%2C%20Ravi%2C%20Daniel%2C%20Dale%20Kim%2C%20Paul%20Bowden%20and%20JJ%20Streicher-Bremer.%26nbsp%3B%20Those%20people%20were%20invaluable%20in%20the%20formation%2Freview%20of%20this%20post%20and%20brought%20up%20some%20points%20that%20I%20wanted%20to%20share%2Fremind%3A%3C%2FP%3EOur%20official%20docs%20are%20just%20that%20%E2%80%93%20official%20docs%20w%2F%20rigor%20and%20teams%20of%20people%20working%20to%20update%2Fimprove%20them%20as%20their%20%E2%80%98day-job.%E2%80%99%26nbsp%3B%20Official%20docs%20are%20usually%20very%20specific%20and%20scoped%20to%20a%20certain%20feature%2Fcapability%20and%20as%20a%20result%2C%20often%20don%E2%80%99t%2Fcan%E2%80%99t%20cover%20how%20multiple%20features%2Fcapabilities%20work%20together%20to%20form%20a%20%E2%80%98solution%E2%80%99%20or%20address%20a%20%E2%80%98real%20world%E2%80%99%20scenario.%26nbsp%3B%20You%2C%20as%20the%20consumer%20of%20those%20docs%2C%20have%20to%20synthesize%20that%20information%20as%20you%20design%20your%20solution.%26nbsp%3B%20Microsoft%20docs%20are%20very%20good%20and%20are%20continually%20clarified%20and%20updated%2Ftweaked%2Fedited%20as%20wording%20is%20improved%2C%20mistakes%20are%20fixed%20and%20capabilities%20change.%26nbsp%3B%20Plus%2C%20similar%20to%20blogs%2C%20they%20are%20open%20for%20comments%2Ffeedback.%20Blogs%20%E2%80%93%20whether%20hosted%20behind%20a%20%E2%80%98microsoft.com%E2%80%99%20address%20or%20elsewhere%20-%20are%20not%20official%20docs.%26nbsp%3B%20They%20are%20usually%20%E2%80%98passion%20projects%E2%80%99%20by%20people%20who%20want%20to%20communicate%20with%20peers%20and%20share%20knowledge%20and%20experiences.%26nbsp%3B%20Blog%20authors%20put%20a%20lot%20of%20time%2Frigor%20into%20their%20posts%20but%20by%20the%20nature%20of%20a%20blog%20post%2C%20it%E2%80%99s%20usually%20not%20an%20official%20doc.%26nbsp%3B%20Further%2C%20more%20often%20than%20not%2C%20a%20blog%20post%20is%20a%20%E2%80%98point%20in%20time%E2%80%99%20article%20that%20grows%20stale%20over%20time%20(sometimes%2C%20quickly).%26nbsp%3B%20Capabilities%20described%20in%20a%20blog%20may%20change%20over%20time%3B%20the%20docs%20for%20those%20capabilities%20will%20be%20updated%20but%20a%20blog%20likely%20won%E2%80%99t%20be%20(I%20know%20if%20you%20look%20at%20my%20older%20blog%20posts%20here%2C%20some%20have%20not%20aged%20very%20well%20%E2%98%B9%20and%20I%E2%80%99m%20too%20lazy%20to%20go%20update%20them%20all).%26nbsp%3B%26nbsp%3B%20Why%20am%20I%20stating%20the%20obvious%3F%26nbsp%3B%20Two%20reasons%3A%3CP%3E1)%26nbsp%3B%20It%E2%80%99s%20good%20to%20remind%20people%20that%20%E2%80%9Cblogs%20aren%E2%80%99t%20docs%E2%80%9D%20-%20even%20though%20I%20work%20for%20Microsoft%2C%20in%20a%20technical%20role%2C%20and%20I%20try%20REALLY%20hard%20to%20make%20my%20posts%20accurate%20and%20complete%2C%20these%20blogs%20are%20my%20own%20thoughts%2Fopinions%2Fexperiences.%26nbsp%3B%20They%E2%80%99re%20not%20official%20docs.%26nbsp%3B%20I%20try%20to%20provide%20information%20that%20can%20help%20in%20understanding%2Fusing%20technology%20but%20%E2%80%9Cyour%20mileage%20may%20vary.%E2%80%9D%3C%2FP%3E%3CP%3E2)%26nbsp%3B%20There%20have%20been%20instances%20where%20%E2%80%9CMicrosoft%20blogs%E2%80%9D%20differ%20from%20%E2%80%9CMicrosoft%20docs%E2%80%9D%20-%20and%20this%20has%20caused%20confusion%20%E2%80%93%20or%20worse.%26nbsp%3B%20How%20things%20work%20%E2%80%98today%E2%80%99%20may%20not%20be%20how%20things%20work%20%E2%80%98tomorrow.%E2%80%99%26nbsp%3B%20Change%20is%20constant.%26nbsp%3B%20Do%20your%20due%20diligence.%26nbsp%3B%20Use%20your%20best%20judgement.%26nbsp%3B%20Test.%26nbsp%3B%20Test%20again.%26nbsp%3B%20Read%20blogs.%26nbsp%3B%20Read%20docs.%26nbsp%3B%20And%20as%20my%20dad%20used%20to%20say%2C%20%E2%80%9CDon%E2%80%99t%20believe%20everything%20you%20read.%E2%80%9D%20%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHildePRT%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1449032%22%20slang%3D%22en-US%22%3E%3CP%3EMany%20of%20us%20have%20been%20asked%20this%20many%2C%20many%20times%20...%20in%20this%20post%2C%20I'll%20provide%20some%20clarity.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1449032%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMichael%20Hildebrand%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1792384%22%20slang%3D%22en-US%22%3ERe%3A%20%E2%80%9CWhy%20are%20my%20users%20not%20prompted%20for%20MFA%20as%20expected%3F%E2%80%9D%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1792384%22%20slang%3D%22en-US%22%3E%3CP%3ENice%20work%20all%2C%20very%20good%20article%20indeed!%20Explains%20a%20thing%20or%20two%20I%20noticed%20in%20my%20lab%20yesterday...%20%3Agrinning_face_with_sweat%3A%3C%2FP%3E%0A%3CP%3EThanks%20for%20sharing!%3C%2FP%3E%3C%2FLINGO-BODY%3E

“MFA” or ‘Multi-Factor Authentication’ is a process where something more than just a username and password is required before granting access to a resource.

 

This could be a one-time code sent to a user’s cellphone via SMS text, a phone call to a user’s office/desk phone, a one-time code ‘pushed’ to a mobile app on a cellphone, a code on a physical ‘fob’ (also known as an OATH token or hard token).  More recently, biometrics have come into play, too, with MFA – perhaps you use your thumb/fingerprint or a retina or face scan, instead of (or in addition to) a phone call or text.

 

In any event, your ID and password alone aren’t sufficient to access a system/resource.

 

You’ve likely set this up for bank accounts, credit cards or other financial transactions (and maybe even work, too).  This has helped make those services/transactions much more secure.  Now, if someone knows/guesses/buys your password and email address, that’s ‘not enough’ to get into your account. 

 

We’re going beyond MFA, too, where the idea is to not even require a password anymore – use other technologies to make sign-ins easier AND more secure - at the same time.  For example, below, our ‘passwordless sign-in’ capability sends a prompt to the PC with a number, then moments later, the MS Authenticator app on a mobile device prompts for a number-match, followed by a biometric:

 

image.png image.png image.png

 

Starting back with the Jericho Forum, the corporate IT world has been moving towards a “zero trust” model where Identity is the initial control point (vs the network perimeter/firewall).  This isn’t only your people (and their credentials) but the devices in your org also have an “identity” and are part of the access control system, usually completing mutual authentication, often based on PKI.  If you think about it, this makes sense, but is often taken for granted and it might not be obvious - a user needs a device to access a system or service.  We’re not yet able to plug humans directly into the Matrix. 

 

Hardware technology advances have made the Trusted Platform Module (TPM) or similar technology almost ubiquitous in PCs and mobile devices.  These provide a secure enclave for credential material that is ONLY present/stored/available on a given device.  Information secured by a TPM isn’t technically exportable – if a TPM is used to secure a credential/key on a device, that credential only works on that given device.     

 

While all this has been going on, teams at Microsoft continue to create/develop/iterate technologies and solutions such as Windows 10, Windows Hello for Business, Azure AD, and on-prem Active Directory.  Further, this work includes on-going collaborative engineering between those teams.  As a result, we have some really great interoperability across our services/products that you may or may not be aware of. 

 

One such integration occurs when a user signs-in to (or unlocks) a Windows 10 PC via Windows Hello for Business (WH4B) – screenshots below.  This quick and seemingly uneventful sign-in process results in the user/Windows 10 device obtaining a new type of cloud-aware credential from Azure AD known as a “Primary Refresh Token” – or PRT.  This is similar to the idea of a Kerberos ticket you’d get on-prem from an AD Domain Controller running the KDC.  Before Kerberos, NTLM and Windows NT PDC/BDCs were the rage.  From the cloud-era, we add web authentication, tokens and Azure AD to the list of authentication systems. 

 

image.png image.png

 

 

Subtle point #1 – The act of signing in with Windows Hello for Business requires so little effort that, to most people, it seems like nothing happened, let alone a ‘strong authentication.’

“That’s it?  That seemed like it was even less secure than a password??  Only a glance of my face or a short PIN?? How can that be more secure than a long, complex password?”  

Subtle point #2 - Windows Hello for Business sign-in is a form of MFA

  • Something your user has - that device. 
  • Something your user knows (or is) – a PIN or a fingerprint or face scan

Subtle point #3 – After Windows Hello for Business sign in, the PRT has an added element (or ‘claim’), indicating that the user completed MFA.

Subtle point #4 – Azure AD honors the MFA claim from WH4B sign-in - just as it would any other ‘typical’ MFA (SMS text, phone call, etc.).   

Subtle point #5 – The MFA claim will persist in the PRT, as long as the PRT remains valid. 

Subtle point #6 – The Azure MFA service isn’t involved in this MFA process – so, if users don’t/can’t use cellphones, or the location doesn’t have good cell signal, or whatever, you can still have successful MFA (including AAD Conditional Access).

Subtle point #7 – There are a lot of technologies interwoven with this and each has a lot of variables (device registration level; managed vs federated; TPM vs no; version of Win10, etc.).  I’m not attempting to go into the depths of these here; I am merely discussing the end-results; the fruits of your labor.

 

More on the PRT

This PRT has a variety of info about the user and the device – you can review the PRT from CMD or PowerShell console: DSREGCMD /status

For example, below, we see the device in the screen shots above is Azure AD Joined (= “YES”) and we see some of the information from the certificate the device obtained from AAD during the AAD Join process: 

  • NOTE: The validity date/time here is for the certificate obtained during device registration – it is not the validity date/time for the PRT (that’s further below).

image.png

We can correlate that information with the AAD-issued certificate from the cert store on the device itself:

image.png

We can also see the validity and expiration dates for the PRT – however, the PRT will refresh if the device is in use, so the expiry time will continue to ‘slide’ into the future.

  • IMPORTANT: As the PRT is used/refreshed, the MFA claim persists (if there is one).  See “Subtle point #5 above.” 

image.png

“So what?”

With this information in mind, you might be thinking just that: “So?” 

 

So, when this user attempts to access a resource that has an Azure AD Conditional Access Policy requiring MFA, Azure AD silently “sees” the PRT and the existing MFA claim – and the user won’t be prompted for MFA

 

Your user MFA’d - without knowing it.  No pop-up.  No phone call.  No SMS code to put in.  Just the act of looking at the PC completed the MFA.  In terms of level of effort, is there anything easier than looking at something?

 

This is all due to the ‘under the covers’ interop between Windows, the TPM hardware, Windows Hello for Business, Active Directory and Azure AD.  Here’s a special ‘shout-out’ to those people in the Microsoft Product Groups who made this possible. 

 

Now, be honest.  Did you know that?  I bet at least some of you didn’t.  Sure, you may have seen the behavior - and possibly even been puzzled by it.  Hence, the title of this post. 

 

“WRONG Hilde.  Wrong.  SO wrong.  I don’t have Windows Hello for Business setup and my users are still not getting MFA’d as expected?”

Ok, not everyone is using Windows Hello for Business yet.  However, recall the PRT.  It’s not the “Windows Hello for Business PRT” it’s just “the PRT.”  The PRT and “Modern Authentication” makes end-user’s lives easier, even without Windows Hello for Business.

Let’s look at the same scenario but without WH4B.  A user signs into a Hybrid AAD Joined Windows 10 PC with a username and password.  The user attempts to access a resource that has the same AAD Conditional Access Policy requiring MFA as our prior example.  The first time that access attempt happens, AAD sees the PRT but it does NOT have the MFA claim (no Windows Hello for Business and no prior MFA).  As part of the authorization (authZ) that comes from the AAD CA policy processing, the ‘require MFA’ control fires off – and the user gets an MFA prompt.  Assuming the user completes the MFA, AAD “stamps” the PRT with the MFA claim.  Now, going forward, on subsequent access attempts requiring MFA, AAD sees the PRT with the MFA claim and says ‘I see you already did your MFA.  I won’t prompt you again.’

 

“If that’s the MFA dream, I’m living the MFA nightmare.  I’m not even getting MFA’d when I access the app the first time??  Either Azure MFA is broken, or my CA Policy is jacked up.”   

There is one more interplay of technologies we’ll cover here for this PRT + MFA business … and that is device registration.  If you register/join a device to AAD (i.e. Intune enrollment or setting up the MS Authenticator) and there is an MFA tied to that device join/registration process, that establishes this device-bound strong authentication (PRT + MFA claim).  From that point forward, from that device, AAD will see the PRT and the MFA claim - and honor it.  Silently.  That user will get few (if any) MFA prompts afterwards – until a password change or the device isn’t used for a while (the PRT expires on its own after 14 days of inactivity but it’s continually refreshed if it’s in use).  

 

“Wait?  I don’t get re-MFA’d??  One MFA prompt and that’s it!?  I paid good money for this – I want my prompts!” 

Hang on … let’s review some of the conditions that need to be met for Windows 10 to obtain that PRT with the MFA claim:

  • THAT specific device (the PRT is not exportable and is bound to a single, specific device)
  • THAT user’s completion of a prior ‘strong’ authentication, from THAT device?  Check.
    • Which means the user successfully logged in AND completed an MFA?  Check.
  • THAT device has been successfully AAD registered (at least) or AAD Joined or Hybrid AAD joined?  Check.
    • Which means it has requested and obtained a device certificate from AAD?  Check.
    • Which means it has been successfully AD joined?  In the case of Hybrid AADJ, check.
  • THAT device obtained a symmetrically encrypted session key from AAD?  Check.

To me, that’s more than ‘good enough.’  There is more technical depth to it, but I think you get the point. 

 

Don’t take my word for it though.  Recently, a large customer of mine (180k users in AAD) expressed significant angst when their users weren’t getting MFA’d as they’d expected (that convo was the tipping point for me finishing/publishing this post).  Once I explained what’s really going on under the covers, they realized the strength of Modern Authentication and their angst turned to glee.  There should be more glee in IT.

 

More depth (these are excellent docs, by the way):  

A few FAQs:

  • Q – You explained that a PRT is a long-lived credential – how long lived?  When do I get a new one?
  • A – As discussed above, the PRT is only issued after strong authentication, so it is indeed a long-lived credential.  Honestly, if you think about it, obtaining a PRT is WWWAAAYYYY stronger than setting a password.  It is refreshed every 4 hours, expires after 14 days (if un-used).  It is invalidated when the user’s password changes, the user or device is deleted or disabled.

 

  • Q - What about MacOS, mobile, etc?  Does a PRT get used by those? 
  • A – I’m not very deep in those platforms but rather than punt and say, ‘out of scope for this post,’ I’ll offer a high-level, non-developer answer. 
    • We embed the AAD authentication code or ‘libraries’ (MSAL) into certain apps to “broker” this authentication/SSO/PRT/MFA activity.  Apps such as the Intune Company Portal, the MS Authenticator, as well as newer Office for Mac and Office Mobile apps can serve as broker apps.  As we’ve discussed, strong authentication is tied to a specific device, so it requires device registration - which is why setting up the MS Authenticator app or connecting Outlook to your mailbox may require device registration in AAD.  These authentication libraries/code can provide your Mac/mobile users a similar ‘easy to use, yet secure’ experience. 

 

  • Q – What about the ‘Sign-In Frequency’ setting in AAD?  Can’t I use that to force a re-MFA?  I really need to re-prompt my users.
  • A – We’ve heard that feedback – some customer-requirements dictate more ‘active’ re-prompting of users.  Silently extending the PRT and the MFA claim isn’t always acceptable.  So, we improved the Sign-In Frequency control in AAD to also apply to the MFA.  For example, if I use that setting to force a re-auth every four hours, in most cases. that will include a re-entry for password and a re-prompt for MFA.  https://techcommunity.microsoft.com/t5/azure-active-directory-identity/manage-authentication-session...

 

  • Q – I like the simplicity of Windows Hello for Business and passwordless but we have dozens of shift workers who sign in to shared devices and can’t use cellphones – what hope do we have? 
  • A – There are multiple solutions for passwordless sign in.  Liju’s recent post here, covers FIDO2 keys.

 

I hope this helped shed some light on a topic that comes up very frequently.  If you weren’t aware of these layers of technology working together to help keep your users happier (easier logins; fewer pop-ups) and your org more secure (strong, compound authentication), now you know.   

 

A special thanks to several who helped in discussions around this topic: Ross, Amit, Ravi, Daniel, Dale Kim, Paul Bowden and JJ Streicher-Bremer.  Those people were invaluable in the formation/review of this post and brought up some points that I wanted to share/remind:

  • Our official docs are just that – official docs w/ rigor and teams of people working to update/improve them as their ‘day-job.’  Official docs are usually very specific and scoped to a certain feature/capability and as a result, often don’t/can’t cover how multiple features/capabilities work together to form a ‘solution’ or address a ‘real world’ scenario.  You, as the consumer of those docs, have to synthesize that information as you design your solution.  Microsoft docs are very good and are continually clarified and updated/tweaked/edited as wording is improved, mistakes are fixed and capabilities change.  Plus, similar to blogs, they are open for comments/feedback.
  • Blogs – whether hosted behind a ‘microsoft.com’ address or elsewhere - are not official docs.  They are usually ‘passion projects’ by people who want to communicate with peers and share knowledge and experiences.  Blog authors put a lot of time/rigor into their posts but by the nature of a blog post, it’s usually not an official doc.  Further, more often than not, a blog post is a ‘point in time’ article that grows stale over time (sometimes, quickly).  Capabilities described in a blog may change over time; the docs for those capabilities will be updated but a blog likely won’t be (I know if you look at my older blog posts here, some have not aged very well ☹ and I’m too lazy to go update them all).  
  • Why am I stating the obvious?  Two reasons:

1)  It’s good to remind people that “blogs aren’t docs” - even though I work for Microsoft, in a technical role, and I try REALLY hard to make my posts accurate and complete, these blogs are my own thoughts/opinions/experiences.  They’re not official docs.  I try to provide information that can help in understanding/using technology but “your mileage may vary.”

2)  There have been instances where “Microsoft blogs” differ from “Microsoft docs” - and this has caused confusion – or worse.  How things work ‘today’ may not be how things work ‘tomorrow.’  Change is constant.  Do your due diligence.  Use your best judgement.  Test.  Test again.  Read blogs.  Read docs.  And as my dad used to say, “Don’t believe everything you read.” :smile:   

 

HildePRT      

 

 

9 Comments
Regular Visitor

Thank you for the great content!

The video in the YouTube link is mirrored, no magic whiteboard involved :)

Senior Member

Hi Michael,

Great post! I indeed did not know about the MFA & PRT validity period.

I'm curious. What's your view on not having to fulfill MFA and the device gets stolen?

 

Occasional Contributor

@Michael Hildebrand,

 

Any chance you are or know the person who can help me with a related question.... 

 

We use Azure MFA, we are at the final stage were we have risk based CA policies. Its great, MFA only prompts when Azure Security Graph feels its needed. However, we have a limited handful of tools like password vaults where we MUST MFA prompt every single time. No allowing 14 days, no using risk scores, MUST MUST MUST prompt for MFA. 

 

Please tell me there is some obscure thing we can put in the app registration manifest or strange powershell command we can run against the enterprise app entry to make this happen.  If there is not can we PLEASE have one? Its the only thing that stops us from dumping another MFA vendor we have.

 

If your not the right person would you kindly forward it on?

Senior Member

Thank you for blogging this.

Now, I know you're just a blogger, but I hope some smart people like Caleb Baker or others on the Azure AD/Azure MFA/Conditional Access product teams are reading and following me.

 

Now, to forward a question from the CEO, paraphrased:

"Microsoft can make such an overcomplicated, interconnected solution, but they can't force MFA on connection to the corporate VPN like every other vendor?"

We have placed an order to a competitor VPN vendor because of this problem. We're not ready for a complete zero-trust transformation, we need the corporate VPN, and our CISO and risk manager won't budge this need for MFA every time. We're government, it's just more complicated.

 

A very simple workaround would be for us admins to be able to ignore the MFA claim on the PRT for specific cloud apps, either on the cloud app itself, or in a Conditional Access policy. That way, I'd ignore the MFA claim for the "VPN Server" cloud app (automatically created by RRAS), and our users would get the ideal experience when connecting to the corporate VPN (given we still had Microsoft RRAS .. ).

 

Sign-in frequency isn't enough. Even if you set it to its minimum of 1 hour, it's still an entire hour where users won't need to perform MFA. To add, requiring users to input password is a bad experience. We require MFA for the VPN connection, but not necessarily password.

It isn't too late, I'm a big fan of RRAS, and a big fan of Azure MFA and Conditional Access. Get this out the door ASAP and save yourself a customer ;)

 

I mean, there are lots of other use cases where "just" ignoring logon is a policy nightmare. Password managers, identity/access management systems, internal documentation, etc. It shows some ignorance to customer demand if you "just" excuse the lack of MFA because there's a lot of conditions behind the scenes.

 

Azure MFA NPS Extension is the only alternative, and it's a bad experience. When initiating VPN connection, it simply idles, and there's no way for the user to know that they need to use the Authenticator app on their phone. It increases the need for education, and it requires the user to have Authenticator set up already, or it will just time out. As I said, it's a bad experience, whereas the WAM interactive sign-in dialog is much more user-friendly and can even get the user through Authenticator registration if needed.

Man - I have some catching up to do here ...

  • Filip - re: mirrored whiteboard - I tested it and I think you're right.  A darkened background, a bright pen color and 'just the right angle.'  Plus, I have it on good authority that Stuart isn't left-handed.  :cool:
  • Stefan - re: issue of stolen devices - physical possession of a device by an attacker opens up alot of 'what ifs.'  I don't claim to have the perfect answer but there are several options I could think of - for starters, I did a quick test and I locked out my device w/ 5-6 failed PIN attempts - that is the initial control.  Further, one could issue a wipe/reset or reboot of the device via MDM/mgmt tool, use the portals/PowerShell to revoke/invalidate the tokens, disable/delete the device object in AAD, disable the user, and/or reset the user's password.
  • ITEric and Kasper have similar comments - "we need a per-app option to always require MFA" - that requirement makes sense to me.  I am not 'in the know' of plans for that but I did find a UserVoice item that seems to get at what you're needing (I see Kasper's prior comment there already) - take a look and vote it up (our PGs keep keen eyes on UserVoice): https://feedback.azure.com/forums/169401-azure-active-directory/suggestions/33405382-option-to-enfor... 
Occasional Contributor

@Michael Hildebrand thanks for the reply. I have voted and commented there per your suggestion. I will still shamelessly beg you to raise it with those who actually might consider it. You must know who that is to have gained the insight this article has. Just pointing them at that user voice could do alot to raise its profile. Cheers! 

Senior Member

Thanks, great article! All the stuff under dsregcmd /status is endlessly confusing even after many attempts to learn it all, but this article helps a little!

Hiya freds123 - If you haven't seen these, have a look; they break down the elements in the output of DSREGCMD /status:  

 

https://docs.microsoft.com/en-us/azure/active-directory/devices/troubleshoot-hybrid-join-windows-cur...

 

https://docs.microsoft.com/en-us/azure/active-directory/devices/troubleshoot-device-dsregcmd

Microsoft

Nice work all, very good article indeed! Explains a thing or two I noticed in my lab yesterday... :grinning_face_with_sweat:

Thanks for sharing!