Forum Discussion
Office 365 Admin Role Needed for MFA
I would like to assign members of the help desk access to manage MFA for non-admin users. I already assigned the Authentication admin role and this partially works. Right now the help desk can go into AAD, switch to Authentication methods and do everything that is needed there.
However, as a Global Admin from the Microsoft 365 admin center I can see Users > Active Users > Multi-Factor Authentication and I can manage Manage multifactor authentication from the User itself. These options are not available for the help desk.
Is there another role that I can use to grant access to the legacy MFA management portal?
None of the "specialist" roles are able to manage users in the legacy MFA portal, as detailed here: https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
None of the "specialist" roles are able to manage users in the legacy MFA portal, as detailed here: https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference
- Manlyboots907Copper ContributorSo is the answer
"You must be a global admin in order to do this?"- ChrisP1975Copper ContributorI am using Authentication Administrator to grant my help desk team access to make changes to MFA.
- nomanmaryam343Copper Contributor
It looks like you’ve set up the Authentication admin role, which is a great start. To ensure full access to MFA management features, consider assigning the "Privileged Authentication Administrator" role. This role will grant the help desk the permissions needed to manage MFA settings directly from the Microsoft 365 admin center. For additional tech resources.
- acerimeliCopper ContributorI found a solution to this.
From this post:https://learn.microsoft.com/en-us/answers/questions/325505/allow-support-users-to-enable-mfa-for
"To allow help desk users to enable per user MFA via Multi-factor Authentication Portal, you need to assign both directory roles mentioned below:
Authentication Policy Administrator: This role will allow access to Multi-factor Authentication Portal but won't allow enabling/disabling per-user MFA.
Privileged Authentication Administrator: This role allows enabling/disabling per-user MFA."- lspotCopper Contributoracerimeli's solution worked for me. Although you have to give them the path to the MFA portal. https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx
The link doesn't show up at the top of the user list like I'm used to seeing as a global admin.
The Privileged Authentication Administrator Role seems pretty innocuous, but curious what people think of the Authentication Policy Administrator. Is that just big words for can enable and disable MFA for anyone in the tenant? - Johann1575Copper ContributorThis works perfectly. Just send them the link to the legacy MFA portal and they can enable/disable MFA, and also enable/disable "Require selected users to provide contact methods again". They can't "Delete all existing app passwords generated by the selected users" though. Only Global Admins it seems.
- HamzaDurraniCopper Contributor
It worked for me thanks acerimeli
The Authentication Administrator should do, for all general users.
Use the Privileged Authentication Administrator role for admin privileged accounts.
- brianzx7Copper ContributorNope, like I said, I gave my employee all of the admin privileges including the Authentication Administrator and he could not change the MFA settings. Once I gave him global admin, he was able to do that task.
- mhikoletCopper Contributor
I had the same issue and found this article.
https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userdevicesettings
hope this explain this article will help.Usually, your helpdesk will not go to the portal of MFA Per user this is for global admin role, they will reset the MFA, via Azure under Users > Select Users > Authentication Method and click Require re-register multifactor authentication button.
Your helpdesk needs a role, Global Reader Role - to access users and Authentication Admin Role so they can re-register the MFA.
Cheers!!
- philljones22Copper Contributor
To grant access to the legacy MFA management portal, you'll need to assign the Security Administrator role in addition to the Authentication Administrator role. The Security Administrator role typically includes permissions to manage Multi-Factor Authentication settings across the organization, including access to the legacy MFA management portal. This should allow members of the help desk to perform MFA management tasks from both the Azure app Active Directory portal and the legacy MFA management portal.
- arslanshabirCopper Contributor
I checked that article and assigned the Authentication Administrator role to my limited admin. You don't need to give them the global reader role if you provide the Azure AD portal URL. However, I couldn't find where to set MFA to enabled or enforced in Azure AD, which seems to be what the original poster needs. I also want a limited admin to create a user, assign a license, and enable MFA so the user sets up MFA on their first login. Am I missing something in Azure AD? "Require re-register" and "revoke authentication" don't seem to change the user's Multi-Factor Auth Status to enabled.
- arslanshabirCopper Contributor
To grant help desk members full access to manage MFA for non-admin users, consider assigning the "Privileged Authentication Administrator" role. This role provides more comprehensive MFA management capabilities. This enhanced access is similar to how PicsArt Pro unlocks advanced features for better creative control.
- jhonnadyyCopper Contributor
To let your help desk manage MFA for non-admin users through the legacy portal, assign them the Privileged Authentication Administrator role in addition to the Authentication Administrator role. This should give them the necessary permissions to access the MFA management options you see as a Global Admin. If that doesn’t fully work, try adding the User Administrator role as well. These roles combined should enable them to handle MFA settings more effectively.
- asifjatoi132Copper ContributorThough it's an old post, but it helped a lot today in this matter. Thanks for the post.
- gearsgen1Copper Contributor
It sounds like you’ve already set up the Authentication admin role, which is a good start. For full access to the MFA management features in the admin center, you might want to consider assigning the "Privileged Authentication Administrator" role. This role could give the help desk the necessary permissions to manage MFA settings directly from the Microsoft 365 admin center app.
- mwiki8833Copper Contributor
To enable Multi-Factor Authentication (MFA) in Office 365, you'll need to have an admin role with the necessary permissions. Ensure that you have the correct Office 365 admin role assigned to manage and configure MFA settings effectively.