Conditional Access not working as expected


Hi guys


i'm trying to configure Conditional Access for our users. We have Windows 10 managed Notebooks, which are AAD Joined and have Windows Hello for Business configured, which everything is just working fine.


We would like to configure a Conditional Access Policy to force the users every 23 hours to enter their password and MFA again. For that i have configured a policy, where i Grant the permission only with MFA and a compliant device.


But the users are not promped to enter the MFA again. I can see that the correct policy has been hit (see the second printscreen).


Is there anything i could have misunderstand or should this work like we would need?


Many thanks for any hints on this


Best regards,

8 Replies
Hi, I can't see anything in your screenshots that shows the "Sign-in Frequency" config set to 23 hours?



Hi Christian

many thanks for your feedback. I sent you all the settings i have in the policy. 


Best regards,


this is what i would like to have, except that we would like to have for Windows 10 MFA in addition.

Hello again, difficult to say when not working in your environment. Have you tried the What If tool?



Hi Christian

i'm sorry for the late reply. We saw in the SignIn-Logs, that the "Windows Sign In" with Windows Hello for Business, which we use, is registered as "Single Factor Authentication", but shows "MFA requirement satisfied by claim in the token".


So i assume that probably Windows Hello for Business is causing this, but i'm not sure. Also because of this in the Conditional Access overview it shows those "Windows Sign In" as "Out of scope", which is a little odd.


Also i discovered, that i don't have enabled MFA for the individual users in AAD, but the Users needed to setup MFA because the Conditional Access policy initially. Is it necessary to enable or even enforce MFA for all users in AAD?


Best regards


best response confirmed by marckuhn (Contributor)

Yes, all users should be forced to use MFA. Here's an article I found just now which explains it all as you're on WHFB, much better than if I would give it a go!

Going forward, try out the What if tool and the Report-only option when you experience odd stuff. Perhaps you'd benefit using the new CA templates in preview too. Have a look (the article was updated recently but you'll see those that are common to use if you scroll down)


As sign-in frequency also includes MFA nowadays you should be able to get this working.

Good luck!


Thanks for that and your help on this. The only thing which is a little special that it shows that the Windows Sign In with Hello for Business is Single Factor and not Multi Factor, but has the MFA accepted. Would be better for the understanding, or what do you think?

Hello again, no worries. I think it's fun. I understand it's confusing but from my understanding it's simply because Windows Hello for Business sign-in is a form of MFA, which utilizes the PRT, gets the claim, satisfies the strong authentication and Azure AD honors that claim. It's detailed in the above link under the "subtle points".