Microsoft Secure Tech Accelerator
Apr 03 2024, 07:00 AM - 11:00 AM (PDT)
Microsoft Tech Community
SOLVED

Is it possible to prompt a user to authenticate through MS Authenticator when their risk increases?

Copper Contributor

I am looking to prompt my users through the Microsoft Authenticator app when their user risk reaches high. I am using several third part security tools to calculate risk for each user and would really like to be able to prompt users through the MS Authenticator app using a push notification. Is this even possible?

10 Replies
Hello, yes I believe so. But you would have to use AAD P2 with AAD Identity Protection and also only make the Authenticator app available as the MFA option.
Hi @joeldavideng ,

I'll follow @ChristianJBergstrom . Here is a link with all informations about Identity Protection.

https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protec...

Best regards,
Schnittlauch

"First, No system is safe. Second, Aim for the impossible. Third no Backup, no Mercy" - Schnittlauch

My answer helped you? Don't forget to leave a like. Also mark the answer as solved when your problem is solved. :)

@Schnittlauch and  @ChristianJBergstrom , thanks for the replies. When I was reading through the docs for Identity Protection, I saw that you can configure User Risk policies, which ultimately lead to a Block or Allow (with password change) option, or you could configure Sign In Risk policies, which lead to Block or Allow (with MFA prompt). I am actually looking for a blend of the two, where users aren't necessarily signing into any new applications, but are exhibiting enough risk I would like them to confirm their identity in the Authenticator app. 

 

I would like to refine my question to, Is is possible to prompt a user to authenticate through the MS Authenticator app on demand?

@joeldavideng Hello, if you have AAD P2 with Identity Protection, sign-in risk and user-risk can be evaluated as part of a conditional access policy. If you then select "require MFA" and also have configured the authenticator app as the only MFA option it should be triggered.

 

Conditions in Conditional Access policy - Azure Active Directory | Microsoft Docs

@ChristianJBergstrom, I was able to set up a conditional access policy that only prompts a user for MFA if their risk is high when the user logs in, but I was not able to trigger an Authenticator prompt mid-session or if the user is not logged in at all. I believe I will need to pursue other options for triggering prompts based on actions other than logins given the limited number of actions conditional access policies support. Thanks for your help.

You are correct, there are a ton of things going on in background with Identity Protection already. What I'm going for is to unify external risk evaluation systems with Azure's risk system. So if my other tools determine a user is high risk, I'd like to be able to utilize Azure's notification system to just prompt the user to click yes or no in MS Authenticator. It sounded a lot like the Identity Protection feature was more open than it actually is for integrating third party tools.
best response confirmed by joeldavideng (Copper Contributor)
Solution

@joeldavideng we manually increase the risk of a user when we discover a breach somewhere else.

That way, the user is prompted for a password change (forcing MFA is not possible ATM).

https://docs.microsoft.com/en-us/graph/api/riskyusers-confirmcompromised?view=graph-rest-beta&tabs=h...

Thanks for replying Thijs, just to be clear we should mention that you can do it with the "sign-in risk" and not "user-risk" at the moment, as also confirmed above.
Thanks Thijs. It sounds like you are implementing something very similar to what I was going for and ran into the same limitation. It's good to have clarity on what is actually possible.
1 best response

Accepted Solutions
best response confirmed by joeldavideng (Copper Contributor)
Solution

@joeldavideng we manually increase the risk of a user when we discover a breach somewhere else.

That way, the user is prompted for a password change (forcing MFA is not possible ATM).

https://docs.microsoft.com/en-us/graph/api/riskyusers-confirmcompromised?view=graph-rest-beta&tabs=h...

View solution in original post