Blog Post

Microsoft Entra Blog
2 MIN READ

GA: System-preferred multifactor authentication

Alex Weinert's avatar
Alex Weinert
Icon for Microsoft rankMicrosoft
May 16, 2023

In previous blogs, we've emphasized the importance of multifactor authentication (MFA). Today, organizations and end users are using various authentication methods, providing varying levels of security. Users often choose less secure MFA methods, despite having access to more secure options due to a range of factors such as convenience, lack of awareness, or technical limitations.

 

To encourage users to authenticate with the strongest method available to them, we’re announcing system-preferred authentication for MFA. This system prompts the user to sign in with the most secure method they’ve registered and the method that’s enabled by admin policy. This will transition users from choosing a default method to use first to always using the most secure method available. If they can’t use the method they were prompted to use they can choose a different MFA method to sign in.

 

Administrators can roll out the feature by using the admin UX in the Azure Portal or via GraphAPI. For example, the user "John Doe" has registered both SMS and Microsoft Authenticator, and SMS is the default option that they used to sign in with. Once this feature has been enabled, the system-preferred method (Authenticator) will be presented to the user.

 

Admins can enable system-preferred MFA in Settings for Authentication methods.

 

 

This is how the Security info page appears when a user is enabled for system-preferred MFA:

 

 

 

The most secure method for the user in this example is Microsoft Authenticator: 

 

 

 

With an ever-changing threat landscape, it’s now more important than ever for organizations to stay ahead of bad actors. With that in mind,

 

  • This feature was introduced in April 2023, set to Microsoft managed (Disabled) by default.  
  • After this initial phase, the feature will be rolled out as Microsoft managed (Enabled) for all tenants, with admins retaining the option to disable it as needed.  
  • Finally, the feature will be set to Microsoft managed (Enabled) for all tenants, and the control to disable the feature will be removed.

 

To ensure organizations have adequate time to prepare for the rollout, we plan to share more detailed timelines by June. 

 

To best secure your organization and its end users, we highly encourage you to use the rollout controls and deploy this new feature as soon as you can. It’s now available in your tenant, making it easy to ensure users always use the most secure authentication method first. 

 

As always, we want to hear from you! Feel free to share your comments or reach out to us on aka.ms/AzureADFeedback. 
 

Best regards,

Alex Weinert (@Alex_T_Weinert) 

VP Director of Identity Security, Microsoft

 

Learn more about Microsoft identity: 

Updated May 15, 2023
Version 1.0
  • awasnik's avatar
    awasnik
    Copper Contributor

    As per document System-preferred multifactor authentication (MFA) - Microsoft Entra | Microsoft Learn there is a known issue with users using mobile devices and enrolled into FIDO keys

     

    Most users access applications on both desktop (laptop) and mobile devices. 

    1. Can you please confirm user's experience on mobile device if user is enrolled into FIDO keys   

    2. If FIDO keys are not currently supported on mobile devices then does user get next secure MFA method on mobile device 

  • IEXer58's avatar
    IEXer58
    Copper Contributor

    This is useful, thanks for posting Alex.

     

    Is it likely MS will ever do the same for general authentication methods?

     

    When first enabling passwordless phone sign in I signed in once with username and password and the sign in behavior is to default to the last successful sign in method. So when I signed in subsequently it kept asking for username vs just bumping MS authenticator to accept sign in. I had to place a support call and an ID tech explained to me I just needed to select other sign in methods, sign in with phone and then it would keep that until I used another method etc.

     

    Would be great if I could set it Azure to prompt user sign in for the most secure method first.

     

    thanks

  • JonasBack's avatar
    JonasBack
    Steel Contributor

    Also wondering what awasnik wrote, any comments Alex Weinert ?

     

    All our users are using FIDO2 but this is not fully supported on iOS/Android. Does this mean if we enable system-preferredd MFA it will default to the FIDO2 security key every time they sign in using iOS/Android so they have to switch to another method every time?

  • This is great, I hope it gets deployed to non-managed (aka personal MSA) users too. Having to enter the authentication number instead of choosing from the 3 suggested numbers is a lot safer.

  • MekanM's avatar
    MekanM
    Copper Contributor

    Any specific date has been scheduled for this to roll out?

  • AlexRF's avatar
    AlexRF
    Copper Contributor

    Is this setting smart enough to understand what's the best method available for a service?

    Eg. Use Microsoft authenticator app for office/device sign in, but lets say published RDP Azure hosted remote app only currently has the call option for MFA, will it be smart enough to use phone call in that instance? or is just okay auth app is your best so I'm going to use that at all times.