Blog Post

Microsoft Entra Blog
3 MIN READ

One step closer to modernization: The MFA Server Migration Utility

Alex Weinert's avatar
Alex Weinert
Former Employee
Aug 31, 2022

Hi folks! 

 

We're always working to keep maximizing your security and productivity. We focus on solutions to make modernization as easy as possible. As customers work towards modernizing security by adopting Azure AD, they've told us they need help migrating from on-premises MFA Server to cloud-based Azure MFA. This gets them a bunch of simplification – they can retire their on-premises MFA Server *and* the ADFS deployment needed to support it. Today, I'm excited to announce the availability of the new Azure MFA Server Migration Utility, which we hope will make your modernization journey much easier!

 

Since July 2019, we've blocked new downloads of the on-premises MFA Server, reflecting the fact that the Azure MFA is our premier MFA experience, offering lower TCO, simpler deployment, better security, and many more features than the MFA Server. The Azure MFA Server Migration Utility makes it easy for admins to take advantage of these advances and modernize their infrastructure by migrating their users from on-premises Azure MFA Server to Azure MFA.

 

There are two pieces to this tool:

  • The Azure MFA Server Migration Utility facilitates the migration of user authentication data stored on-premises directly into Azure AD, all without requiring any re-registration or action from their end users. It's included in the latest update of Azure MFA Server.
  • Staged Rollout for Azure MFA functionality within Azure AD, which allows admins to selectively test and move users to Azure MFA without requiring any changes to federation settings.

 

Getting started 

 

Step 1: Upgrade your primary Azure MFA Server.

 

Install the https://www.microsoft.com/download/details.aspx?id=55849 on your primary Azure MFA Server. If the remaining machines in your MFA Server deployment are running on version 6.1.0 or higher, no other servers need to be upgraded.

 

Step 2: Target users for migration.

 

Once installed, open the new Migration Utility.

 

 

 

Migrating user data is as easy as selecting the Azure AD group containing users (or nested groups of users) you wish to migrate, defining the various registered MFA methods that should be moved to Azure AD, and then clicking “Migrate Users.”

 

Step 3: Target users for Azure MFA.

 

Once user data has been migrated, use Staged Rollout for Azure MFA to ease migrations by determining which users should use Azure MFA, based on targeted group membership:

 

 

Since no changes to your tenant or federation settings are required, carrying out testing is extremely low risk and can be done with as many or as few users as you wish.

 

Once testing and migrations have been completed, you can quickly and easily retire your entire MFA Server deployment, instantly reducing infrastructure and maintenance costs while boosting the availability and reliability of your MFA Service. Head on over to the https://docs.microsoft.com/en-us/azure/active-directory/authentication/how-to-mfa-server-migration-utility to get started!

 

As always, we’re excited to get your feedback and learn from you!

 

Alex Weinert, Director of Identity Security, Microsoft

(Twitter: Alex_t_weinert)

 

 

Learn more about Microsoft identity:

  • Related Articles: https://docs.microsoft.com/azure/active-directory/authentication/howto-mfaserver-deploy-upgrade, https://docs.microsoft.com/en-us/azure/active-directory/authentication/how-to-mfa-server-migration-utility
  • Return to the Azure Active Directory Identity blog home
  • Join the conversation on https://twitter.com/azuread/status/1278418103903363074 and https://www.linkedin.com/showcase/microsoft-security/
  • Share product suggestions on the https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789
Updated Aug 31, 2022
Version 4.0

9 Comments

  • LuisNL's avatar
    LuisNL
    Copper Contributor

    1 Have you looked into az AD and password synch???  Or federation??

  • jaspalvilkhu's avatar
    jaspalvilkhu
    Copper Contributor

    Hi all,

     

    I need to do a staged rollout of both Password Hash Sync and MFA. I can only select one or the other in the portal. 

     

    After reading the following documentation, am I right in saying that I need to use the staged rollout of PHS first. Once this is complete, turn it off and then use the staged rollout for MFA?

    https://learn.microsoft.com/en-us/azure/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication#prepare-staged-rollout

  • VNJoe's avatar
    VNJoe
    Iron Contributor

    If you're not able to protect RDS, it's of no value in the SMB and Mid-Size markets, and they will continue using products that do protect those areas.

  • fredentoft's avatar
    fredentoft
    Copper Contributor

    https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfaserver-deploy-upgrade for upgrading MFA server installations is to first upgrade the subordinates, because new versions are backwards compatible with older database versions from the master.
    However, here it is recommended to upgrade the master only.
    Those instructions look pretty contradictory to me, and I wouldn't want to end up in a situation where stuff breaks because the master database is incompatible with the subordinates.

  • And many companies are using third party tool to do MFA for on-premises servers like Domain Controller...any solution on this?

  • Mark Riley's avatar
    Mark Riley
    Copper Contributor

    The staged rollout is difficult because we can't see who is registered in Azure. The User registration status report is showing all on-premises users as registered in Azure MFA.

  • Christmas came really in advance this year. Thanks for this tool, make it easy for us get rid of some last deployments of MFA Server.

  • Dean_Gross's avatar
    Dean_Gross
    Silver Contributor

    What is the current recommended approach for proving MFA to on-premises systems?