Apr 06 2020
09:59 AM
- last edited on
Jan 14 2022
04:33 PM
by
TechCommunityAP
Apr 06 2020
09:59 AM
- last edited on
Jan 14 2022
04:33 PM
by
TechCommunityAP
Has anyone successfully managed to implement Azure MFA without adversely affecting Flow (Power Automate)?
The Microsoft Support article "Recommendations for conditional access and multi-factor authentication in Microsoft Flow" (https://support.microsoft.com/en-gb/help/4467879/conditional-access-and-multi-factor-authentication-...) refers to the Configurable Token Lifetimes which look as if that would work. However, following the link from that article to further information ("Configurable token lifetimes in Azure Active Directory (Preview)" - https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-configurable-token-...) then says that:
After May 1, 2020 you will not be able to use Configurable Token Lifetime policy to configure session and refresh tokens. You can still configure access token lifetimes after the deprecation.
Instead, they will be replaced by authentication session controls in Conditional Access.
So the question is: how now should we be configuring MFA via Conditional Access policies so that Flow is not adversely affected?
Mar 26 2021 09:45 AM
Apr 25 2022 02:12 AM
@Max Goss any update? We have the same problem.
Feb 22 2023 12:32 PM
Feb 22 2023 11:12 PM
@lelMARKO no. Because of "Session controls" we have to reauthenticate every 30 days.