SOLVED

Question regarding 2FA with 365 accounts

Brass Contributor

I enabled it for three users yesterday but had to turn it off shortly after as they all had iPhones and it kept prompting for app passwords which were trying to avoid using. I read that Apple devices using version 11 or higher support modern authentication but the catch is you need to remove the Exchange account then add it back in after 2FA is enabled so I’m going to try that Monday.  I know we can use the Outlook app but they don’t want to use that unless they have to.

 

Next, originally I had those initial three users set up to use the Microsoft Authenticator with the prompt as the second authentication method but after thinking about that I think maybe the PIN code would be a better idea as I feel like my users would get used to seeing the prompt and just hit approve every time they see it. In the sense, does the PIN code seem more secure?

4 Replies

By PIN code do you mean the code displayed inside the Authenticator app? The general guidance is to use the least disruptive method applicable, and nowadays you can also configure passwordless auth which prompts them to select one of three numbers, so they cannot just hit approve.

best response confirmed by PS_83 (Brass Contributor)
Solution
Passwordless is kind of inconsistent but the code will be the backup. But I think the approve method is not secure at all and you are correct that users will blindly hit approve. Seen it happen before.

Pin or passwordless is only way I’d go.

You are correct about iPhone profiles thou. They do need reconnected usually when MFA is on.

@Vasil Michev Pin code from the authenticator app or via txt. Either one. My concern is that let's say someone is trying to phish one of my users. Assume they already have the password to the email account. They attempt to login as one of my users, my user gets a prompt to approve or disapprove on their mobile device. Since they will see that from time to time by design over a period of 90 days I'm worried that they will just approve it every time whereas if they were using the txt code or PIN from the app, they can't simply just approve it.

@Chris Webb Thanks, that's what I was thinking. Just wanted to see if anyone else has that same opinion.

1 best response

Accepted Solutions
best response confirmed by PS_83 (Brass Contributor)
Solution
Passwordless is kind of inconsistent but the code will be the backup. But I think the approve method is not secure at all and you are correct that users will blindly hit approve. Seen it happen before.

Pin or passwordless is only way I’d go.

You are correct about iPhone profiles thou. They do need reconnected usually when MFA is on.

View solution in original post