mfa
10 TopicsMFA on RDP (with AD, RDG, NPS)
Hi, everyone. In the company where I work we have an AD domain and RDP servers (MP) that some employees access from outside via RDG. We have already installed ADFS and NPS but I am still not clear which products and which license levels are necessary to enable 2FA on RDP via RDG. Does anyone have a clearer idea than me? Thanks225Views0likes2CommentsReport on MFA Status with Conditional Access
Is there any effective way to get a report of the actual MFA state of your users? I mean, the individual MFA state as well as MFA enabled via Conditional Access. It's easy to report on the individual MFA state. You get nice results: Enabled, Disabled, Enforced... However, if MFA is enabled via Conditional Access I can't seem to find an effective way to report on them. Below Powershell snippet is the closest I can get. It will check if MFA is enabled individually. If not, it will check the "StrongAuthenticationMethods.IsDefault" attribute and report on that. But this is not always accurate, because if the "Phone" or "Alternate Phone" are configured in the Azure user object, it will still report it here even if the user is not member of a Conditional Access policy. There is a built-in Azure report for this, but it is completely incorrect. It says that, for instance, I'm not enabled for MFA even though I'm enabled for the last 6 years. Report: https://portal.azure.com/#blade/Microsoft_AAD_IAM/AuthMethodsOverviewBlade Has anyone figured this out yet? $user = get-msoluser -UserPrincipalName yourUserName@contoso.com $StrongAuthenticationMethodsresult = $user.StrongAuthenticationMethods | Select-Object MethodType, IsDefault [PSCustomObject]@{ UserPrincipalName = $user.UserPrincipalName ObjectID = $user.objectid DisplayName = $user.DisplayName AuthEmail = $user.StrongAuthenticationUserDetails.Email AuthPhoneNumber = $user.StrongAuthenticationUserDetails.PhoneNumber PhoneDeviceName = $user.StrongAuthenticationPhoneAppDetails.DeviceName AuthAltPhone = $user.StrongAuthenticationUserDetails.AlternativePhoneNumber State = if ($user.StrongAuthenticationRequirements.State -ne $null) { $user.StrongAuthenticationRequirements.State } elseif ( $user.StrongAuthenticationMethods.IsDefault -eq $true) { "ConditionalAccess ($(($user.StrongAuthenticationMethods| Where IsDefault -eq $True).MethodType))" } else { "Disabled" } PhoneAppNotification = if ($StrongAuthenticationMethodsresult | Where-Object { $_.MethodType -eq "PhoneAppNotification" }) { $true } else { $false } PhoneAppNotificationIsDefault = IF ( ($StrongAuthenticationMethodsresult | Where-Object { $_.MethodType -eq "PhoneAppNotification" }).isDefault -eq "True") { $true } Else { $false } PhoneAppOTP = if ($StrongAuthenticationMethodsresult | Where-Object { $_.MethodType -eq "PhoneAppOTP" }) { $true } else { $false } PhoneAppOTPIsDefault = IF ( ($StrongAuthenticationMethodsresult | Where-Object { $_.MethodType -eq "PhoneAppOTPIsDefault" }).isDefault -eq "True") { $true } Else { $false } TwoWayVoiceMobile = if ($StrongAuthenticationMethodsresult | Where-Object { $_.MethodType -eq "TwoWayVoiceMobile" }) { $true } else { $false } TwoWayVoiceMobileIsDefault = IF ( ($StrongAuthenticationMethodsresult | Where-Object { $_.MethodType -eq "TwoWayVoiceMobileIsDefault" }).isDefault -eq "True") { $true } Else { $false } OneWaySMS = if ($StrongAuthenticationMethodsresult | Where-Object { $_.MethodType -eq "OneWaySMS" }) { $true } else { $false } OneWaySMSIsDefault = IF ( ($StrongAuthenticationMethodsresult | Where-Object { $_.MethodType -eq "OneWaySMSIsDefault" }).isDefault -eq "True") { $true } Else { $false } }22KViews0likes16CommentsUsers asked for 2nd MFA method
Hi there, starting today a couple of users reported that, seemingly out of the blue, they're being asked to configure a second method for their MFA setup. For example, if a user has configured to to use MSFT Authenticator app, he will be asked to provide an additional method. This doesn't seem to be widespread yet and we couldn't reproduce thus far. Perhaps someone of you knows what could be causing this. Thanks.Solved2.5KViews0likes3CommentsRemote Dekstop Connection using Azure MFA
Hello Everyone, I am facing a little problem now. We are thinking to implement MFA to login in to our servers on-prem from internal network. Obviously we can use some third party tools such us DUO or AD Professional Plus. However from what I can see there is a possibility to use RD Gateway with NPS that will have MFA plugin on it. I just need to understand something correctly - am I right saying that I can handle all RDP traffic to all the servers through RD Gateway that will be redirecting authentication through NPS to Azure MFA or it is no go? Regards, Wojciech29KViews0likes8CommentsAzure VPN Gateway and MFA Timeout Issue for Point to Site Connections
Hi, I'm having trouble getting MFA working with an Azure P2S IKEv2 VPN using RADIUS auth. It seems that the auth response timeout on the gateway is set so low (looks like 5 sec) that I don't have enough time to authenticate using MFA. I've verified this both with DUO Auth and Azure MFA; both have the same result. I initiate the VPN connection, enter credentials, and before I can answer the phone call to verify MFA, another request is initiated and a second call comes through. If I successfully verify either or both calls, the connection fails. However, if I use a push notification to the cell phone for verification and I can verify in under 5 sec, the connection is completed. I've also pointed my Palo Alto VPN device (where I have a specified timeout of 60 sec) at my MFA server and was able to log in successfully to that VPN - this determines the issue is not with my MFA server setup. I've created a bug request with Microsoft on this as there doesn't seem to be a way to change the timeout. Has anyone else encountered this issue or found a workaround??4.6KViews0likes1CommentMFA and privacy protection
Ahoj, Mám zájem o konkrétní informace o MFA, ale bohužel jsem nenašel odpovědi na některé z mých otázek. Má-li uživatel doménu aktivní MFA, může správce domény změnit přístupová data domény uživatele nebo deaktivovat MFA na svém účtu? Pokud má administrátor tuto pravomoc, je uživatel informován o této změně? Může správce domény přidat nebo změnit MFA jiného uživatele? Může Microsoft (podle vlastní vůle nebo na základě příkazu někoho) procházet a číst mé e-maily nebo soubory bez mých znalostí? Děkuji předem za vaše odpověď.718Views0likes0CommentsMFA and privacy protection
Ahoj, Mám zájem o konkrétní informace o MFA, ale bohužel jsem nenašel odpovědi na některé z mých otázek. Má-li uživatel domény aktivní MFA, může správce domény změnit přístupová data uživatele domény nebo deaktivovat MFA na svém účtu? Má-li administrátor tuto pravomoc, je uživatel domény o této změně informován? Může správce domény přidat nebo změnit MFA jiného uživatele? Může Microsoft (podle vlastní vůle nebo na základě příkazu někoho) procházet a číst mé e-maily nebo soubory bez mých znalostí? Děkuji předem za Vaši odpověď.765Views0likes0CommentsMFA and Azure IKEv2 P2S VPN Failing - Timeout Issue?
Hi, I'm having trouble getting MFA working with an Azure P2S IKEv2 VPN using RADIUS auth. It seems that the auth response timeout on the gateway is set so low (looks like 5 sec) that I don't have enough time to authenticate using MFA. I've verified this both with DUO Auth and Azure MFA; both have the same result. I initiate the VPN connection, enter credentials, and before I can answer the phone call to verify MFA, another request is initiated and a second call comes through. If I successfully verify either or both calls, the connection fails. However, if I use a push notification to the cell phone for verification and I can verify in under 5 sec, the connection is completed. I've also pointed my Palo Alto VPN device (where I have a specified timeout of 60 sec) at my MFA server and was able to log in successfully to that VPN - this determines the issue is not with my MFA server setup. I've created a bug request with Microsoft on this as there doesn't seem to be a way to change the timeout. Has anyone else encountered this issue or found a workaround??1.8KViews0likes0CommentsCannot get PfAuthUser to work on on-premise Multi-Factor Authentication Server
I can use the MFA fine through RADIUS, and the User Portal also works fine. Calls like GetUserSettings_3 also work fine. But when I try to use PfAuthUser_5 (or any other version), I always get: { 'PfAuthUser_5Result': False, 'callResult': { 'Code': 149, 'Description': 'Direct SDK Not Allowed' }, 'authenticationRequestId': '284960B22FD7A0AEEEC89AC470B6BAF0', 'error': { 'Code': 12, 'Description': 'Multi-Factor Authentication denied.' } } A call to CombinedAuthUser_4 would give me: { 'CombinedAuthUser_4Result': False, 'primaryAuthSucceeded': True, 'pfAuthSucceeded': False, 'callResult': { 'Code': 149, 'Description': 'Direct SDK Not Allowed' }, 'authenticationRequestId': 'F695AF55DC607EB35E7D0EC516EB7AA3', 'error': { 'Code': 12, 'Description': 'Multi-Factor Authentication denied.' } } Can anyone tell me what I need to do to get rid of this "Direct SDK Not Allowed" error?Solved3KViews0likes1CommentMFA subscription to the other account
Is there av way to move/migrate Azure Multi-Factor Authentication from our azure ad subrcrption to another azure ad customer? We sat up an customer with local MFA server for test and this have now been going on in our subrcription and should have it on the customers azure ad account. I dont want to mess up the settings we have so it dont work anymore so how can I do this?1.6KViews0likes1Comment