Forum Discussion
Azure AD Windows Profile is Bypassing MFA
- Oct 11, 2018
It's not bypassing MFA, when you join the machine to Azure AD it requires MFA to join the machine, which can use windows hello to use the TPM chip, turning your device into something you have and your Password / PIN(Hello) as part of the MFA so you no longer have to do MFA to access your office resources from the device itself. The idea is anyone accessing your o365 account on anything other than that device or another joined device you setup, will still need to do MFA to access your resources. If your machine gets stolen lost, they must crack the password, but the machine can be disabled, which will force MFA again.
That makes sense, as long as I can document it and defend it we should be good, so thanks for explaining. I disable Windows Hello to ensure the password complexity and password change requirements are met, but I assume BitLocker w/ TPM has the same effect as making it the 'something you have', or is there something fundamentally different about Hello?
- VasilMichevOct 11, 2018MVP
I know :P Well, Jairo knows, and has documented it pretty well on his blog: https://jairocadena.com/2016/11/08/how-sso-works-in-windows-10-devices/
Make sure to review all the other articles as well.
- Oct 11, 2018And this is why I love hanging out and participating so much on this site 😂 thanks Vasil