Microsoft Enforces MFA for Logging into Azure Portal

0
4

Cybersecurity

On Tue, Aug 26, 2025, Microsoft announced the enforcement of mandatory multifactor authentication (MFA) for all accounts accessing the Azure portal and related administrative centers. This policy aims to enhance security by adding an additional layer of identity verification across Azure and Microsoft 365 admin portals.

Policy Overview

Starting October 2024, MFA will be required for any create, read, update, or delete operations within the Azure portal, Microsoft Entra admin center, and Microsoft Intune admin center. Full enforcement across CLI, PowerShell, mobile, and Infrastructure as Code (IaC) tools will commence on October 1, 2025, further strengthening administrative security.

Research indicates that enabling MFA blocks over 99.2% of account compromise attacks, highlighting its effectiveness as a defense mechanism. Microsoft will enforce MFA by default for critical administrative access points to safeguard cloud resources.

Scope of Enforcement

Enforcement will occur in two phases:

  • Phase 1 (October 2024 – February 2025)
    • Azure portal sign-in for all CRUD operations.
    • Microsoft Entra admin center sign-in for all CRUD operations.
    • Microsoft Intune admin center sign-in for all CRUD operations.
    • Microsoft 365 admin center sign-in requirements begin in February 2025.
  • Phase 2 (October 1, 2025)
    • Azure CLI and Azure PowerShell for create, update, and delete operations.
    • Azure mobile app for create, update, and delete operations.
    • IaC tools and REST API endpoints for create, update, and delete operations.
    • Read-only operations remain exempt.

Administrators using user accounts for scripted automation should transition to workload identities, such as managed identities or service principals, to avoid disruptions when Phase 2 begins.

Affected Applications and Timelines

Application Name Enforcement Start
Azure portal Second half of 2024
Microsoft Entra admin center Second half of 2024
Microsoft Intune admin center Second half of 2024
Microsoft 365 admin center February 2025
Azure CLI & PowerShell October 1, 2025
Azure mobile app October 1, 2025
IaC tools & REST API October 1, 2025

All user accounts accessing the listed applications must complete MFA upon enforcement. Break-glass and emergency-access accounts also require MFA; organizations are advised to configure passkeys (FIDO2) or certificate-based authentication for these accounts. Workload identities remain unaffected, but user-based service accounts must comply.

The OAuth 2.0 Resource Owner Password Credentials (ROPC) flow is incompatible with MFA. Applications using MSAL’s ROPC APIs must migrate to interactive or certificate-based flows. Developers should update code relying on AcquireTokenByUsernamePassword or UsernamePasswordCredential in Azure Identity, following Microsoft’s migration guides for .NET, Go, Java, Node.js, and Python.

Microsoft advises immediate MFA adoption to secure high-value administrative accounts and mitigate the threat of credential-based attacks. Organizations can prepare by:

  • Verifying MFA configuration via the Microsoft Entra ID portal.
  • Applying or updating Conditional Access policies (requires Entra ID P1/P2).
  • Enabling security defaults if Conditional Access is unavailable.
  • Migrating user-based service accounts to workload identities.

After enforcement, Azure portal banners will notify administrators of required MFA, and sign-in logs will identify MFA challenges.

Comments are closed.