Microsoft has announced that all Azure logins will soon require multi-factor authentication. Authentication (MFA) to improve account security.
Authentication methods offered by the Azure platform include push notifications from mobile apps, biometrics, one-time passwords, or passkeys with Microsoft Authenticator.
Additionally, FIDO2 security keys, certificate-based authentication, and SMS or voice approval authentication methods are available.
Azure Authentication
Azure MFA will be rolled out in two phases. In the first phase, MFA must be used to sign in to the Azure portal, Microsoft Entra admin center, and Intune admin center. All global Entra administrators will receive a 60-day notification via email and Azure Service Health notifications. Phase 1 begins in October 2024.
Phase 2 is scheduled to begin in early 2025. In this phase, all sign-ins will be required through Azure CLI, Azure Powershell, Azure Mobile App, and Infrastructure as Code (IaC) tools. If your organization already has an MFA sign-in policy such as Microsoft Standards or a Conditional Access policy that uses MFA, users will not see a change in their sign-in experience.
The rollout is part of Microsoft’s Secure Future Initiative (SFI). Part of this program aims to provide additional protection against phishing through MFA for all user accounts. Last year, state-sponsored hackers from China managed to hack into a number of email accounts belonging to US government officials.
“Our goal is to provide a seamless experience for legitimate customers while ensuring robust security measures are in place. We encourage all customers to begin planning for compliance as soon as possible to avoid business disruption,” Microsoft said in a statement.
Over InfosecurityMagazine.