Azure Multi-Factor Authentication For Users

In this article, you will learn about Azure multi-factor authentication for users.

Introduction

 
Azure Multi-Factor Authentication (MFA) helps protect access to information and applications while keeping up simplicity for users. It provides extra security by requiring a second form of authentication/verification and conveys solid validation by means of a scope of simple to utilize confirmation techniques.
 

Azure Multi-Factor Authentication (MFA) Provider

 
There are two types of Auth providers, and the refinement is around how your Azure subscription is charged. The pre-authentication option calculates the number of authentications performed against your tenant in a month. This alternative is best if you have a few users authenticating only occasionally. The per-client option calculates the number of individuals in your tenant who perform two-step verification in a month. This choice is ideal on the off chance that you have a few clients with licenses yet need to stretch out MFA to more clients past your authorizing limits.
 

Configure Azure Multi-Factor Authentication

 
Sign in to the Azure portal as an administrator. Browsing to Azure Active Directory > MFA.
 
Azure Multi Factor Authentication For Users
 
Some of these settings apply to Multi-Factor Authentication (MFA) Server, Azure Multi-Factor Authentication (MFA)
 
Block/unblock users Used to block specific clients/users from having the option to get Multi-Factor Authentication requests. Any authentication endeavors for blocked clients/users are automatically denied. Clients/users stay hindered for 90 days from the time that they are blocked.
Fraud alert Configure settings related to Clients/Users ability to report fraudulent verification requests.
OATH tokens Used in cloud-based Azure MFA environments to manage OATH tokens for users.
Phone call settings Configure settings related to phone calls and greetings for cloud and on-premises environments.
 

Block and unblock users

 
Block a user /Client
 
Sign in to the Azure portal as an administrator.
 
Browse to Azure Active Directory > Multi-Factor Authentication (MFA) > Block/unblock users.
 
Azure Multi Factor Authentication For Users
 
Then, Select Add to block a user.
 
Azure Multi Factor Authentication For Users
 
After that, select the Replication Group. Enter the username for the blocked user as username@domain.com. Enter a comment in the Reason field.
 
And, Select Add to finish blocking the user.
 
Azure Multi Factor Authentication For Users
 
Finally, successful Notifications
 
Azure Multi Factor Authentication For Users
 
Unblock a user /Client
 
Sign in to the Azure portal as an administrator.
 
Browse to Azure Active Directory > MFA > Block/unblock users.
 
After, Select Unblock in the Action column next to the user to unblock open that.
 
Azure Multi Factor Authentication For Users
 
After that, enter a comment in the Reason for unblocking field.
 
Then, Select Unblock to finish unblocking the user.
 
Azure Multi Factor Authentication For Users
 
Finally, successful Notifications
 
Azure Multi Factor Authentication For Users
 

Summary

 
In this article, I discussed Azure Multi-Factor Authentication for blocking/unblocking users. In my next article, I will cover the next step of this series.