You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Multi-factor authentication (MFA) is one of the most effective defences against identity-based attacks. Microsoft reports that MFA blocks more than 99.9% of account compromise attacks. In Entra ID, MFA is deeply integrated with Conditional Access and can be deployed across an organisation with minimal friction.
MFA requires users to provide two or more verification factors from different categories:
| Factor Category | Description | Examples |
|---|---|---|
| Something you know | A secret the user memorises | Password, PIN |
| Something you have | A physical object the user possesses | Phone, hardware key, smart card |
| Something you are | A biometric characteristic | Fingerprint, facial recognition |
A sign-in that requires a password (something you know) and an authenticator app notification (something you have) is two-factor authentication — the most common form of MFA.
Entra ID supports several second-factor methods:
The recommended method. It supports:
Hardware security keys (e.g., YubiKey) that provide phishing-resistant authentication:
A platform-based credential for Windows devices:
Uses X.509 certificates (typically on smart cards or virtual smart cards):
These methods are less secure than the others because they are vulnerable to SIM-swapping and telephony interception. Microsoft recommends moving away from SMS-based MFA.
The legacy approach enables MFA on a per-user basis:
This method is not recommended because it lacks the flexibility of Conditional Access and applies MFA to all sign-ins without context.
Use Conditional Access policies to require MFA based on context:
This approach is more flexible and aligns with zero-trust principles.
For organisations that do not have Entra ID P1, Security Defaults provide baseline protection:
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.