Admin Portals to Get MFA For All Users by Default

A Positive Step, But Many Organizations Are Behind

Hopefully by now you’re aware that Microsoft are rolling out the enforcement of MFA for the admin portals for all users. Looking at the comments on Microsofts announcement, many organizations are not ready for this change. Before I get into the article, I’ll address a few common queries:

  • MFA will be enforced for ALL accounts? Yes
  • Do you really mean ALL? Yes
  • What about service / non-user accounts and Emergency Access / Break Glass accounts? Yes
  • REALLY? Yes

In move move that is welcomed by security consious tenant administrators, and less-welcomed by many others, Microsoft will be enforcing MFA for access to the admin portals for all accounts with no exceptions.

The timeline as it stands is shown below, with the Azure portal rollout already well underway.

Application NameApp IDEnforcement phase
Azure portalc44b4083-3bb0-49c1-b47d-974e53cbdf3cSecond half of 2024
Microsoft Entra admin centerc44b4083-3bb0-49c1-b47d-974e53cbdf3cSecond half of 2024
Microsoft Intune admin centerc44b4083-3bb0-49c1-b47d-974e53cbdf3cSecond half of 2024
Azure command-line interface (Azure CLI)04b07795-8ddb-461a-bbee-02f9e1bf7b46Early 2025
Azure PowerShell1950a258-227b-4e31-a9cf-717495945fc2Early 2025
Azure mobile app0c1307d4-29d6-4389-a11c-5cbe7f65d7faEarly 2025
Infrastructure as Code (IaC) toolsUse Azure CLI or Azure PowerShell IDsEarly 2025

For some organizations, who have been dilligently following Microsofts best practice recommendations (Including protecting emergency access accounts with FIDO2 tokens) this is a minor change. For the majority though, there’s some scrambling to be done. In this article, I’ll look at some of the things you’ll need to watch out for as part of this rollout.

What About Emergency Access Accounts?

Emergency Access or “Break-Glass” accounts are administrative accounts to be used only in an emergency such as a tenant-wide lockout. These accounts should be exempt from Conditional Access policies and should be monitored and alerts on when used.

Previously, the guidance for these accounts was that they should not have MFA enforced (in case of an MFA outage) however this guidance has been updated recently. The current guidance is to leverage phishing resistant authentication methods such as FIDO2 security keys for emergency access accounts.

I won’t go into the details of these here but this should be a top priority for administrators. Because these accounts (by design) don’t get used often, it’s easy to forget this and then become locked out of the account in an emergency.

What About Legitimate Exceptions?

The term legitimate exceptions has come up a few times on the Microsoft announcement pages. To be frank, given the long standing recommendation to move applications to use service principals instead of user accounts, and the ease at which this can be set up (just check any of my Graph API scripts), there shouldn’t really be legitimate exceptions, particularly for accounts with admin roles.

That doesn’t mean many organizations and app vendors don’t have a problem to solve, but it should make sense to move authentication to use service principals for them too, even if it’s a bit painful getting there.

Will I Be Impacted?

This is the big question for many organizations. How do we know if we will be impacted? There are a few angles of approach here.

First, you can report on registered MFA methods with scripts like the one described here. Knowing is half the battle and a quick report will rule out many of your accounts as being an issue once they have MFA registered.

Next, gather the information. If you have’t already, it’s very easy to ingest your Entra sign-in logs into Log Analytics to allow you to query for the use of MFA and the hisorical sign-ins for specific accounts.

Finally, you should move towards enabling MFA for admin portals yourself before Microsoft do it for you. If you use security defaults in your tenant, you’re already there. If not, you can deploy conditional access policies to enforce MFA ahead of time. The conditional access templates in Microsoft Entra contain a wealth of policy examples that you can pick from to get started. For this task, take a look under the “Protect administrator” section and “Require multifactor authentication for Microsoft admin portals”. You may want to modify the policy slightly to expand the scope to all users but it will get you started!

Figure 1: Microsoft Entra has a long list of useful conditional access policy templates

Don’t Panic!

While not as bad as the long slog towards blocking legacy authentication in Microsoft 365, this is a move towards a baseline level of common sense security controls built into the platform. Administrators will need to work through it and test applications and emergency access accounts but at the end, the benefits of this enforcement are huge. If you’re not sure about how to go about this, reach out to a trusted partner or to your Microsoft account team to get advise.

Leave a comment