| title | Require phishing-resistant multifactor authentication for Microsoft Entra administrator roles |
|---|---|
| description | Create a Conditional Access policy requiring stronger authentication methods for highly privileged roles in your organization. |
| ms.topic | how-to |
| ms.date | 03/24/2026 |
| ms.reviewer | lhuangnorth |
Accounts with privileged administrative roles are frequent targets of attackers. Requiring phishing-resistant multifactor authentication (MFA) for these accounts reduces the risk of compromise.
Caution
Before creating a policy requiring phishing-resistant multifactor authentication, make sure your administrators register the appropriate methods. Enabling this policy without completing this step risks locking you out of your tenant. Administrators can configure Temporary Access Pass to register passwordless authentication methods or follow the steps in register a passkey (FIDO2).
Microsoft recommends requiring phishing-resistant multifactor authentication for at least the following roles:
[!INCLUDE conditional-access-admin-roles]
Organizations can include or exclude roles based on their requirements.
Organizations can use this policy with features like Privileged Identity Management (PIM), which lets you require MFA for role activation.
This article helps your organization create an MFA policy for your environment using authentication strengths. Microsoft Entra ID offers three built-in authentication strengths:
- Multifactor authentication strength (less restrictive)
- Passwordless MFA strength
- Phishing-resistant MFA strength (most restrictive), recommended in this article
Use one of the built-in strengths or create a custom authentication strength based on the authentication methods you want to require.
For external user scenarios, the MFA authentication methods that a resource tenant accepts vary depending on whether the user completes MFA in their home tenant or in the resource tenant. For more information, see Authentication strength for external users.
[!INCLUDE active-directory-policy-exclusions]
[!INCLUDE active-directory-policy-deploy-template]
Warning
If you use external authentication methods, these methods are currently incompatible with authentication strengths. Use the Require multifactor authentication grant control instead.
- Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
- Browse to Entra ID > Conditional Access > Policies.
- Select New policy.
- Name your policy. Create a meaningful naming standard for your organization's policies.
- Under Assignments, select Users or workload identities.
-
Under Include, select Directory roles and choose at least the previously listed roles.
[!WARNING] Conditional Access policies support built-in roles. Conditional Access policies aren't enforced for other role types including administrative unit-scoped or custom roles.
-
Under Exclude, select Users and groups, and choose your organization's emergency access or break-glass accounts.
-
- Under Target resources > Resources (formerly cloud apps) > Include, select All resources (formerly 'All cloud apps').
- Under Access controls > Grant, select Grant access.
- Select Require authentication strength, then select Phishing-resistant MFA strength from the list.
- Select Select.
- Confirm your settings, and set Enable policy to Report-only.
- Select Create to enable your policy.
[!INCLUDE conditional-access-report-only-mode]