Skip to content

Commit d1f0a71

Browse files
authored
Merge pull request #53860 from MicrosoftDocs/NEW-manage-implement-authentication-methods
New manage implement authentication methods
2 parents 9d7c242 + 551a6bf commit d1f0a71

22 files changed

Lines changed: 632 additions & 0 deletions
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.manage-implement-authentication-methods.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: Introduction to implementing and managing authentication methods in Microsoft Entra ID for Contoso's hybrid environment.
7+
ms.date: 03/05/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
ai-usage: ai-assisted
12+
durationInMinutes: 2
13+
content: |
14+
[!include[](includes/1-introduction.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.manage-implement-authentication-methods.explore-authentication-methods
3+
title: Explore Microsoft Entra ID authentication methods
4+
metadata:
5+
title: Explore Microsoft Entra ID Authentication Methods
6+
description: Explore the spectrum of Microsoft Entra ID authentication methods, from password-based to passwordless, and understand authentication strength and security hierarchy.
7+
ms.date: 03/04/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
ai-usage: ai-assisted
12+
durationInMinutes: 5
13+
content: |
14+
[!include[](includes/2-explore-authentication-methods.md)]
15+
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.manage-implement-authentication-methods.configure-mfa
3+
title: Configure multifactor authentication in Microsoft Entra ID
4+
metadata:
5+
title: Configure Multifactor Authentication in Microsoft Entra ID
6+
description: Learn how to deploy and configure multifactor authentication (MFA) in Microsoft Entra ID using Conditional Access policies, named locations, and secure user registration.
7+
ms.date: 03/04/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
ai-usage: ai-assisted
12+
durationInMinutes: 5
13+
content: |
14+
[!include[](includes/3-configure-mfa.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.manage-implement-authentication-methods.implement-passwordless-authentication
3+
title: Implement passwordless authentication in Microsoft Entra ID
4+
metadata:
5+
title: Implement Passwordless Authentication in Microsoft Entra ID
6+
description: Learn how to deploy Windows Hello for Business, passkeys in Microsoft Authenticator, and FIDO2 security keys in Microsoft Entra ID — and match each method to the right user persona.
7+
ms.date: 03/04/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
ai-usage: ai-assisted
12+
durationInMinutes: 5
13+
content: |
14+
[!include[](includes/4-implement-passwordless-authentication.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.manage-implement-authentication-methods.configure-self-service-password-reset
3+
title: Configure self-service password reset in Microsoft Entra ID
4+
metadata:
5+
title: Configure Self-Service Password Reset in Microsoft Entra ID
6+
description: Learn how to deploy and configure self-service password reset (SSPR) in Microsoft Entra ID — including licensing requirements, SSPR-eligible authentication methods, registration enforcement, password writeback, and activity monitoring.
7+
ms.date: 03/05/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
ai-usage: ai-assisted
12+
durationInMinutes: 5
13+
content: |
14+
[!include[](includes/5-configure-self-service-password-reset.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.manage-implement-authentication-methods.exercise-configure-authentication-methods
3+
title: "Exercise - Configure authentication methods in Microsoft Entra ID"
4+
metadata:
5+
title: "Exercise - Configure Authentication Methods in Microsoft Entra ID"
6+
description: "Hands-on exercise: enable the MFA registration policy in Identity Protection, require MFA for cloud admin portals using Conditional Access, and enable phishing-resistant sign-in with passkeys (FIDO2) in Microsoft Entra ID."
7+
ms.date: 03/13/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
ai-usage: ai-assisted
12+
durationInMinutes: 2
13+
content: |
14+
[!include[](includes/6-exercise-configure-authentication-methods.md)]
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.manage-implement-authentication-methods.knowledge-check
3+
title: Module assessment
4+
metadata:
5+
title: Module assessment
6+
description: "Knowledge check"
7+
ms.date: 03/05/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
module_assessment: true
12+
ai_generated_module_assessment: false
13+
durationInMinutes: 3
14+
quiz:
15+
title: ""
16+
questions:
17+
- content: "An organization wants to enforce phishing-resistant MFA for its privileged administrators. Which of the following authentication methods qualifies as phishing-resistant?"
18+
choices:
19+
- content: "SMS one-time passcode"
20+
isCorrect: false
21+
explanation: "SMS OTP is susceptible to SIM-swapping and real-time phishing attacks, so it doesn't qualify as phishing-resistant."
22+
- content: "FIDO2 security key"
23+
isCorrect: true
24+
explanation: "FIDO2 security keys use public-key cryptography bound to the origin, making them resistant to phishing and credential replay attacks."
25+
- content: "OATH hardware token"
26+
isCorrect: false
27+
explanation: "OATH TOTP codes are time-based passcodes that are often intercepted and replayed by a phishing site, so they aren't phishing-resistant."
28+
- content: "A security architect is designing MFA enforcement for all users in a Microsoft Entra ID tenant. Which mechanism does Microsoft recommend over per-user MFA or security defaults for most organizations?"
29+
choices:
30+
- content: "Enabling security defaults in the Microsoft Entra admin center"
31+
isCorrect: false
32+
explanation: "Security defaults are a baseline for organizations without a Microsoft Entra ID P1/P2 license and don't offer the granular control that most organizations need."
33+
- content: "Enabling per-user MFA for every account"
34+
isCorrect: false
35+
explanation: "Per-user MFA is a legacy approach that lacks the context-awareness and flexibility of modern policy-driven enforcement."
36+
- content: "Using Conditional Access policies to require MFA"
37+
isCorrect: true
38+
explanation: "Conditional Access is the recommended MFA enforcement mechanism because it allows granular, risk-based, and context-based rules that can target specific users, apps, and conditions."
39+
- content: "A company is deploying passwordless authentication. Frontline workers share physical kiosks in a warehouse and don't have assigned Windows laptops. Which passwordless method is the best fit for this persona?"
40+
choices:
41+
- content: "Windows Hello for Business"
42+
isCorrect: false
43+
explanation: "Windows Hello for Business stores credentials on a specific device, making it unsuitable for shared kiosk scenarios where multiple workers use the same hardware."
44+
- content: "FIDO2 security key"
45+
isCorrect: true
46+
explanation: "FIDO2 security keys are portable and device-independent, making them ideal for shared or unassigned devices where workers need to authenticate without a dedicated corporate laptop."
47+
- content: "Synced passkey stored in a password manager"
48+
isCorrect: false
49+
explanation: "Synced passkeys are best suited for BYOD scenarios where users authenticate from their own personal devices across multiple platforms."
50+
- content: "An administrator is reviewing which authentication methods are eligible for self-service password reset (SSPR). Which of the following methods is NOT supported for SSPR?"
51+
choices:
52+
- content: "Mobile app code (TOTP from Microsoft Authenticator)"
53+
isCorrect: false
54+
explanation: "The Microsoft Authenticator app code (TOTP) is a supported SSPR method that users can register and use to verify their identity during a reset."
55+
- content: "FIDO2 security key / passkey"
56+
isCorrect: true
57+
explanation: "FIDO2 security keys and passkeys are sign-in-only credentials. They can confirm a sign-in but aren't available as verification methods during a self-service password reset flow."
58+
- content: "Email address verification"
59+
isCorrect: false
60+
explanation: "Email is a supported SSPR method and is commonly used as an alternate contact verification option."
61+
- content: "A help desk technician needs to onboard a new employee who has no existing authentication methods registered. The technician wants to issue a short-lived credential that lets the employee securely complete first-time MFA registration. Which feature is designed for this purpose?"
62+
choices:
63+
- content: "Send a password"
64+
isCorrect: false
65+
explanation: "Sending a password doesn't provide a secure, time-limited credential for first-time authentication registration."
66+
- content: "A Conditional Access policy scoped to the 'Register security information' user action"
67+
isCorrect: false
68+
explanation: "This policy controls who can register, but it doesn't itself provide a credential that allows an unregistered user to authenticate for the first time."
69+
- content: "Temporary Access Pass (TAP)"
70+
isCorrect: true
71+
explanation: "TAP is a time-limited passcode issued by an admin that allows a user with no existing methods to sign in and bootstrap their first MFA registration, including passkeys and FIDO2 keys."
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.manage-implement-authentication-methods.summary
3+
title: Summary
4+
metadata:
5+
title: Summary
6+
description: Summary of implementing and managing authentication methods in Microsoft Entra ID, including MFA, passwordless authentication, and SSPR.
7+
ms.date: 03/05/2026
8+
author: r-c-stewart
9+
ms.author: roberts
10+
ms.topic: unit
11+
ai-usage: ai-generated
12+
durationInMinutes: 2
13+
content: |
14+
[!include[](includes/8-summary.md)]
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
In this module, you implement and manage authentication methods in Microsoft Entra ID, including multifactor authentication (MFA), passwordless authentication, and self-service password reset (SSPR). You learn to deploy modern authentication solutions that balance security with user experience.
2+
3+
## Scenario
4+
5+
You're a security engineer at Contoso Corporation, a healthcare technology company that's modernizing from on-premises Active Directory to a hybrid cloud environment. Your CISO has issued a mandate: all users must use multifactor authentication and passwordless sign-in within 90 days to meet new compliance requirements and reduce the risk of credential-based attacks.
6+
7+
Your help desk currently processes over 200 password reset requests weekly, costing approximately $50 per incident. Recent phishing attempts targeting employee credentials have heightened security concerns, especially as Contoso expands into AI-powered healthcare analytics using Azure AI Foundry and Microsoft Copilot for Microsoft 365.
8+
9+
Your task is to implement a comprehensive authentication strategy that strengthens security, improves user experience, and reduces operational overhead.
10+
11+
## Learning objectives
12+
13+
In this module, you will:
14+
15+
- Configure and deploy multifactor authentication (MFA) for users and groups.
16+
- Implement passwordless authentication methods including FIDO2, Windows Hello for Business, and Microsoft Authenticator.
17+
- Configure self-service password reset (SSPR) with appropriate authentication methods.
18+
- Design authentication policies that balance security requirements with user experience.
19+
- Monitor authentication activity and troubleshoot common authentication issues.
20+
- Configure authentication methods for AI-powered services and applications.
21+
22+
## Prerequisites
23+
24+
- Azure administrative experience.
25+
- Basic understanding of Microsoft Entra ID concepts.
26+
- Familiarity with identity and access management principles.
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
Imagine you're a security engineer at Contoso, a mid-sized healthcare technology company. Over the past year, your team responded to three separate incidents involving compromised user credentials — each traced back to phishing attacks or credential-stuffing campaigns. Your manager asks you to evaluate Contoso's current authentication strategy and recommend a path toward eliminating password-related breaches. To do that effectively, you need to understand the full spectrum of authentication methods available in Microsoft Entra ID and how they compare in terms of security and user experience.
2+
3+
## The authentication methods landscape
4+
5+
Microsoft Entra ID supports a broad range of authentication methods, from legacy password-based approaches to modern passwordless alternatives. These methods fall into categories based on what the user presents to prove their identity:
6+
7+
- **Something you know**: Passwords and PINs
8+
- **Something you have**: A registered device, a security key, or an authenticator app
9+
- **Something you are**: Biometrics, such as a fingerprint or facial recognition
10+
11+
Password-based authentication — where a user provides a username and password — remains the most widely deployed method, but also the most vulnerable. Passwords can be phished, guessed, or stolen through data breaches. For organizations like Contoso, passwords alone represent an unacceptable risk.
12+
13+
Modern passwordless methods eliminate the password entirely. Instead of typing a password, users authenticate using a combination of device possession and a biometric or PIN. Methods like FIDO2 security keys, Windows Hello for Business, and passkeys are natively phishing-resistant because no shareable secret is transmitted during sign-in. Microsoft Authenticator passwordless sign-in is a strong improvement over passwords, but requires Conditional Access policies enforcing managed devices to achieve the same level of phishing resistance.
14+
15+
:::image type="content" source="../media/authentication-methods-spectrum.png" alt-text="Diagram showing the spectrum from password-only authentication on the left, through password plus MFA in the middle, to fully passwordless methods on the right, with security strength increasing from left to right.":::
16+
17+
## Multifactor authentication as the bridge
18+
19+
For organizations that can't immediately move to passwordless, **multifactor authentication (MFA)** provides a critical intermediate security layer. MFA requires users to verify their identity using two or more factors from different categories — for example, something they know (a password) combined with something they have (a registered phone).
20+
21+
Microsoft Entra ID supports several MFA methods:
22+
23+
| Method | Type | Security level |
24+
|---|---|---|
25+
| Microsoft Authenticator push notification | App-based | High |
26+
| Microsoft Authenticator TOTP code | App-based | High |
27+
| OATH TOTP hardware token | Hardware | High |
28+
| SMS one-time passcode | Phone | Low-medium |
29+
| Voice call verification | Phone | Low-medium |
30+
31+
> [!NOTE]
32+
> FIDO2 security keys and passkeys in Microsoft Authenticator are passwordless, phishing-resistant methods — they replace the password entirely rather than acting as a second factor behind one. They appear in the security hierarchy in the next section.
33+
34+
> [!IMPORTANT]
35+
> SMS and voice call verification are considered legacy MFA methods. They're vulnerable to SIM-swapping attacks. Microsoft recommends migrating users away from these methods toward app-based or hardware-based alternatives.
36+
37+
The next unit on multifactor authentication explores how to configure and enforce these methods across your user population.
38+
39+
## Authentication strength and security hierarchy
40+
41+
Not all MFA methods offer the same level of protection. Microsoft Entra ID introduces the concept of **authentication strength**, which lets you specify the minimum acceptable MFA method required to access a given resource through Conditional Access policies.
42+
43+
The security hierarchy, from least to most secure, is:
44+
45+
- Password only (no MFA)
46+
- Password + SMS or voice call
47+
- Password + Microsoft Authenticator app
48+
- Passwordless sign-in (Windows Hello for Business, FIDO2 security keys, passkeys in Microsoft Authenticator, certificate-based authentication)
49+
50+
For sensitive resources — such as administrative portals or financial systems — authentication strength policies let you require **phishing-resistant MFA**. Microsoft Entra ID's built-in phishing-resistant strength covers four method families: Windows Hello for Business, FIDO2 security keys, passkeys in Microsoft Authenticator, and certificate-based authentication (CBA). This distinction is critical when designing access policies for Contoso's privileged accounts.
51+
52+
> [!TIP]
53+
> Authentication strength policies are applied per application. You can require phishing-resistant MFA for your most sensitive systems while allowing standard MFA for lower-risk applications — balancing security with user experience. This per-resource granularity is the technical expression of Zero Trust's "verify explicitly" principle: every access request is evaluated against the authentication strength required for that specific resource, not a blanket organization-wide setting.
54+
55+
## Microsoft Entra ID authentication architecture
56+
57+
When a user signs in, the request flows through the **Microsoft identity platform**, the cloud-native authentication engine behind Microsoft Entra ID. The platform evaluates the user's credentials, applies Conditional Access policies, and issues tokens upon successful authentication.
58+
59+
:::image type="content" source="../media/entra-authentication-architecture.png" alt-text="Diagram showing the Microsoft Entra ID authentication flow. A user device on the left sends a sign-in request to the Microsoft identity platform in the center, which applies Conditional Access policies before issuing tokens to the target application on the right.":::
60+
61+
For devices joined to Microsoft Entra ID, a **Primary Refresh Token (PRT)** is issued after the first successful sign-in. The PRT enables single sign-on (SSO) across apps and services without requiring re-authentication — a meaningful gain in user experience that complements the security improvements from stronger authentication methods.
62+
63+
Understanding this architecture helps you anticipate how changes to authentication policies affect users and applications across the organization. Importantly, the same authentication policies that govern access to Microsoft 365 and Azure management also apply to AI-powered services like Azure AI Foundry and Microsoft Copilot for Microsoft 365 — making strong authentication the first line of defense for Contoso's AI investments as well. With this foundation in place, you're ready to dive into configuring multifactor authentication in the next unit.

0 commit comments

Comments
 (0)