1. Home
  2. Training Library
  3. Microsoft Azure
  4. Courses
  5. Implementing Multi-Factor Authentication on Azure

Configure Bypass Options

The course is part of these learning paths

AZ-500 Exam Preparation: Microsoft Azure Security Technologies
course-steps 11 certification 1 lab-steps 3
AZ-103 Exam Preparation: Microsoft Azure Administrator
course-steps 15 certification 6 lab-steps 7
AZ-203 Exam Preparation: Developing Solutions for Microsoft Azure
course-steps 20 certification 1 lab-steps 7
Azure Services for Security Engineers
course-steps 8 certification 4 lab-steps 3
more_horiz See 2 more

Contents

keyboard_tab
Introduction
1
Introduction
FREE1m 36s
Summary
10
Summary
3m 3s
play-arrow
Start course
Overview
DifficultyIntermediate
Duration24m
Students480
Ratings
4.8/5
star star star star star-half

Description

Course Overview

Multi-factor authentication or MFA is no longer optional, and it is paramount that you protect not only your privileged accounts but enable it for all accounts. Azure Active Directory offers the ability to secure your identities with an additional authentication method. Verification of your identity can be done via an automated voice call, text message, through the Microsoft Authenticator app, or with a verification code.

Azure multi-factor authentication can be enforced using different methods. We will configure the user settings to give the ability to a user to report fraudulent attempts on their accounts. We will also review how an administrator can provide a one-time bypass code and whitelist trusted locations to bypass the two-step verification. Lastly, you will see how to configure Azure Active Directory conditional access to enforce MFA on cloud-based applications.

Learning Objectives

  • Identify the different methods of enabling two-step verification
  • Configure multi-factor authentication for users
  • Configure settings for MFA
  • Implement Azure Active Directory conditional access for MFA

Intended Audience

  • People who want to become Azure administrators
  • People preparing for Microsoft’s AZ-101 or AZ-300 exam

Prerequisites

  • General knowledge of Azure Active Directory

Related Training Content

To see more Microsoft Azurecontent, visit our Azure Training Library.

Transcript

The one-time bypass feature of Azure Multi-Factor Authentication is used as a single time to bypass the two-step verification. As an example, if a user lost their phone, they could not complete the two-step verification. In this instance, they would need to contact an administrator to bypass the two-step verification. Once a user is added to the one-time bypass list, it goes into effect immediately and expires after the specified time. The default period is 300 seconds or five minutes. 

Back in the Azure Portal where we will allow a user to bypass the two-step verification. In Azure Active Directory under Security, select MFA and then select One-time bypass. On the One-time bypass page, you can change the global default from 300 seconds to between five and 1,800 seconds. To add a user to bypass the two-step verification, select Add. Add the user name under User. You can change the default seconds and enter a reason for the one-time bypass and click OK. Now the user can log in and bypass the two-step verification, but remember that this is only one time or single bypass of the two-step verification.

About the Author

Students927
Courses2

With over 15 years of experience in the IT industry, Eric Leonard is a Microsoft Azure MVP and a Cloud Solution Architect. Eric’s experience working with Microsoft technologies, with a strong emphasis on cloud and automation solutions, enables his clients to succeed in today’s technological environment. Eric has worked for clients in a variety of different industries including large and small enterprises, the public sector, professional services, education, and communications.

When he is not working, Eric believes in sharing his knowledge and giving back to the IT community. He is the co-organizer of the Ottawa IT community meetup, which has over 1,000 members, and he enjoys presenting and mentoring in the community.