Securing cloud resources with Microsoft Entra multifactor authentication and AD FS
If your organization is federated with Microsoft Entra ID, use Microsoft Entra multifactor authentication or Active Directory Federation Services (AD FS) to secure resources that are accessed by Microsoft Entra ID. Use the following procedures to secure Microsoft Entra resources with either Microsoft Entra multifactor authentication or Active Directory Federation Services.
Note
Set the domain setting federatedIdpMfaBehavior to enforceMfaByFederatedIdp
(recommended) or SupportsMFA to $True
. The federatedIdpMfaBehavior setting overrides SupportsMFA when both are set.
Secure Microsoft Entra resources using AD FS
To secure your cloud resource, set up a claims rule so that Active Directory Federation Services emits the multipleauthn claim when a user performs two-step verification successfully. This claim is passed on to Microsoft Entra ID. Follow this procedure to walk through the steps:
Open AD FS Management.
On the left, select Relying Party Trusts.
Right-click on Microsoft Office 365 Identity Platform and select Edit Claim Rules.
On Issuance Transform Rules, click Add Rule.
On the Add Transform Claim Rule Wizard, select Pass Through or Filter an Incoming Claim from the drop-down and click Next.
Give your rule a name.
Select Authentication Methods References as the Incoming claim type.
Select Pass through all claim values.
Click Finish. Close the AD FS Management console.
Trusted IPs for federated users
Trusted IPs allow administrators to bypass two-step verification for specific IP addresses, or for federated users who have requests originating from within their own intranet. The following sections describe how to configure the bypass using Trusted IPs. This is achieved by configuring AD FS to use a pass-through or filter an incoming claim template with the Inside Corporate Network claim type.
This example uses Microsoft 365 for our Relying Party Trusts.
Configure the AD FS claims rules
The first thing we need to do is to configure the AD FS claims. Create two claims rules, one for the Inside Corporate Network claim type and an additional one for keeping our users signed in.
Open AD FS Management.
On the left, select Relying Party Trusts.
Right-click on Microsoft Office 365 Identity Platform and select Edit Claim Rules…
On Issuance Transform Rules, click Add Rule.
On the Add Transform Claim Rule Wizard, select Pass Through or Filter an Incoming Claim from the drop-down and click Next.
In the box next to Claim rule name, give your rule a name. For example: InsideCorpNet.
From the drop-down, next to Incoming claim type, select Inside Corporate Network.
Click Finish.
On Issuance Transform Rules, click Add Rule.
On the Add Transform Claim Rule Wizard, select Send Claims Using a Custom Rule from the drop-down and click Next.
In the box under Claim rule name: enter Keep Users Signed In.
In the Custom rule box, enter:
c:[Type == "https://schemas.microsoft.com/2014/03/psso"] => issue(claim = c);
Click Finish.
Click Apply.
Click Ok.
Close AD FS Management.
Configure Microsoft Entra multifactor authentication Trusted IPs with federated users
Tip
Steps in this article might vary slightly based on the portal you start from.
Now that the claims are in place, we can configure trusted IPs.
Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.
Browse to Conditional Access > Named locations.
From the Conditional Access - Named locations blade, select Configure MFA trusted IPs
On the Service Settings page, under trusted IPs, select Skip multifactor-authentication for requests from federated users on my intranet.
Click save.
That's it! At this point, federated Microsoft 365 users should only have to use MFA when a claim originates from outside the corporate intranet.