shopping cart   0



TOKEN2 Blog

Delegation of rights in Azure MFA

integration guides

07-12-2021

Azure administrators need to have Global Administrator role to work with MFA, particularly to import and activate OATH tokens. Sometimes they want to delegate this task to service desk team, but to achieve this they need to delegate GA rights too. In this article, we would like to talk about a couple of solutions that would be usefull for administrators in managing MFA.
Definitely CSV file with tokens can be uploaded only with Global Admin role and there are no ways around it.
So, Global Administrator uploads the CSV file and activates tokens for all users. Activating tokens at once for all users can be done using our bulk activation tool. After this has been done for all users, there are some workarounds to delegate the remaining tasks to other type of tenant administators.

Below are the methods by which the administrator can partially delegate the rights to enable / disable MFA for users.

Method 1. Through Conditional Access

Administrator creates Conditional Access rule with MFA Enforced Group, delegates User Administrator role to service desk team.
This role is enough to be able to add a user to the group to activate MFA. If necessary, they can exclude user from this group and thus disable MFA for this user.



Method 2. Enable/Disable MFA for each user with Power Shell

Administrator delegates Authentication Administrator or Privileged Authentication Administrator roles to service desk team.

PS C:> Connect-MsolService

This cmdlet attempts to initiate a connection to Azure Active Directory.

PS C:> Get-MsolUser | fl UserPrincipalName, StrongAuthenticationRequirements

This cmdlet with pipeline shows status of MFA for all users:

StrongAuthenticationRequirements : {} - MFA is disabled
StrongAuthenticationRequirements : {Microsoft.Online.Administration .StrongAuthenticationRequirement}- MFA is enabled

To enable MFA :

PS C:> $mf= New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
PS C:> $mf.RelyingParty = "*"
PS C:> $mfa = @($mf)
PS C:> Set-MsolUser -UserPrincipalName [email protected]token2.com -StrongAuthenticationRequirements $mfa


To disable MFA :

PS C:> Get-MsolUser -UserPrincipalName [email protected] | Set-MsolUser -StrongAuthenticationRequirements @()


⚠ Please note that Azure AD Premium P1 or P2 license is required for Conditional access and OATH hardware tokens import features