Active Directory Fundamentals

Setting up MFA policies in hybrid environments

Hybrid MFA basics: where MFA can be enforced

1) Entra ID (cloud sign-ins) — the best control plane

For cloud apps (Microsoft 365, Azure, SaaS apps, Entra Application Proxy apps), the cleanest approach is: Conditional Access (CA) → require MFA under the right conditions (risk, location, device, app, etc.). If you’re still using “per-user MFA,” treat it as a legacy mechanism and migrate to CA-based policies.

If you need a refresher on building CA policies, see: How to use Azure AD Conditional Access to enforce access policies.

2) Authentication path matters (PHS vs PTA vs AD FS)

In hybrid environments, users typically authenticate using one of these models:

  • Password Hash Sync (PHS): Cloud validates credentials (fastest, simplest for most orgs).
  • Pass-through Authentication (PTA): Cloud forwards auth to on-prem agent for validation.
  • AD FS (federation): Auth happens on-prem; tokens issued for cloud resources.

The model impacts where you can reliably enforce MFA. CA can still apply to cloud sign-ins, but AD FS can enforce MFA for federated auth flows too—at the cost of more complexity and more moving parts.

For a straightforward hybrid sign-in option, see: How to enable Azure AD Pass-through authentication? and for federation concepts: Azure AD Federation Basics.

3) On-prem access paths: Windows sign-in, VPN, RD Gateway, legacy apps

On-prem “MFA” can mean different things:

  • Interactive Windows sign-in: Prefer Windows Hello for Business (phishing-resistant) + device compliance.
  • VPN / RADIUS apps: Enforce MFA via NPS extension for Azure MFA (or vendor integration).
  • Publishing on-prem web apps: Put Entra Application Proxy in front and use CA for MFA.
  • AD FS-protected apps: Enforce MFA in AD FS policies/adapters (complex but sometimes required).

The key is to avoid “random MFA islands.” Your users should experience consistent prompts based on consistent triggers.

Prerequisites and guardrails (don’t skip)

Licensing and features

  • Conditional Access: typically requires Entra ID P1 (or bundle such as Microsoft 365 E3/E5 equivalents depending on your plan).
  • Risk-based policies: user/sign-in risk (Identity Protection) typically requires Entra ID P2.
  • Device-based controls: you’ll want Intune or another MDM plus compliant/hybrid joined device strategy.

Emergency access (“break-glass”) accounts

Create at least two cloud-only emergency admin accounts with long, unique passwords stored securely (offline), excluded from most CA policies, and monitored aggressively. These are for “CA misconfiguration locked us out” scenarios, not day-to-day use.

Modern authentication baseline

  • Inventory legacy protocols (POP/IMAP/SMTP AUTH, older Office clients, basic auth endpoints).
  • Block legacy authentication where possible (often a separate CA policy).
  • Ensure MFA registration is rolled out before enforcement (or use “registration campaign”/combined registration).

Hybrid health: syncing and federation reliability

MFA policy rollouts expose weak identity plumbing. Make sure your hybrid identity stack is healthy (sync, federation, agents, etc.). If you use Azure AD Connect, monitoring helps you catch issues early: Azure AD Connect Health – Troubleshooting Hybrid identity scenarios.

A practical MFA policy model for hybrid orgs

The biggest mistake is building one giant “Require MFA for all users for all apps” rule with a pile of exclusions. Instead, design layered policies that are: role-aware, risk-aware, context-aware, and rollout-friendly.

Principles

  1. Admins first: protect privileged roles before broad end-user enforcement.
  2. Start with “report-only”: validate impact before enforcing.
  3. Prefer phishing-resistant methods for sensitive access: FIDO2 / WHfB / cert-based where possible.
  4. Minimize prompts: use trusted locations, compliant devices, and sign-in frequency thoughtfully.
  5. Separate humans vs non-humans: service accounts, automation, and app identities shouldn’t be “MFA’d” like users—use managed identities, certificates, or workload identity controls instead.

Recommended policy layers

Layer Who When What you enforce
Privileged baseline Admins / privileged roles Always MFA (prefer phishing-resistant), block legacy auth
External access All users Outside trusted locations Require MFA
Device trust All users (or high-impact apps) When device not compliant/hybrid joined Require MFA or block
Risk-based All users Sign-in/user risk elevated Require MFA + step-up controls (or password reset)
Guest / B2B Guests Always or high-risk contexts Require MFA, restrict session

Where to learn MFA fundamentals quickly

If you want the full conceptual backdrop (methods, enrollment, troubleshooting), read: Azure MFA – All you need to know!.

Implementation steps in Entra Conditional Access

The steps below assume you’re enforcing MFA primarily through Conditional Access (recommended for hybrid). Keep your first iterations small, measurable, and reversible.

Step 1: Create a pilot group

  • Create an “MFA-Pilot-Users” group (and optionally “MFA-Pilot-Admins”).
  • Include IT + a few cooperative business users across device types and locations.

Step 2: Build an “Admins require MFA” policy (Report-only → On)

  1. Users: Directory roles (or your admin groups).
  2. Cloud apps: All cloud apps (or start with Microsoft Admin Portals).
  3. Conditions: optional initially; keep it simple.
  4. Grant: Require MFA (or “Require authentication strength” if you’re enforcing phishing-resistant methods).
  5. Session: keep defaults initially; avoid aggressive sign-in frequency until behavior is understood.
  6. Enable: Report-only for 3–7 days, review logs, then switch to On.

Step 3: Build an “External access require MFA” policy

  1. Users: Pilot group first.
  2. Apps: Office 365 + key SaaS apps (expand later).
  3. Conditions → Locations: Exclude trusted named locations (HQ IP ranges, VPN egress IPs).
  4. Grant: Require MFA.

Step 4: Add device-based controls (optional, but powerful)

For sensitive apps, require a compliant device or hybrid-joined device, and use MFA as a step-up when that isn’t true. This reduces prompt fatigue for managed devices while still protecting unmanaged access.

Step 5: Block legacy authentication (carefully)

Legacy auth is often where attackers live. Create a dedicated CA policy to block legacy clients/protocols. Start in report-only, identify who/what breaks, fix or replace, then enforce.

Step 6: Establish “MFA registration before enforcement”

A smooth rollout depends on pre-registration. Run an enablement campaign:

  • Communicate what users will see and when.
  • Ensure at least two methods per user where feasible (app + phone as fallback, for example).
  • Consider excluding specific high-impact service desks temporarily while you train them, but don’t let “temporary” become permanent.

Extending MFA to on-prem apps, VPN, and RADIUS

Option A: Put cloud in front of on-prem apps (recommended when possible)

If you can publish an internal web app through Entra Application Proxy, you get: consistent cloud sign-in logs, Conditional Access, and MFA enforcement without redesigning the app.

Option B: VPN / RADIUS via NPS extension (common and effective)

For VPNs and appliances that speak RADIUS, integrate them with NPS and use the Azure MFA extension. This gives you a straightforward “second factor” step on remote network access.

  • Define which users/groups require MFA for VPN access.
  • Keep break-glass access paths documented for emergencies.
  • Test all client types (Windows/macOS/mobile) and edge cases (captive portals, timeouts).

Option C: AD FS MFA (only when you must)

If you’re federated, MFA can be enforced in AD FS itself. This can be necessary for certain legacy integrations, but it increases operational complexity (AD FS servers, proxies, certificates, and high availability). If you’re maintaining federation, keep a strong monitoring posture and regularly test failover.

Rollout plan: pilot → broad deployment

  1. Week 1: Admin policy (report-only → on), fix “who will get blocked” issues.
  2. Week 2: Pilot group for end users, external access MFA, tune trusted locations.
  3. Week 3–4: Expand to all users, introduce device controls for sensitive apps.
  4. Week 5+: Block legacy authentication (after remediation), add risk-based controls if licensed.

Common rollout pitfalls

  • Too many prompts: caused by poor location/device strategy or overly aggressive sign-in frequency.
  • Service accounts included: non-interactive accounts can break. Use proper app identities.
  • Lockout events: no emergency access accounts or poor exclusions.
  • Unclear support path: help desk isn’t trained on MFA resets, device registration, and CA troubleshooting.

Monitoring and troubleshooting

Use sign-in logs like a debugger

  • Filter by user, app, status, and Conditional Access result.
  • Confirm which policy applied and why.
  • Check device state (compliant? hybrid joined?) and location detection (named location matched?).

Validate changes safely

  • Prefer Report-only for every new policy iteration.
  • Test with a “break it” checklist: unmanaged device, foreign IP, legacy client, guest, admin portal, VPN, etc.
  • Maintain a short “rollback playbook” (what to disable first if access issues occur).

Hybrid-specific checks

  • If PTA: confirm agent health and connectivity.
  • If AD FS: confirm token issuance, MFA adapter behavior, and proxy reachability.
  • If sync: confirm account state/UPN alignment and object health.

Ready-to-use policy templates

Template 1: “Admins — require strong MFA everywhere”

  • Users: Admin roles (or admin groups)
  • Apps: All cloud apps
  • Grant: Require MFA (prefer phishing-resistant / authentication strength if available)
  • Exclusions: Break-glass accounts (still monitored)
  • Mode: Report-only → On

Template 2: “Users — require MFA from outside trusted locations”

  • Users: All users (start with pilot)
  • Apps: Office 365 + key SaaS apps
  • Conditions: Exclude named locations; optionally exclude compliant devices to reduce prompts
  • Grant: Require MFA

Template 3: “Block legacy authentication”

  • Users: All users (careful with service accounts)
  • Client apps: Legacy authentication clients
  • Grant: Block access
  • Mode: Report-only until remediated

Template 4: “Guests — require MFA + restricted session”

  • Users: Guest/external users
  • Apps: Sensitive apps (SharePoint/Teams/line-of-business)
  • Grant: Require MFA
  • Session: Consider limited session controls for unmanaged access

Template 5: “High-risk sign-ins — step-up controls” (if licensed)

  • Users: All users
  • Conditions: Sign-in risk = medium/high (or user risk)
  • Grant: Require MFA (and optionally require password change for high user risk scenarios)

FAQs

Should I use per-user MFA?

Prefer Conditional Access for policy-based enforcement. Per-user MFA is hard to scale consistently in hybrid environments and doesn’t express context (device, location, risk) nearly as well.

How do I reduce MFA prompt fatigue?

Use trusted named locations, device compliance, and sensible session controls. Avoid stacking multiple “require MFA” policies that trigger together. Keep policies targeted and layered.

What’s the safest first policy to turn on?

Admin MFA (report-only → on) is usually the best first move. It provides a big security gain with a small, controlled user population.

What breaks most often in hybrid MFA rollouts?

Legacy authentication, non-interactive/service accounts included in user policies, incomplete MFA registration, and misconfigured trusted locations are the usual culprits.

Related posts
Active Directory Fundamentals

Migrating from AD FS to Azure AD SSO

Active Directory FundamentalsActive Directory PoliciesUncategorized

Role-based access control (RBAC) in Azure

Active Directory Fundamentals

Federation strategies using Entra

Active Directory Fundamentals

Tracking privilege escalation in Azure AD

×

There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from Identitude.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.