It is good practice to follow the Entra ID Security Defaults, and for some users you will not even be able to turn them off. In addition, Microsoft has enforced MFA for certain accounts accessing Entra ID as of October 2024.
If you are federating SystoLOCK with Entra ID via AD FS, there are a few steps required for Entra ID to recognise your federation as MFA based. You will need to configure both your AD FS setup and your federation setup.
This step may have already been done by another tool such as Entra ID Connect. Check that the entry described below is present.
Open your AD FS management console and navigate to 'Relying Party Trusts'. Find your Microsoft 365 registration there, it will look similar to this:
Select it open Edit claim issuance policy...
in the task pane on the right. Click on Add Rule
, select 'Pass Through or Filter an incoming claim', click Next, name the new rule and select Authentication Methods References
as incoming claim type, click Finish to save the rule and OK to save the rule set.
Open the PowerShell console and execute the following commands, replacing <domain>
with the domain name of your federation:
Import-Module MSOnline
Connect-MsolService
Set-MsolDomainFederationSettings -DomainName <domain> -PromptLoginBehavior NativeSupport -SupportsMFA $true
Get-MsolDomainFederationSettings -DomainName <domain> | ft PromptLoginBehavior,SupportsMfa
# Output:
# PromptLoginBehavior SupportsMfa
# ------------------- -----------
# NativeSupport True
This will tell the tenant that your AD FS is capable of handling MFA authentication natively, so Entra ID will send the appropriate claim with the request, while the claim policy described above will ensure that this authentication type is returned to the requestor.