SC‑300 Study Portal Path 3

Unit 5: Configure Multifactor Authentication Methods

Registration Process

When users sign into an application that requires MFA for the first time, they must register a verification method. This registration flow ensures the user selects a method they can access consistently. For every sign-in that requires MFA, users must complete verification using their registered method.

Authentication Methods and Service Support

Authentication Methods and Service Support

Why Some Methods Are SSPR‑Only: These methods are not strong enough or not secure enough to be used as MFA during sign-in. They are only meant to help a user recover their password — not to secure access to resources.

Authentication Method MFA SSPR Reason
Password ✔️ ✔️ Primary credential used in both flows.
Security Questions ✔️ Weak, knowledge‑based; not secure enough for MFA.
Email Address ✔️ Email can be compromised; not a strong second factor.
Windows Hello for Business ✔️ ✔️ TPM‑backed keys and biometrics; strong authentication.
FIDO2 Security Key ✔️ ✔️ Phishing‑resistant hardware key.
Microsoft Authenticator App ✔️ ✔️ Strong possession factor; supports push and OTP.
OATH Hardware Token ✔️ ✔️ TOTP codes; secure one‑time passwords.
OATH Software Token ✔️ ✔️ App‑based TOTP; strong enough for MFA.
Text Message (SMS) ✔️ ✔️ Accepted possession factor; widely supported.
Voice Call ✔️ ✔️ Phone‑based verification; similar to SMS.
App Passwords ✔️ (limited) Legacy workaround for non‑modern auth apps.

Method Details

Security Questions

Windows Hello for Business

FIDO2 Security Keys

Microsoft Authenticator App

OATH Tokens

OATH Hardware Tokens

OATH Software Tokens

Text Message and Voice Call

App Passwords

Monitoring MFA and SSPR Adoption

Microsoft Entra ID provides monitoring through Usage and Insights. Administrators can track:

This information helps identify training needs or problematic authentication methods.