The Microsoft Cloud Solution Provider (CSP) program was released in July 2014 to provide a scalable, flexible partner program. Designed to deepen customer relationships and expand business opportunities, the CSP program allows partners to:
To achieve those capabilities, CSP partners need to integrate their backend systems and business processes with various Microsoft cloud services and processes. Once integration has taken place, CSP partners then have the ability to directly provision, manage and support clients within the Microsoft Office 365, Microsoft Azure, Dynamics CRM, and Enterprise Mobility Suite (EMS) product offerings.
The goal of this document is to help CSP organizations to quickly implement Azure Multi-Factor Authentication, part of the Enterprise Mobility Suite (EMS), as a solution for their clients.
This document provides guidance to support the setup and implementation Azure Multi-Factor Authentication (MFA) with Microsoft Online Services.
The scope of this document is the implementation guidelines for implementing Azure Active Directory Premium features and services, such as:
Term | Description |
CSP | Cloud Solution Provider |
EMS | Enterprise Mobility Suite |
AAD | Azure Active Directory |
MFA | Azure Multi-Factor Authentication |
Partner Center | Portal for CSP Partners to administer their CSP offerings http://partnercenter.microsoft.com |
End Customer | Organization that is managed by the CSP Partner |
Azure Co-Administrator | Represents an administrator who can log in to the Azure Portal and deploy or create new resources against a subscription |
SaaS | Software-as-a-Service |
This document assumes that the following conditions have been met:
To provide the best user experience for their organization, there are number of elements to MFA that need to be agreed upon with the end customer.
The following table outlines those features and functions that will need the end customer's agreement. This will allow the CSP Partner to proceed with the configuration of MFA.
CSP Partners can leverage this table to provide the end customer with best practices for their managed service.
For more information, refer to the document Configuring Azure Multi-Factor Authenticationto fit the organization's needs.
MFA Service Setting | Description | End Customer Setting |
App Passwords | In some apps, like Office 2010 or older and Apple Mail, you can't use Multi-Factor Authentication. To use these apps, you'll need to use "app passwords" in place of your traditional password. The app password allows the application to bypass MultiFactor Authentication and continue working. | Enable/Disabled |
Trusted IPs | Trusted IPs is a feature of MultiFactor Authentication that allows administrators of a managed or federated tenant the ability to bypass MFA for users who are signing in from the company's local intranet. The features are available for Azure AD tenants who have Azure AD Premium, Enterprise Mobility Suite, or Azure Multi-Factor Authentication licenses. | Yes/No |
Skip Multi-Factor Authentication for requests from federated users on my intranet | All federated users: All federated users who are signing in from inside the organization will bypass multi-factor authentication using a claim issued by AD FS. | Unselect/Select |
Specific IP address ranges | Administrators can specify a range of IP addresses that can bypass MFA for users who are signing in from the company's intranet. | IP ranges: |
Verification options | It is now possible to choose the authentication methods that are available to your users when using Azure Multi-Factor Authentication. | Methods available to users:
|
Remember Multi-Factor Authentication | Remember Multi-Factor Authentication is a feature that allows you to give users the option to suspend MFA for a set number of days after performing a successful sign-in using MFA. | |
Allow users to remember Multi-Factor Authentication on devices they trust | | Unselect/Select |
Days before a device must re authenticate (160): | | Default: 14 days |
The following sections provide example scenarios for the enablement of MFA for end customer users.
The following table outlines the various statuses seen when using MFA.
Multi-Factor Authentication | Description | Non-browser apps affected |
Disabled | This is the default state for a new user not enrolled or using multi-factor authentication. | No |
Enabled | The user has been enrolled in multifactor authentication but has not completed the registration process. They will be prompted to complete the process at next sign-in. | No |
Enforced | The user has been enrolled in multifactor authentication and completed the registration process. | Yes |
In this example, an individual user account in the end customer AAD tenant requires MFA enabled via the Azure management portal.
The end customer's user will be prompted to complete the MFA registration process the next time they sign in to a Microsoft cloud service. Refer to section Appendix A – End
User MFA Registration Process for an example of the user experience.
In this example, an individual user account
in the end customer AAD tenant requires MFA enabled via PowerShell.
$UserCredential = Get-Credential
Connect-MsolService -Credential $UserCredential
$st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
$st.RelyingParty = "*"
$st.State = "Enabled"
$sta = @($st)
Set-MsolUser -UserPrincipalName <UPN> -StrongAuthenticationRequirements $sta
Example:
Set-MsolUser -UserPrincipalName john.doe@contoso.com -StrongAuthenticationRequirements $sta
When there is a requirement to enable MFA for multiple users within the end customer organization, a CSV file is utilized to perform the bulk update process.
This CSV file is only used for enabling and disabling Multi-Factor Authentication based on the end customer usernames present in the file.
The column headings within the CSV file must match the column headings as shown in the sample file below:
A sample CSV file can be downloaded and used for MFA bulk updates following these steps:
The Username column will need to be modified in order to add all of the end customer usernames that require MFA. Verify that the MFA Status column is set to Enabled.
In this example, bulk users in the end customer AAD tenant requiring MFA enablement will be completed via the Azure management portal.
In this example, bulk users in the end customer AAD tenant who require MFA enablement will be completed via PowerShell.
$UserCredential = Get-Credential
Connect-MsolService -Credential $UserCredential
$st = New-Object -TypeName Microsoft.Online.Administration.StrongAuthenticationRequirement
$st.RelyingParty = "*"
$st.State = "Enabled"
$sta = @($st)
$csvpath = "C:\cspdemoems MFA Users.csv"
$MFAUsers = Import-csv $csvpath
ForEach ($user in $MFAUsers.username) {
Set-MsolUser -UserPrincipalName $User -StrongAuthenticationRequirements $sta
}
Azure conditional access for SaaS apps allows the end customer to configure per-application MFA access rules, as well as the ability to block access for users not on a trusted network.
There are a number of elements to Azure conditional access that need to be agreed upon with the end customer to provide the best user experience for their organization.
The following table outlines the features and functions that need to be agreed upon with the end customer to allow the CSP Partner to proceed with the configuration of Azure conditional access to SaaS apps.
CSP Partners can leverage this table to provide the end customer with best practices for their managed service.
Azure Conditional Access for | Description | End Customer Setting |
Enable access rules | Preview Feature Enables access rules for this SaaS application. | Off/On |
Apply to | Select which users the rules apply to. Rules can be applied to all the users assigned to the application, or only to the users in specified security groups. 'Except' allows you to exempt users from the rules. | All Users/Groups |
All Users | Defines the access rules are applied to all users assigned to the application. | |
All Users - Except | Defines the access rules are applied to all users assigned to the application, except for the group defined. | Enter AD Group Name: |
Groups | Defines the group of users who have the access rules applied. | Enter AD Group Name: |
Rules | Select one of the following rules to require Multi-Factor Authentication or restrict access when a user is not at work. | |
Require Multi-Factor Authentication | With this option, the users to whom the access rules apply will be required to complete MultiFactor Authentication before accessing the application the policy applies to. | Unselect/Select |
Require Multi-Factor Authentication when not at work | With this option, a user who is coming from a trusted IP will not be required to perform MultiFactor Authentication. The trusted IP ranges are configured on the Multi-Factor Authentication settings page. | Unselect/Select |
Block access when not at work | With this option, a user who is not coming from a trusted IP will be blocked. The trusted IP ranges are configured on the Multi-Factor Authentication settings page. | Unselect/Select |
In this example, the following instructions will add Azure access control to the SaaS application,
Twitter for Marketing, created in the "Getting Started with Azure Active Directory Premium for Microsoft Cloud Solution Providers" document.
This process can be repeated for any other SaaS applications that are to be integrated with AAD for the end customer. This Azure access control will add the requirement that all end users assigned to the SaaS application are required to be registered for MFA before access is granted to the application.
The following steps are provided to CSP Partners for informational purposes only. These steps are the required actions that an end customer completes in order to register the authentication methods they configured for themselves. In this example, only the mobile phone used for authentication will be required.
All future logins to Microsoft cloud services will now require Multi-Factor Authentication with either a phone call or text message sent to the registered mobile number.