Skip to content

Commit 4de5811

Browse files
authored
Merge pull request #96021 from juntakata/patch-17
Add how to remove the per-user MFA settings
2 parents 86e389a + ea26bcf commit 4de5811

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -399,6 +399,20 @@ Another MFA-related error message is the one described previously: "Your credent
399399

400400
![Screenshot of the message that says your credentials didn't work.](./media/howto-vm-sign-in-azure-ad-windows/your-credentials-did-not-work.png)
401401

402+
If you've configured a legacy per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting and you see the error above, you can resolve the problem by removing the per-user MFA setting through these commands:
403+
404+
```
405+
# Get StrongAuthenticationRequirements configure on a user
406+
(Get-MsolUser -UserPrincipalName [email protected]).StrongAuthenticationRequirements
407+
408+
# Clear StrongAuthenticationRequirements from a user
409+
$mfa = @()
410+
Set-MsolUser -UserPrincipalName [email protected] -StrongAuthenticationRequirements $mfa
411+
412+
# Verify StrongAuthenticationRequirements are cleared from the user
413+
(Get-MsolUser -UserPrincipalName [email protected]).StrongAuthenticationRequirements
414+
```
415+
402416
If you haven't deployed Windows Hello for Business and if that isn't an option for now, you can configure a Conditional Access policy that excludes the Azure Windows VM Sign-In app from the list of cloud apps that require MFA. To learn more about Windows Hello for Business, see [Windows Hello for Business overview](/windows/security/identity-protection/hello-for-business/hello-identity-verification).
403417

404418
> [!NOTE]

0 commit comments

Comments
 (0)