How to configure an MFA-enabled service account
If your service account is MFA-enabled, you need to use either the Conditional Access or Trusted IP feature in Microsoft 365 to bypass MFA.
Note: To use Conditional Access or Trusted IPs, you need at least a Microsoft Entra ID P1 license.
Steps to configure trusted IPs
- Log in to the Microsoft Entra admin center using your Global Administrator credentials.
- Click Microsoft Entra ID under Azure services.
- Choose Security from the left pane.
- Click Multifactor authentication under the Manage section in the left pane.
- Under Configure, choose the Additional cloud-based multifactor authentication settings option.
- In the pop-up that opens, click Service settings and select Trusted IPs.
- Select the Skip multi-factor authentication for requests from federated users on my intranet option.
- In the text box, enter the IP address of the machine in which you have installed RecoveryManager Plus.
- Click Save.
Steps to configure conditional access
To configure conditional access,
- Log in to Microsoft Entra admin center using your Global Administrator credentials.
- Click Microsoft Entra ID under Azure services.
- Choose Security from the left pane.
- Click Conditional Access under the Protect section in the left pane.
- Click Create new policy.
- Provide a name for the policy.
- In the Users section, click the Select users and groups option.
- Select the Exclude tab.
- Select the Users and groups check box, and choose the RecoveryManager Plus users for whom MFA should not be enforced.
- Click Select.
- Under the Access controls section, click Grant.
- Select the Grant access radio button and the Require multifactor authentication check box.
- Click Select.
- Click Create and then Save.
You can now proceed to add your Microsoft 365 tenant to RecoveryManager Plus using the automatic configuration method or the manual method.