Microsoft Entra ID
You can configure Microsoft Entra ID as an authentication factor for users who are part of the directory to verify their identities securely.
Prerequisites
Note: Linked Source Authentication is currently supported only for Identity360 portal and enterprise application logins.
Steps to configure Microsoft Entra ID authentication
- Navigate to the Applications tab and go to Multi-factor Authentication > Authenticators Setup.
- Select Azure Active Directory.
- Enable the Azure Active Directory toggle.
- Under the Log on Using section, click the no
icon to enable MFA for the respective directory and click the yes
icon to disable it.
Note: Ensure that at least one directory is enabled to use this authenticator.
- Click Save.
- If you wish to modify or disable the authenticator, click the vertical ellipsis in the top-right corner of the Microsoft Entra ID authenticator, and then click the edit
icon to modify it, or click the no
icon to disable it.