We're Hiring!
Take the next step in your career and work on diverse technology projects with cross-functional teams.
LEARN MORE
Mountain West Farm Bureau Insurance
office workers empowered by business technology solutions
BLOG
3
8
2018

Securing Azure Active Directory Administrators with Multi-Factor Authentication

Last updated:
8.9.2021

According to Centrify, in 2016 more than one billion credential records were stolen. Enabling Multi-Factor Authentication (MFA) is one of the best ways to prevent unauthorized users access to data

.MFA in Azure is free for your global administrators and is included with the following licensing options:

Review licensing options here.

Anyone looking to implement MFA should take into consideration recommendations and guidance from organizations such asThe National Institute of Standards and Technology’sand thePCI Standards Council.

Something to note is The National Institute of Standards and Technology’s stance discouraging the use of two-factor authentication systems that use SMS. NIST brings attention to “risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN (Public Switched Telephone Network) to deliver an out-of-band authentication secret.”

While we regularly utilize Azure MFA, there was a recent scenario in which we worked with a client to enable MFA for users with administrative access to production resources. To name a few, but not limited to, resources such as Azure subscriptions, SQL databases and Azure AD admins such as global (company), service, user account, device and helpdesk administrators.

Using Powershell and theAzure AD modulewe were able to quickly identify these administrators.

To identify the various Azure AD admins run,Get-AzureADDirectoryRole. The following is what is returned.

With the exception of "Directory Readers" passing the ObjectId’s into theGet-AzureADDirectoryRoleMembercmdlet we were able to identify users with the respective admin role.Get-AzureADDirectoryRoleMember-ObjectId**OBJECT ID**

Once we’ve identified the administrators from the various corners of the production Azure subscription enabling MFA is a straight forward process. Microsoft outlines that process nicely here.

Administrator accounts in the wrong hands will have access to everything. Enabling Multi-Factor Authentication in Azure requires little effort. It is important to identify and secure these accounts with MFA.

Resources / additional reading:

MFA licensing options:
https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-cloud

MFA SMS Security:
https://www.pcisecuritystandards.org/pdfs/Multi-Factor-Authentication-Guidance-v1.pdfhttps://pages.nist.gov/800-63-3/sp800-63b.html#pstnOOB

Powershell Azure AD Module:
https://docs.microsoft.com/en-us/powershell/azure/active-directory/install-adv2?view=azureadps-2.0

Enabling MFA:
https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-user-states

Recent Blog Posts

lunavi logo alternate white and yellow
11.19.2024
11
.
8
.
2024
Load & Performance Testing with Azure Load Testing Service

Learn about load and performance testing in Microsoft Azure.

Learn more
lunavi logo alternate white and yellow
10.8.2024
09
.
25
.
2024
Maximizing Business Efficiency with Azure DevOps

For enterprises looking to adopt or mature their DevOps practices, Azure DevOps offers unmatched flexibility, scalability, and depth.

Learn more
lunavi logo alternate white and yellow
10.8.2024
09
.
09
.
2024
Exploring Microsoft Fabric: A Comprehensive Overview

Discover how Microsoft Fabric transforms data management and analytics with powerful tools for real-time insights and seamless collaboration, driving smarter, faster business decisions.

Learn more