Tomer Iarchy
Software Engineer
Published on
August 28, 2024
As Microsoft prepares to enforce multi-factor authentication (MFA) for Azure sign-ins, organizations are gearing up for a significant shift in how they manage access to their Azure resources. This change, aimed at bolstering security and reducing the risk of data breaches, will be rolled out in two phases, starting with the Azure portal and extending to command-line tools and Infrastructure as Code (IaC) tools.
While MFA is an essential security measure, it could inadvertently impact business continuity if not managed correctly. Specifically, the enforcement of MFA on service accounts—a common way to automate tasks—might cause unintended disruptions if these accounts are not handled properly. Here’s why non-human identities like service principals could be a more robust solution and how you can prepare for the changes ahead.
October 2024: MFA will become a requirement for signing into the Azure portal, Microsoft Entra admin center, and Intune admin center. This phase will see a gradual roll-out to all tenants.
Early 2025: MFA will be required for Azure Command Line Interface (CLI), Azure PowerShell, Azure mobile app, and Infrastructure as Code (IaC) tools.
The goal is to secure Create, Read, Update, or Delete (CRUD) operations across these platforms, but it’s crucial to note that workload identities such as managed identities and service principals will not be affected by this MFA enforcement.
Service accounts are often used for automated processes and background tasks. When MFA is enforced on these accounts, it can create unexpected challenges:
To mitigate these challenges, consider using service principals and managed identities, which are designed for such scenarios:
Here’s how organizations can prepare for the MFA transition without affecting their business continuity:
Mandatory MFA is a significant step forward in securing Azure environments, but it also requires careful planning to avoid disrupting business operations. By understanding the implications for service accounts and leveraging more appropriate non-human identities, organizations can smoothly navigate this transition and enhance their security posture without sacrificing operational efficiency.