Systems Admin

Enable and Enforce Per-User MFA in Microsoft Entra ID

Per-user MFA is the legacy way to enable MFA in Microsoft Entra ID — Microsoft now recommends Conditional Access for new tenants, but per-user MFA is still useful for existing tenants migrating from legacy, Free / non-P1 tenants without CA, or emergency single-user MFA-on situations. Three states: Disabled (no MFA), Enabled (MFA but legacy auth bypasses), Enforced (MFA strictly mandatory, legacy blocked). Goal: get to Enforced.

Step 1 — access the per-user MFA portal

Microsoft Entra admin centre Users > All users page with Per-user MFA option in the top toolbar that opens the legacy multi-factor authentication portal” /><figcaption>Sign in to <a href=entra.microsoft.com. Users > All users > Per-user MFA in the toolbar (sometimes under ...). Opens the legacy MFA portal.

Sign in to entra.microsoft.com as a user-administration admin. Users > All users > Per-user MFA in the top menu (sometimes under the gear or ...). New tab opens the legacy MFA portal.

Step 2 — Enable

Legacy MFA portal showing the user list with the test user (jdoe) ticked and the Enable button being clicked
Find the user (jdoe), tick the box, click Enable.
Confirmation popup with enable multi-factor auth button visible to commit the change moving status from Disabled to Enabled
Confirm: enable multi-factor auth. Status: Disabled → Enabled.

Tick the user (jdoe in this demo). Click Enable. Confirm enable multi-factor auth. Status moves Disabled → Enabled.

At this point, modern apps (Outlook, Teams, browser sign-in) prompt for MFA. Legacy auth (basic auth IMAP/POP/SMTP) can still bypass.

Step 3 — Enforce

MFA portal with the same user still ticked and the Enforce button being clicked to move the user to Enforced state
Same user still ticked > Enforce.
Confirmation popup with enforce multi-factor auth button to commit, status now becomes Enforced
Confirm: enforce multi-factor auth. Status: Enabled → Enforced. Now legacy auth is blocked too.

Same user still ticked > Enforce > confirm. Status: Enabled → Enforced. Now legacy auth is blocked too — MFA is mandatory across the board.

Step 4 — verify in incognito

Office portal sign-in in incognito browser showing More information required prompt during the user’s next login
Verify in incognito at portal.office.com. Sign in as jdoe — More information required appears.
Authenticator app setup screen prompting the user to register the Microsoft Authenticator app as their default MFA method
Setup wizard prompts to register Microsoft Authenticator. Done — per-user MFA is fully working.

New incognito browser > portal.office.com > sign in as jdoe. After password: More information required. Click Next — setup prompts for Microsoft Authenticator. Done.

Enable vs Enforce — the load-bearing difference

State Modern auth Legacy auth (IMAP/POP/SMTP basic)
Disabled Password only Password only
Enabled MFA required Bypassed — password only
Enforced MFA required Blocked entirely

Stopping at Enabled is a common mistake — gives a false sense of security while attackers can still password-spray legacy endpoints. Always go to Enforced.

Per-user MFA vs Conditional Access

Microsoft’s newer recommendation is Conditional Access policies (covered in later posts in this series): scope MFA by user group, app, location, sign-in risk, etc. More flexible, fewer per-user toggles. Requires Entra ID P1 licensing. For tenants without P1, per-user MFA is still the answer.

Things that bite people

Stopped at Enabled

The portal makes Enabled look like the goal state. It’s not. Always click Enforce too.

Legacy MFA portal feels old

Because it is. The portal predates the new admin centre. Bookmark it directly: https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx

Service accounts also hit MFA

If you enforce MFA on a user account that’s used by a service or app, the service breaks at the next auth. Move services to managed identities or app registrations with cert auth instead.

User can’t register because admin had to do it

The first sign-in after Enforce prompts the user to register their MFA method. If you (the admin) keep helping by clicking Skip, registration never completes. Let the user finish the wizard themselves.

What’s next

Other posts in the Entra ID Security pathway cover Temporary Access Pass (TAP), passwordless, and Conditional Access for MFA enforcement at scale.

Leave a Reply