News

Microsoft to retire legacy MFA and SSPR policies by September 2025

Microsoft will retire legacy Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) policies on 30 September 2025.

If your organisation still relies on these, you must migrate to the modern Entra ID Authentication Methods to maintain security and ensure consistent user experiences.

We'll cover the past, present, and future of these authentication methods, within the Microsoft Cloud.  

Christopher Tout

Author

Christopher Tout Azure Consultant

Reading time 4 minutes Published: 25 November 2024

MFA is a critical, if not essential, line of defence for you and your organisation – and Microsoft suggested in 2019, and reinforced that stance in 2023, that this one simple change to user authentication can prevent up to 99.9% of account-based attacks.

With the planned retirement of these legacy policies, it’s time to ensure that the Entra ID Authentication policies have had everything relevant migrated from the legacy policies to ensure the user experience remains consistent throughout.

MFA changes

While this service has been running side-by-side with the modern Entra ID (formerly Azure AD) Authentication Method policies for the last few years and, depending on how long you’ve been invested in the Azure ecosystem, you may be using one or both policy types in your organisation.

Although these policies can co-exist, doing so can add confusion over which policy “wins” in a conflict and risks inconsistent experiences across your users. With this retirement, authentication methods are centralised into Entra ID.  

Other MFA implementations to consider, such as Microsoft Security Defaults and Conditional Access (which requires an Entra ID P1 or better license), will apply either a Microsoft standard configuration or your curated bespoke configuration accordingly.    

Whilst both configurations will trigger authentication prompts, only Conditional Access will honour your selected authentication method policy.

 

Past

Previously, you would have had to configure “Per-user MFA” and configure MFA for each user as necessary. You would onboard them gradually onto MFA, initially as optional, and then finally onto enforced.  

Depending on how many users are in your organisation, this roll-out could take some time. 

Multi-factor authentication in Microsoft Azure

You would also need to configure whether to allow app passwords for legacy apps, any trusted IP ranges that waive the requirement for MFA, the verification options available to users such as SMS, voice calls, or app notifications, and the length of time between repeat MFA requests.

multi-factor authentication microsoft

 

Present

Today, in Entra ID, this has been streamlined and improved with a focus on consistency and inclusivity. 

No more individual user configurations; it’s now tenant-wide by default – ensuring each account receives a consistent authentication experience when MFA is triggered based on the service MFA has been invoked by (Microsoft Security Defaults, Conditional Access) and that services associated authentication methods. 

In addition, the modern policy supports group-based exclusions for almost every setting.

Authentication methods policies snapshot in Microsoft Azure

If you need to exclude an account from a particular setting or authentication method, you can do so.  

For example: for each method in Authentication method policies you can specify whether it’s enabled at all, whether it’s available to all users or to specific groups of users, in addition to configuration settings that are bespoke to the method selected.

Not only is this more comprehensive in the list of authentication methods compared with the legacy MFA policy, it also is much simpler to configure yet more granular in its configuration.  

Many more scenarios are now either far easier to implement, or simply possible where they were not before. 

 

Future

As previously mentioned, both policies can co-exist – but the differences in functionality that we’ve really only just scratched upon in this article means that migrating to Entra ID Authentication Methods will grant you a much more modern, improved, and complete MFA solution than ever before.  

Once migrated to Entra ID Authentication Methods, you can start to take advantage of more advanced, secure, phishing-resistant, and password less options such as Windows Hello, Passkeys (FIDO2), and “passwordless” (Microsoft Authenticator) app sign-in.

Some important dates that relate to MFA are as follows: From 15th October 2024, MFA will no longer be optional when accessing Microsoft Entra admin centre, Microsoft Azure portal, and the Microsoft Intune admin centre.  

THERE WAS AN OPTION TO POSTPONE THIS UNTIL MARCH 2025 WHICH PROVIDED ADDITIONAL TIME TO IMPLEMENT CONDITIONAL ACCESS.  HOWEVER, THIS NEEDED TO HAVE BEEN REQUESTED BY 15TH OCTOBER 2024.
FOR MORE INFO, PLEASE SEE: MANDATORY MICROSOFT ENTRA MULTIFACTOR AUTHENTICATION (MFA) - MICROSOFT ENTRA ID

  • In early 2025, this enforcement of MFA will extend to additional Azure services such as Azure CLI, Azure PowerShell, and Infrastructure as Code (IaC) tooling.  
  • From 30th September 2025, the legacy MFA and SSPR authentication methods will be deprecated. 

IMPORTANT: Migrate AHEAD of this date to ensure there is no impact to your user experience.

 

Closing thoughts

For now, let’s just consider a “lift and shift” migration.  What do you need to consider? 

A like for like migration is straight forward and, although there is a wizard available to help you take your existing configuration and put it into Entra ID, we'd start with reviewing your existing legacy MFA and SSPR configuration to ensure that the migration is reflective of the legacy configuration.

authentication method settings migration

With these settings noted, it’s simple to either manually re-create this configuration in Entra ID Authentication – or just to perform the automated migration and perform a review of the suggested configuration.

For those tenants that have been around some time, and likely had multiple MFA configurations over its lifetime, it would be wise to review the combined configuration of MFA throughout the Microsoft cloud.  

Some questions to start you off: 

  • Do you have security defaults enabled, or do you use conditional access policies?
  • Do you have an existing configuration in Entra ID that you will need to consolidate?
  • Does Entra ID Authentication offer scenarios that were not possible before?

With these findings in-hand, you can now decide what your next steps are to strengthen authentication across the Microsoft cloud.

Intercept Chris Profile Photo Normal Sized

Azure Consultant

If you would like advice, guidance, or any help, please do not hesitate to contact!