Resources
Authentication Strength Policy
Resource:
microsoft365_graph_beta_identity_and_access_authentication_strength_policyAuthentication Context
Resource:
microsoft365_graph_beta_identity_and_access_authentication_contextAuthentication Strength Policy
Available Authentication Methods
| Method | Combination String | Phishing-Resistant |
|---|---|---|
| Windows Hello for Business | windowsHelloForBusiness | Yes |
| FIDO2 Security Key | fido2 | Yes |
| Certificate-based (Multi-factor) | x509CertificateMultiFactor | Yes |
| Microsoft Authenticator (Push) | microsoftAuthenticatorPush | No |
| SMS | sms | No |
| Voice | voice | No |
| Software OATH | softwareOath | No |
| Hardware OATH | hardwareOath | No |
| Password | password | No |
| Temporary Access Pass | temporaryAccessPassOneTime | No |
| Federated Multi-Factor | federatedMultiFactor | No |
Built-in Authentication Strengths
Microsoft provides built-in authentication strength policies:| ID | Name | Methods |
|---|---|---|
00000000-0000-0000-0000-000000000002 | Multi-factor authentication | All MFA methods |
00000000-0000-0000-0000-000000000003 | Passwordless MFA | Passwordless methods only |
00000000-0000-0000-0000-000000000004 | Phishing-resistant MFA | FIDO2, WHfB, Certificate |
Example Policies
Method Combinations
You can require multiple methods:FIDO2 Configuration
Restrict to specific FIDO2 keys:Certificate-Based Authentication
Configure certificate requirements:Use in Conditional Access
Authentication Context
Define step-up authentication requirements:Import Syntax
Best Practices
Prioritize phishing-resistant methods
Prioritize phishing-resistant methods
Use FIDO2, Windows Hello for Business, or certificate-based authentication for highest security.
Plan migration path
Plan migration path
When moving to passwordless, allow temporary access passes during transition.
Test with pilot users
Test with pilot users
Deploy new authentication requirements to pilot groups before broad rollout.
Provide user guidance
Provide user guidance
Document how to enroll and use required authentication methods.
