Entra ID

Microsoft Entra External MFA Now Generally Available

3 min read

Summary

Microsoft has announced general availability of external MFA in Microsoft Entra ID, allowing organizations to integrate trusted third-party MFA providers using OpenID Connect. The feature lets IT teams keep Microsoft Entra ID as the central identity control plane while maintaining Conditional Access, risk evaluation, and unified authentication method management.

Audio Summary

0:00--:--
Need help with Entra ID?Talk to an Expert

Introduction

Microsoft has made external MFA in Microsoft Entra ID generally available, giving organizations a supported way to integrate third-party multifactor authentication providers into their identity environment. This is important for IT teams that need to meet regulatory requirements, support complex business scenarios, or modernize authentication without abandoning existing MFA investments.

What's new

External MFA, previously called external authentication methods, is now GA in Microsoft Entra ID.

Key highlights include:

  • Support for trusted third-party MFA providers
  • Integration based on the OpenID Connect (OIDC) standard
  • Centralized management alongside native Entra ID authentication methods
  • Continued enforcement of Conditional Access and real-time risk evaluation during sign-in
  • Support for session controls and sign-in frequency settings

This means organizations can extend Entra ID with external MFA providers while still using Microsoft Entra ID as the central policy and identity control plane.

Why it matters

Many organizations already use third-party MFA tools for compliance, business, or integration reasons. External MFA helps in scenarios such as:

  • Meeting regulatory or industry-specific authentication requirements
  • Supporting mergers and acquisitions where multiple identity systems may coexist
  • Unifying authentication under a modern Microsoft Entra architecture

Microsoft also notes that MFA reduces account compromise risk by more than 99 percent, making this release especially relevant as identity attacks continue to increase.

Impact on IT administrators

For administrators, the biggest benefit is simplified control. External MFA is managed within the same Entra ID framework as native methods, giving teams a single view of authentication options.

Admins can also apply Conditional Access policies to these sign-ins, including:

  • Real-time risk-based access decisions
  • Sign-in frequency controls
  • Session management settings

However, Microsoft warns that overly aggressive reauthentication can hurt user experience and even increase phishing risk by training users to approve prompts too often. Careful Conditional Access tuning remains essential.

Action items and next steps

IT administrators should consider the following steps:

  1. Review whether your organization relies on a third-party MFA provider today.
  2. Evaluate external MFA in Microsoft Entra ID for compatibility with your security and compliance needs.
  3. Review Conditional Access and reauthentication policies to avoid excessive MFA prompts.
  4. Plan for the retirement of Custom Controls, which will be deprecated on September 30, 2026.
  5. Follow Microsoft Learn guidance to begin implementation and migration planning.

Organizations currently using Custom Controls have time to transition, but this GA release signals that planning should start now.

Need help with Entra ID?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Entra IDMFAConditional Accessidentity securityZero Trust

Related Posts

Entra ID

Microsoft Entra Backup and Recovery Enters Preview

Microsoft has launched Microsoft Entra Backup and Recovery in public preview, giving organizations a Microsoft-managed way to restore critical identity objects and configurations to a known-good state. The service helps IT teams recover faster from accidental admin changes, provisioning errors, and malicious modifications that could otherwise disrupt access and security.

Entra ID

Microsoft Entra RSAC 2026 Identity Security Updates

At RSAC 2026, Microsoft announced major Microsoft Entra updates aimed at securing not only users and devices but also AI agents, workloads, and modern multi-tenant environments. The new capabilities—such as expanded Entra Agent ID governance, shadow AI detection, prompt injection protection, passkey enhancements, and adaptive risk-based access—matter because they strengthen Zero Trust identity security as organizations adopt AI and face more dynamic access risks.

Entra ID

Microsoft Entra Secure Access Report 2026 on AI Risk

Microsoft’s Entra Secure Access Report 2026 says AI adoption is significantly increasing identity and network access risk, with 97% of organizations reporting an access-related incident in the past year and 70% tying incidents to AI activity. The report argues that fragmented identity and network tools are making the problem worse, which matters because more organizations are now moving toward consolidated access platforms to better secure AI tools, agents, and machine identities.

Entra ID

Microsoft Entra Conditional Access All Resources Update

Microsoft is updating Entra Conditional Access so policies targeting "All resources" will be enforced consistently even when resource exclusions exist, closing a gap where some sign-ins requesting only OIDC or limited directory scopes could bypass policy checks. Beginning March 27, 2026 and rolling out through June 2026, affected tenants may see more users prompted for MFA, device compliance, or other controls—making this important for organizations to review impacted Conditional Access policies and prepare for changes in sign-in behavior.

Entra ID

Microsoft Entra Access Priorities Webinar Series

Microsoft is launching the four-part Microsoft Entra Access Priorities webinar series to help IT teams turn its identity-first security strategy into practical deployment steps, with guidance on phishing-resistant authentication, adaptive access, least privilege, and securing AI-related access. The series matters because it gives organizations concrete tools, demos, and checklists to strengthen Zero Trust and prepare for an emerging Access Fabric model that spans users, apps, devices, and AI agents.

Entra ID

Microsoft Entra Internet Access AI Gateway Preview

Microsoft has previewed a secure web and AI gateway in Entra Internet Access that adds network-layer controls for enterprise AI use, including shadow AI detection, file filtering with Purview integration, and prompt injection protection. This matters because it gives organizations an identity-first way to discover unsanctioned AI tools, prevent sensitive data leakage, and enforce consistent security policies across devices and clouds without needing to modify applications.