Microsoft Entra External MFA Now Generally Available
Resumo
Microsoft has announced general availability of external MFA in Microsoft Entra ID, allowing organizations to integrate trusted third-party MFA providers using OpenID Connect. The feature lets IT teams keep Microsoft Entra ID as the central identity control plane while maintaining Conditional Access, risk evaluation, and unified authentication method management.
Introduction
Microsoft has made external MFA in Microsoft Entra ID generally available, giving organizations a supported way to integrate third-party multifactor authentication providers into their identity environment. This is important for IT teams that need to meet regulatory requirements, support complex business scenarios, or modernize authentication without abandoning existing MFA investments.
What's new
External MFA, previously called external authentication methods, is now GA in Microsoft Entra ID.
Key highlights include:
- Support for trusted third-party MFA providers
- Integration based on the OpenID Connect (OIDC) standard
- Centralized management alongside native Entra ID authentication methods
- Continued enforcement of Conditional Access and real-time risk evaluation during sign-in
- Support for session controls and sign-in frequency settings
This means organizations can extend Entra ID with external MFA providers while still using Microsoft Entra ID as the central policy and identity control plane.
Why it matters
Many organizations already use third-party MFA tools for compliance, business, or integration reasons. External MFA helps in scenarios such as:
- Meeting regulatory or industry-specific authentication requirements
- Supporting mergers and acquisitions where multiple identity systems may coexist
- Unifying authentication under a modern Microsoft Entra architecture
Microsoft also notes that MFA reduces account compromise risk by more than 99 percent, making this release especially relevant as identity attacks continue to increase.
Impact on IT administrators
For administrators, the biggest benefit is simplified control. External MFA is managed within the same Entra ID framework as native methods, giving teams a single view of authentication options.
Admins can also apply Conditional Access policies to these sign-ins, including:
- Real-time risk-based access decisions
- Sign-in frequency controls
- Session management settings
However, Microsoft warns that overly aggressive reauthentication can hurt user experience and even increase phishing risk by training users to approve prompts too often. Careful Conditional Access tuning remains essential.
Action items and next steps
IT administrators should consider the following steps:
- Review whether your organization relies on a third-party MFA provider today.
- Evaluate external MFA in Microsoft Entra ID for compatibility with your security and compliance needs.
- Review Conditional Access and reauthentication policies to avoid excessive MFA prompts.
- Plan for the retirement of Custom Controls, which will be deprecated on September 30, 2026.
- Follow Microsoft Learn guidance to begin implementation and migration planning.
Organizations currently using Custom Controls have time to transition, but this GA release signals that planning should start now.
Precisa de ajuda com Entra ID?
Nossos especialistas podem ajudá-lo a implementar e otimizar suas soluções Microsoft.
Fale com um especialistaFique atualizado sobre as tecnologias Microsoft