Microsoft Entra MFA
  • 12 Mar 2025
  • 3 Minutes to read
  • Dark
    Light

Microsoft Entra MFA

  • Dark
    Light

Article summary

Microsoft Entra MFA (Multi-Factor Authentication) enhances security by requiring users to verify their identity using multiple authentication methods, such as passwords, biometrics, or one-time passcodes. It helps protect against unauthorized access, phishing, and identity theft by adding an extra layer of security beyond just passwords. It integrates with Microsoft Entra ID (formerly Azure AD) and supports various authentication methods, including push notifications, SMS, voice calls, and security keys. More information can be found at Microsoft Entra MFA.

Integration Method: API
Tables: Device Inventory Info (5001), User Inventory Info (5003) , Base Class(0)

This integration supports the following events.

Event

Description

User Registration Details

Get a list of the authentication methods registered for a user as defined in the userRegistrationDetails object.

User Registration by Feature

Get the users capable of multi-factor authentication, self-service password reset, and password less authentication.

User Registration by Method

Get the users registered for each authentication method.

User Credential Usage Details

Get a list of userCredentialUsageDetails objects for a given tenant. Details include user information, status of the reset, and the reason for failure.

Credential User Registration Count

Report the current state of how many users in your organization are registered for self-service password reset and multifactor authentication (MFA) capabilities.

Credential Usage Summary

Report the current state of how many users in your organization used the self-service password reset capabilities.

Devices

Retrieve a list of devices registered in the directory.


This integration supports the following versions.

Microsoft Entra MFA API Version

Beta

Note:

Microsoft Entra MFA is a continuously updated cloud service. As for this document preparation, the latest release was in January 2025.

Prerequisites

  • The user should have access to the Azure portal with an account that has the Global Administrator privileges.

  • The user should have access to the DataBee console.

Configuration Overview

  1. Create an application with required permissions to fetch the data.

  2. Add the Microsoft Entra MFA data feed in the DataBee console with the below parameters

DataBee Feed Parameter

Azure Parameter

Client Key

Application (client) ID

Client Secret

Client Secret Value

Token URL(<application_id>)

Directory (Tenant) ID

Azure Configuration

Create an application

  1. Log on to Azure portal with an account that has the Global Administrator privileges.  

  2. In the search bar, search for App registrations and select it.
     Inserting image...

  3. On the “App registrations” page, select New registration, thenRegister an application” window will appear.
     Inserting image...

  4. On the “Register an application” window:

    1. Under ‘Name’ enter your Application Name then click on Register to create the application.
       Inserting image... 

  5. On the app Overview page, copy the Application (client) ID and Directory (tenant) ID for later use.
     Inserting image... 

Add Endpoint Access  

Once the application is created, three permissions should be provided in order to fetch data. The appropriate permissions for the application are needed to access these endpoints. The following section details how to configure and add permissions to the required endpoints.  

Add Permissions  

To add permissions for the six endpoints outlined above, from the Azure Active Directory portal:  

  1. Select the application registered in the previous step.

  2. Under Manage, click API permissions and then click Add a permission, the “Request API permissions” window will appear. Inserting image...  

  3. On “Request API permissions” window, Click on Microsoft APIs then on Microsoft Graph.
      

  4. Click on Application permissions.
     

  5. The following permissions need to be granted for the six endpoints to function properly:

    Event

    Type

    Permission

    User Registration Details

    Application

    AuditLog.Read.All

    User Registration By Feature

    Application

    AuditLog.Read.All

    User Registration By Method

    Application

    AuditLog.Read.All

    User Credential Usage Details

    Application

    Reports.Read.All

    Credential User Registration Count

    Application

    Reports.Read.All

    Credential Usage Summary

    Application

    Reports.Read.All

    Devices

    Application

    Device.Read.All

In the Select permissions search bar, enter the permissions shown above one by one, and check the box for each to include it.

  1. Click the Add permissions button after selecting all required permissions.

  2. On the API permissions page,

    1. Click Grant Admin Consent for <tenant>

    2. Click the Yes button on the consent confirmation.

  1. The required permissions are now added for the endpoints. The overall permissions are shown below. Ensure ‘Type’ is Application for all.
     

Create the Client Secret

The final step to accessing the APIs is creating a Client Secret. To create it from the Azure Portal:  

  1. Select the application created above.

  2. Under Manage, click Certificates & secrets, and then Client secrets
     Inserting image...

  3. Click New client secret. Then “Add a client secret” window appears. 
     Inserting image... 

  4. On “Add a client secret” window:

    1. Enter a ‘Description’ for this client secret and select the desired expiry period from the ‘Expires’ drop-list.

    2. Then click on Add to create the client secret.
       Inserting image...

  5. Copy client secrets Value fields for later use.
     Inserting image...

    Note:

    The user needs to re-create the client secret when it expires.

DataBee Configuration

  1. Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.
     Inserting image...

  2. Search for the Microsoft Entra MFA and click it as shown below
     

  3. Click on the API Ingest option for collection method.
     Inserting image...

  4. Enter feed contact information and click Next.
     

  5. In the configuration page, enter the following

    • Authorization Method: OAuth2

    • Client Key: paste the Application (client) ID generated earlier.

    • Client Secret: paste the Client Secret value generated earlier.

    • Token URL: replace <application_id> with your Application ID.

    • Event Types: preselected for all the event types that integration pulls.

  1. Click Submit.

Troubleshooting Tips

  • Ensure the token is pasted correctly. Since you cannot view the token after the 1st time, re-create the token, paste it on a text editor to ensure no spaces or unexpected characters are included and reconfigure the DataBee feed.

  • Ensure the Microsoft Entra MFA scopes/ permissions are correct.


Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence