Enabling strong authentication scenarios
Initially, a user signs in from any device using their existing account credentials. If a user is signing into an on-premises application, the Multi-Factor Server that is installed at the customer's site intercepts the authentication request.
Authentication requests can be differentiated based on the location and the device trust level, such as managed (
isManaged) or compliant (
First, it checks the username and password against the user directory. If the correct credentials are entered, a request is sent to the MFA cloud service. The service sends the authentication request to the user's phone. Once the user has been authenticated, they are instantly signed into the application. There are ...