Authentication Methods Overview
Understanding the Concept
Microsoft Entra ID supports multiple authentication methods that can be combined for secure access. The authentication methods policy controls which methods are available to users across the tenant, replacing the legacy per-user MFA and SSPR settings.
Authentication methods fall into three categories: something you know (passwords, security questions), something you have (phone, FIDO2 key, authenticator app), and something you are (biometrics like Windows Hello). Stronger methods combine multiple factors.
The authentication strengths feature in Conditional Access allows administrators to require specific combinations of methods for different scenarios - for example, requiring phishing-resistant methods for admin access while allowing SMS for general users.
Key Points
- Password: Traditional method, should be combined with a second factor
- Microsoft Authenticator: Push notifications, OTP, and passwordless
- FIDO2 Security Keys: Phishing-resistant hardware-based authentication
- Windows Hello for Business: Biometric or PIN tied to the device
- SMS/Voice: Phone-based verification (less secure, being phased out)
Authentication Method Strength Levels
Password Only
Weakest - single factor, vulnerable to phishing and credential theft
Password + SMS
MFA but SMS is susceptible to SIM swapping attacks
Password + App
Stronger MFA with Authenticator push or TOTP
Passwordless
Authenticator passwordless, WHfB, or FIDO2 key
Phishing-Resistant
FIDO2 or WHfB - immune to credential phishing
Why This Matters in Real Organizations
Authentication is the front door to your organization. Using weak methods like password-only leaves you vulnerable to credential stuffing, phishing, and brute force attacks. Microsoft reports that MFA blocks over 99.9% of account compromise attacks - making authentication method selection one of the highest-impact security decisions.
Common Mistakes to Avoid
Interview Tips
- Explain the three authentication factor categories
- Discuss the security spectrum from passwords to phishing-resistant methods
- Mention Microsoft's push toward passwordless authentication
Exam Tips (SC-300)
- Know all supported authentication methods and their strengths
- Understand authentication strength policies in Conditional Access
- Know that FIDO2 and WHfB are considered phishing-resistant
Course Complete!
You've finished all lessons