My organization uses some Entra user accounts for scanning to SharePoint. Recently, I've been trying to log into Azure with these accounts to manage the Power Automate flows related to the scans, but now it's forcing me to set up Multi-Factor Authentication (MFA). We have conditional access policies in place that make MFA mandatory for all resources, but we do have a bypass group excluded from this policy. I can still access Outlook with these accounts, but when I try to sign into Azure, it fails with the message "MFA required in Azure AD." I had no issues logging in just two weeks ago, so I'm wondering if this new MFA requirement is related to the rollout Microsoft initiated on October 1st. Any insights on why this might be happening?
1 Answer
Yeah, it sounds like since all accounts are accessible through the Azure portal, Microsoft is ramping up security measures to protect against potential threats. It seems like a smart move considering how sensitive and critical these accounts can be.

Is this a new requirement?