Pro User
Timespan
explore our new search
Microsoft MFA: Legacy Settings Changes
Identity
Sep 9, 2025 12:13 AM

Microsoft MFA: Legacy Settings Changes

by HubSite 365 about Nick Ross [MVP] (T-Minus365)

Pro UserIdentityLearning Selection

Microsoft expert: migrate legacy MFA and SSPR to Entra ID Authentication Methods policy for stronger Microsoft security

Key insights

  • Legacy MFA & SSPR Retirement: Microsoft retires management of authentication methods in legacy MFA and SSPR policies on Sept 30, 2025.
    Move management to the new Authentication Methods policy in Entra ID before the deadline.
  • Enforcement Timeline: From late 2024 Microsoft began requiring MFA for web admin portals and fully enforces it on Oct 1, 2025 for command-line tools, SDKs, mobile apps, and APIs when performing critical operations.
    The phased rollout gives organizations time to adapt.
  • What Systems Are Affected: Admin centers (Azure Portal, Entra admin, Intune), CLI tools, Infrastructure as Code tools (like Terraform and ARM), and REST APIs that create, update, or delete resources will require stronger authentication.
    Password-only and legacy methods will be blocked.
  • Authenticator App Changes: Microsoft will remove password autofill and delete stored payment data in mid‑2025; users must migrate saved credentials to a password manager.
    Passkeys and FIDO2 security keys remain supported, and iOS users get a new secure iCloud backup for TOTP in Sept 2025.
  • Migration Options & Extensions: Organizations must migrate users to modern methods like passwordless, passkeys, or FIDO2 keys and update service accounts.
    Microsoft allows a postponement request up to Sept 30, 2025 to buy more preparation time.
  • Practical Checklist: Inventory authentication methods and service principals, update scripts and automation to support MFA, enable passwordless where possible, and test CLI/API flows.
    Communicate changes to users and schedule migrations well ahead of deadlines.

Quick summary of the video

Nick Ross [MVP] (T-Minus365) published a concise video explaining Microsoft’s plan to retire legacy Multi-Factor Authentication and Self-Service Password Reset settings, and the steps organizations need to take to prepare. The presentation walks viewers through the enforcement timeline, the move to a single Authentication Methods policy in Entra ID, and practical migration guidance. Consequently, the video aims to reduce surprises for administrators by offering a clear phased approach and frequently asked questions. Overall, it frames the changes as necessary to strengthen security while acknowledging operational friction.

First, the video highlights a firm deadline: legacy MFA and SSPR policy management will no longer be supported after September 30, 2025. Moreover, Microsoft begins mandatory MFA controls earlier for web-based admin portals and extends enforcement to command line tools, mobile apps, and APIs by October 1, 2025. These changes affect interactive sign-ins as well as programmatic operations that create, update, or delete resources. Therefore, organizations must inventory how identities and automation interact with Azure and Microsoft 365 services.

Timeline and scope of changes

According to the video, enforcement happens in phases so IT teams have time to adapt. Starting in late 2024, web admin portals like the Azure Portal and the Entra admin center require multi-factor verification, and the rules broaden to command-line interfaces and APIs by October 1, 2025. This staged rollout aims to balance security urgency with operational readiness, but it also compresses the window for testing certain automation flows. As a result, teams should plan earlier rather than later to avoid unexpected outages during production deployments.

The presenter also covers related updates to the Microsoft Authenticator app, noting that password autofill will be discontinued and stored payment data will be removed in mid-2025. In contrast, passkeys and FIDO2 security keys remain supported and are recommended as modern, phishing-resistant alternatives. Additionally, a new secure iCloud-based backup for third-party TOTP credentials on iOS appears in September 2025, which should help some users avoid losing tokens. Still, organizations must adapt their credential management strategy to align with these platform changes.

Migration and practical advice

Nick Ross emphasizes moving policy management into the centralized Authentication Methods policy in Entra ID, and he outlines a migration checklist to guide administrators. He advises mapping each legacy policy to its corresponding modern control, testing changes in a pilot tenant, and updating service principals and automation accounts that rely on legacy authentication. In addition, updating SDKs and command-line tools can reduce compatibility issues when MFA is enforced for non-interactive sign-ins. Thus, careful testing across environments is essential to prevent disruption.

The video recommends prioritizing high-risk accounts and critical automation first, then working outward to broader user groups. Training and clear communication are key because users will face new sign-in flows and backup procedures, particularly if the organization adopts passwordless methods. However, the presenter notes that postponement requests are available through September 30, 2025 for organizations that need more time. Even so, reliance on extensions creates risk, so teams should treat them as a contingency rather than a primary plan.

Tradeoffs and operational challenges

Implementing these changes improves security but brings tradeoffs in cost, complexity, and user experience. For example, enforcing stronger MFA reduces the attack surface and blocks automated attacks, yet it can increase support tickets and require investment in modern authentication devices. Organizations must weigh the value of passwordless adoption against compatibility hurdles for legacy applications and devices that do not support modern protocols. Consequently, leaders must balance security gains with realistic timelines for replacing or modernizing legacy systems.

Another challenge is handling automation and service accounts that historically used password-based or legacy MFA methods. While moving these to certificate-based or managed identity approaches increases security, it also demands operational changes to CI/CD pipelines and credential rotation practices. Moreover, smaller organizations may lack the in-house skills to design and test complex migrations, so they must decide whether to seek external help or build internal capacity. In any case, the migration will require coordinated efforts across security, identity, and application teams.

Impact on users and administrators

Users will face changes in sign-in behavior, especially if passwords and autofill features are deprecated in the Microsoft Authenticator app. Admins should prepare training materials and rollback plans to ease the transition and to address increase in helpdesk requests. Furthermore, administrators must keep an accurate inventory of apps, scripts, and accounts that perform programmatic operations so they can be updated before enforcement phases begin. Therefore, proactive communication and staged rollouts will reduce friction and downtime.

For administrators, the new enforcement will improve visibility into authentication methods and enable stronger policy control through Entra ID. Yet, enforcing MFA for APIs and CLI tools may require workarounds such as managed identities or federated credentials for service principals. Monitoring and auditing become more important since failed authentications during deployment windows could indicate misconfigurations or attempted attacks. Ultimately, a structured migration plan will help teams maintain service availability while achieving higher security.

Conclusion and next steps

Nick Ross’s video provides a practical roadmap for the upcoming changes, emphasizing early planning, testing, and communication. By centralizing authentication policies in Entra ID and shifting toward passwordless and FIDO2 solutions, organizations can reduce risk significantly, even though the transition involves notable operational work. Administrators should inventory dependencies, pilot changes with a subset of users, and treat postponement options as last-resort buffers rather than long-term fixes.

In summary, the video frames Microsoft’s deprecation of legacy MFA and SSPR settings as a necessary step to improve security, while clearly outlining the migration path and likely challenges. Consequently, teams that act now will minimize disruption and strengthen their defenses before enforcement deadlines arrive. Finally, while the migration requires coordination and some tradeoffs, the long-term benefit is a more resilient and modern identity posture.

Identity - Microsoft MFA: Legacy Settings Changes

Keywords

Microsoft MFA changes, Legacy authentication settings Microsoft, Azure AD legacy settings MFA, Migrating from legacy authentication MFA, Disable legacy authentication Microsoft, Conditional Access legacy authentication MFA, Modern authentication migration MFA, Microsoft Authenticator policy changes