Azure AD Conditional Access MFA #
As an admin, you want to maintain security for your company’s resources, but you also want your employees to easily access resources as needed.
Multi-factor authentication (MFA) is a process in which a user is prompted for additional forms of identification during a sign-in event. For example, the prompt could be to enter a code on their cell phone or to provide a fingerprint scan. When you require a second form of identification, security increases because this additional factor isn’t easy for an attacker to obtain or duplicate.
In some cases, however, the MFA may cause challenges for the end user. One such case can be dealing with MFA while signing in via the Wi-Fi Captive Portal login dialog.
The reason is the state of the Captive Portal itself where many devices don’t allow any multitasking while in the “captive state”. This makes it impossible to open other applications, such as Microsoft Authenticator or 1Password, while signing in via the captive portal.
Azure AD Multi-Factor Authentication and Conditional Access policies give you the flexibility to prevent MFA from users for specific sign-in events, such as the Captive Portal sign-in.
In this example, we will configure a simple Azure AD Conditional Access Policy that requires MFA for all Cloud applications, except Captive Portal Sign-in.
In order to use Azure AD Conditional Access policies your organization needs to switch from “per-user MFA” to Conditional Access MFA. This is described and recommended by Microsoft in these articles:
- Azure AD recommendation: Switch from per-user MFA to Conditional Access MFA
- Common Conditional Access policy: Require MFA for Azure management
Setting up a Conditional Access Policy to prevent 2FA in Captive Portal. #
- In this example, we assume that you have configured the application “Acme Corp WiFi Portal” as described in this article.
- Then, make sure your organization has switched from “per-user MFA” to “Conditional Access MFA” as described in the Microsoft article above.
- While you are logged in to your organization’s Azure Portal (https://portal.azure.com)
- Select Users and then select “Per-user MFA”

Make sure the multi-factor auth status is Disabled.
Setting “per-user MFA” to disabled is a prerequisite to making the Conditional Access policy work in the next step. - Under Azure Services, choose Azure Active Directory
- Select Security
- Under Protect select Conditional Access
- Click + New Policy
- Name
- For example “Acmecorp MFA App Policy”
- Users
- Include “Alla users”
- Cloud apps or actions
- Select what this policy applies to: Cloud apps
- Include: All cloud apps
- Exclude: Select excluded cloud apps -> “Acme Corp WiFi Portal” (in our example)
- Grant
- Select Grant access
- Check “Require multifactor authentication”
- Click Select
- Enable policy
- Select On (or Report-only to verify first)
- Click Save
- Name
- Done
You have now defined a Conditional Access Policy that requires all cloud apps to use MFA except for “Acme Corp WiFi Portal”. Now users signing in to the Wi-Fi via the Captive Portal will not be prompted for Multi-Factor Authentication.
Please note that in a real-world example, you should always verify any changes to security settings with your organization’s security department.