Guides

Introduction

MFA was the “silver bullet” but friction and security kind of go hand in hand, the idea of a push notification and simple “authorise” is great in theory, but in practise it is vulnerable to brute force and human error. In this post we are going to check out enabling number matching authentication in Azure.

This is just one configuration option, as you can see there are loads of options for methods and specific configurations. Bear in mind the pros and cons for each one, for example SMS based 2FA can be vulnerability to SIM swapping attacks. I’m going to focus on Number Matching in Authenticator for this post:

Procedure

Log into the azure portal

https://portal.azure.com

Navigate to the security blade:

https://portal.azure.com/#view/Microsoft_AAD_IAM/SecurityMenuBlade/~/GettingStarted

Navigate to authentication methods:

https://portal.azure.com/#view/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/~/AdminAuthMethods

A screenshot of a computer screen

Description automatically generated with medium confidence

A screenshot of a computer screen

Description automatically generated with medium confidence

You can then enable MFA

But also, you can configure it on the right-hand side next to Registration there are three dots!

Graphical user interface, background pattern

Description automatically generated

Graphical user interface

Description automatically generated with medium confidence

Graphical user interface, application

Description automatically generated

Graphical user interface, application

Description automatically generated

Don’t forget to click SAVE when you are done!

Graphical user interface, text

Description automatically generated

Now let’s test this:

Now we can review more context information:

Summary

This is improving our attack surface, it’s making it harder to just “accept” and it’s providing us context for the sign in, fantastic! This is really a great feature improvement, it’s becoming the default and will help protect your organisation. What are you waiting for? Start working on those stakeholders and getting comms going ready to roll this out, it might be the barrier between you and a cyber incident!

There’s tons of features and configurations possible in Azure, keep working on improving your security configurations and enabling security visability, trust me, it’s more fun than responding to incidents!

References

And here’s some links to show that it’s not just me saying this 😉

https://docs.microsoft.com/en-us/azure/active-directory/authentication/how-to-mfa-number-match

https://portswigger.net/daily-swig/mfa-fatigue-attacks-users-tricked-into-allowing-device-access-due-to-overload-of-push-notifications