How to configure an MFA-enabled service account
If your service account is MFA-enabled, you need to use either the Conditional Access or Trusted IP feature in Microsoft 365 to bypass MFA.
Note: To use Conditional Access or Trusted IPs, you need an Azure AD Premium P1 license.
Steps to configure trusted IPs
- Log in to portal.azure.com using your Global Administrator credentials.
- Click Azure Active Directory under Azure services.
- Choose Security from the left pane.
- Click MFA under the Manage category in the left pane.
- Choose the Additional cloud-based MFA settings option.
- In the new window that opens, navigate to the trusted IPs section.
- Select the Skip multi-factor authentication for requests from federated users on my intranet option.
- In the text box, enter the IP address of the machine in which you have installed RecoveryManager Plus.
- Click Save.
Steps to configure conditional access
To configure conditional access,
- Log in to portal.azure.com using your Global Administrator credentials.
- Click Azure Active Directory under Azure services.
- Choose Security from the left pane.
- Click Conditional Access under the Protect category in the left pane.
- Click New Policy.
- Provide a name for the policy.
- Click Users and groups option.
- Select the Exclude tab.
- Select the Users and groups check box, and choose the RecoveryManager Plus users for whom MFA should not be enforced.
- Click Select.
- Under the Access controls section, click Grant.
- Select the Grant access radio button and the Require multi-factor authentication check box.
- Click Select.
- Click Create and then Save.
You can now proceed to add your Microsoft 365 tenant to RecoveryManager Plus using the automatic configuration method or the manual method.