Skip to content

Update auth strengths known issues to include conflict with security …#1950

Open
andrequeda wants to merge 2 commits intoMicrosoftDocs:mainfrom
andrequeda:patch-2
Open

Update auth strengths known issues to include conflict with security …#1950
andrequeda wants to merge 2 commits intoMicrosoftDocs:mainfrom
andrequeda:patch-2

Conversation

@andrequeda
Copy link
Copy Markdown
Contributor

…info registration

Document conflict between Auth strengths and 10-minute session requirement for security info registration, as well as potential solutions for it

…info registration

Document conflict between Auth strengths and 10-minute session requirement for security info registration, as well as potential solutions for it
@prmerger-automator
Copy link
Copy Markdown
Contributor

@andrequeda : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

@learn-build-service-prod
Copy link
Copy Markdown
Contributor

Learn Build status updates of commit 0bac453:

✅ Validation status: passed

File Status Preview URL Details
docs/identity/authentication/concept-authentication-strengths.md ✅Succeeded

For more details, please refer to the build report.

Copy link
Copy Markdown
Contributor

@namkedia namkedia left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please make edits to the documentation


When the user unlocks their Windows device by using Windows Hello for Business, they can access the resource again. Yesterday's sign-in satisfies the authentication strength requirement, and today's device unlock satisfies the sign-in frequency requirement.

- **Authentication strength and registration of security info**: Registering security info requires an MFA session no older than 10 minutes, leading to an interactive request for MFA if such requirement isn't met. This can lead users to choose an MFA method that, when combined with the first factor authentication method previously used, doesn't satisfy the enforced authentication strength, resulting in the error *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What does registering security info here mean? Accessing security info requires an MFA session no older than 10 mins

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Registering authentication methods in aka.ms/mysecurityinfo. It's the expression used in other docs and even in audit logs. See https://learn.microsoft.com/en-us/entra/identity/authentication/howto-registration-mfa-sspr-combined-troubleshoot for reference.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it help to hyperlink https://learn.microsoft.com/en-us/entra/identity/authentication/concept-registration-mfa-sspr-combined on that "registering security info" text?


- **Authentication strength and registration of security info**: Registering security info requires an MFA session no older than 10 minutes, leading to an interactive request for MFA if such requirement isn't met. This can lead users to choose an MFA method that, when combined with the first factor authentication method previously used, doesn't satisfy the enforced authentication strength, resulting in the error *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*.

Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The remediation action is not clear. Please use links to existing documentation as this states system knowledge that readers might not have.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Might be better to remove it all together, as remediation/alternative is complex and highly-tenant specific (a guide covering it all could well be a separated doc and would be very consulting-like)

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds a new “Known issue” to the Conditional Access authentication strengths documentation to explain a conflict between authentication strengths enforcement and the 10-minute MFA session requirement for security info registration, and outlines tenant/user-level mitigations.

Changes:

  • Documented the conflict scenario and resulting user-facing error when the chosen MFA method doesn’t satisfy the enforced authentication strength.
  • Added suggested mitigation options (policy configuration and user guidance) for resolving the conflict.


When the user unlocks their Windows device by using Windows Hello for Business, they can access the resource again. Yesterday's sign-in satisfies the authentication strength requirement, and today's device unlock satisfies the sign-in frequency requirement.

- **Authentication strength and registration of security info**: Registering security info requires an MFA session no older than 10 minutes, leading to an interactive request for MFA if such requirement isn't met. This can lead users to choose an MFA method that, when combined with the first factor authentication method previously used, doesn't satisfy the enforced authentication strength, resulting in the error *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*.
Copy link

Copilot AI Apr 21, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The first sentence in this known-issue bullet is a long, hard-to-parse chain of clauses ("requires… leading… if…"). Consider rewriting as 2–3 shorter, active-voice sentences (for example: explain the 10-minute MFA requirement, then the resulting MFA prompt, then how that can fail the enforced authentication strength) to improve readability and reduce ambiguity.

Suggested change
- **Authentication strength and registration of security info**: Registering security info requires an MFA session no older than 10 minutes, leading to an interactive request for MFA if such requirement isn't met. This can lead users to choose an MFA method that, when combined with the first factor authentication method previously used, doesn't satisfy the enforced authentication strength, resulting in the error *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*.
- **Authentication strength and registration of security info**: Registering security info requires an MFA session that's no older than 10 minutes. If the session is older than 10 minutes, the user is prompted to complete MFA interactively. The user might then choose an MFA method that, when combined with the previously used first-factor authentication method, doesn't satisfy the enforced authentication strength. This results in the error *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*.

Copilot uses AI. Check for mistakes.

- **Authentication strength and registration of security info**: Registering security info requires an MFA session no older than 10 minutes, leading to an interactive request for MFA if such requirement isn't met. This can lead users to choose an MFA method that, when combined with the first factor authentication method previously used, doesn't satisfy the enforced authentication strength, resulting in the error *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*.

Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength.
Copy link

Copilot AI Apr 21, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This sentence references UI settings/actions in quotes and with slightly unclear phrasing ("enforcing "Sign-in frequency: every time" to the "Register security info" user action"). Consider using the doc convention of bolding UI labels and describing the configuration as setting Sign-in frequency to Every time for the Register security info user action (and use "for" rather than "to").

Suggested change
Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength.
Changes can be made at the tenant level, such as setting **Sign-in frequency** to **Every time** for the **Register security info** user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength.

Copilot uses AI. Check for mistakes.

- **Authentication strength and registration of security info**: Registering security info requires an MFA session no older than 10 minutes, leading to an interactive request for MFA if such requirement isn't met. This can lead users to choose an MFA method that, when combined with the first factor authentication method previously used, doesn't satisfy the enforced authentication strength, resulting in the error *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*.

Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength.
Copy link

Copilot AI Apr 21, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There are a couple of capitalization inconsistencies here compared to earlier usage in this article: "Passkeys" is capitalized while the prior example uses "passkey", and "Authentication Strength" is capitalized even though it's used as a generic concept in this sentence. Align the capitalization (for example, "passkeys" / "authentication strength") unless you’re intentionally referring to a specific UI label.

Suggested change
Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength.
Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced authentication strength.

Copilot uses AI. Check for mistakes.
@v-regandowner
Copy link
Copy Markdown
Contributor

@InbarckMS

Can you review the proposed changes?

IMPORTANT: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

…n of security info

Removed mitigation/alternative
- **Authentication strength and registration of security info**: Registering security info requires an MFA session no older than 10 minutes, leading to an interactive request for MFA if such requirement isn't met. This can lead users to choose an MFA method that, when combined with the first factor authentication method previously used, doesn't satisfy the enforced authentication strength, resulting in the error *"Let’s try something else. Another sign-in method is required to access this resource. Close your browser and try again, but choose another way to sign-in"*.

Changes can be made at the tenant level, such as enforcing "Sign-in frequency: every time" to the "Register security info" user action or enabling Passkeys for Windows Hello for Business users, or at the user level, such as ensuring they authenticate with a session at most 10 minutes old or ensuring they authenticate with a combination of methods included in the enforced Authentication Strength.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@namkedia - removed this

@learn-build-service-prod
Copy link
Copy Markdown
Contributor

Learn Build status updates of commit d5eff21:

✅ Validation status: passed

File Status Preview URL Details
docs/identity/authentication/concept-authentication-strengths.md ✅Succeeded

For more details, please refer to the build report.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants