

Select On in the Enable policy selector and click Create.ĭeploy a Windows Server 2016/2019 and join the server to the Active Directory domain (you can also use an existing server in your network). Enable also the Require one of the selected controls option then click Select. Select Grant access and check the Require multi-factor authentication option. Once the selection has been completed, click on 0 controls selected link. From the list on the right, select users and groups to add then click Select. Select option Select users and groups and enable the Users and groups checkbox. Now go back to the homepage and select Security.Įnter a Name for the new policy then click 0 users and groups selected to add the users/groups to configure. Select No in the Enable Security Default selector. Go to Properties area and click the Manage Security defaults link. To enable MFA, security defaults must be disabled. In the homepage under Overview, write down your Tenant ID. Login to your Azure portal using a global administrator account.

To take benefit of MFA in Azure, it is required the license Azure AD Premium P1 and Premium P2 or Enterprise Mobility + Security that include the Azure AD Multi-Factor Authentication service. In the market there are several solutions that provide MFA, but Azure MFA is becoming popular since the majority of companies leverages Office 365 services. To add an extra layer of security for the external accesses to VMware Horizon infrastructure, login procedure must be enforced with a multi-factor authentication (MFA) solution, such as Azure MFA.
