Enable combined security information registration in Microsoft Entra ID

Before combined registration, users registered authentication methods for Microsoft Entra multifactor authentication and self-service password reset (SSPR) separately. Users were confused that similar methods were used for Microsoft Entra multifactor authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Microsoft Entra multifactor authentication and SSPR.

To help you understand the functionality and effects of the new experience, see the Combined security information registration concepts.

Combined security information registration enhanced experience

Conditional Access policies for combined registration

To secure when and how users register for Microsoft Entra multifactor authentication and self-service password reset, you can use user actions in Conditional Access policy. This functionality may be enabled in organizations that want users to register for Microsoft Entra multifactor authentication and SSPR from a central location, such as a trusted network location during HR onboarding.

Note

This policy applies only when a user accesses a combined registration page. This policy doesn't enforce MFA enrollment when a user accesses other applications.

For more information about creating trusted locations in Conditional Access, see What is the location condition in Microsoft Entra Conditional Access?

Create a policy to require registration from a trusted location

Complete the following steps to create a policy that applies to all selected users that attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network:

  1. Sign in to the Azure portal as at least a Conditional Access Administrator.

  2. Browse to Microsoft Entra ID > Security > Protection > Conditional Access.

  3. Select + Create New policy.

  4. Enter a name for this policy, such as Combined Security Info Registration on Trusted Networks.

  5. Under Assignments, select Users. Choose the users and groups you want this policy to apply to.

    Warning

    Users must be enabled for combined registration.

  6. Under Cloud apps or actions, select User actions. Check Register security information, then select Done.

    Create a Conditional Access policy to control security info registration

  7. Under Conditions > Locations, configure the following options:

    1. Configure Yes.
    2. Include Any location.
    3. Exclude All trusted locations.
  8. Under Access controls > Grant, choose Block access, then Select.

  9. Set Enable policy to On.

  10. To finalize the policy, select Create.

Next steps

If you need help, see troubleshoot combined security info registration or learn What is the location condition in Microsoft Entra Conditional Access?

Review how you can enable self-service password reset and enable Microsoft Entra multifactor authentication in your tenant.

If needed, learn how to force users to re-register authentication methods.