
Our research shows that these settings are right for most tenants. This app is used as a broker to other Azure AD federated apps, and reduces authentication prompts on the device.
#Duo mfa token free#
#Duo mfa token password#
Some examples include a password change, an incompliant device, or an account disable operation. It might sound alarming to not ask for a user to sign back in, though any violation of IT policies revokes the session. If users are trained to enter their credentials without thinking, they can unintentionally supply them to a malicious credential prompt. Asking users for credentials often seems like a sensible thing to do, but it can backfire.

The Azure AD default configuration for user sign-in frequency is a rolling window of 90 days. You can configure these reauthentication settings as needed for your own environment and the user experience you want.


This reauthentication could be with a first factor such as password, FIDO, or passwordless Microsoft Authenticator, or to perform multifactor authentication (MFA). Azure Active Directory (Azure AD) has multiple settings that determine how often users need to reauthenticate.
