Get-EntraBetaUserAuthenticationRequirement

Retrieve the authentication method status of a user.

Syntax

Get-EntraBetaUserAuthenticationRequirement
   -UserId <String>
   [<CommonParameters>]

Description

The Get-EntraBetaUserAuthenticationRequirement cmdlet retrieves the authentication method status of a user.

In delegated scenarios with work or school accounts, the signed-in user must have a supported Microsoft Entra role or a custom role with the necessary permissions. The following least privileged roles can perform this operation:

  • Global Reader
  • Authentication Policy Administrator

Examples

Example 1: Retrieve a User's MFA Status

Connect-Entra -Scopes 'Policy.Read.All'
Get-EntraBetaUserAuthenticationRequirement -UserId 'SawyerM@contoso.com'

perUserMfaState @odata.context
--------------- --------------
disabled        https://graph.microsoft.com/beta/$metadata#users(..)

This example retrieves the authentication method status of a user.

A user's state shows whether an Authentication Administrator enrolls them in per-user Microsoft Entra multifactor authentication. User accounts have one of three distinct states in Microsoft Entra MFA:

  • Disabled - The default state for a user not enrolled in per-user Microsoft Entra multifactor authentication.
  • Enabled - The user is enrolled in per-user Microsoft Entra multifactor authentication, but can still use their password for legacy authentication. If the user has no registered MFA authentication methods, they receive a prompt to register the next time they sign in using modern authentication (such as when they sign in on a web browser).
  • Enforced - The user is enrolled per-user in Microsoft Entra multifactor authentication. If the user has no registered authentication methods, they receive a prompt to register the next time they sign in using modern authentication (such as when they sign in on a web browser). Users who complete registration while they're Enabled are automatically moved to the Enforced state.

Parameters

-UserId

Specifies the ID (as a UserPrincipalName or UserId) of a user in Microsoft Entra ID.

Type:System.String
Aliases:ObjectId
Position:Named
Default value:None
Required:True
Accept pipeline input:True
Accept wildcard characters:False

Notes

The most effective way to protect users with Microsoft Entra MFA is by creating a Conditional Access policy. Conditional Access, a feature available in Microsoft Entra ID P1 and P2, allows you to enforce MFA based on specific conditions and scenarios. To learn how to set up Conditional Access, refer to the tutorial: Secure user sign-in events with Microsoft Entra multifactor authentication.

For Microsoft Entra ID Free tenants without Conditional Access, you can use security defaults to protect users. MFA prompts are automatic, but you can't customize the rules.