Fix Microsoft 365 Multi-Factor Authentication Requirement Error

Comprehensive guide to resolve MFA-related authentication errors during Cloudiway migration. Learn how to properly configure migration accounts to bypass Multi-Factor Authentication and conditional access policies.

Last updated: Troubleshooting Microsoft 365

Overview

Microsoft 365 Multi-Factor Authentication (MFA) requirement errors are common during migration projects when security policies block automated access. This comprehensive guide provides proven solutions to resolve MFA conflicts while maintaining security standards.

Quick Solution Summary

  • • Disable MFA on dedicated migration accounts
  • • Configure conditional access policy exclusions
  • • Verify administrative permissions
  • • Test connectivity before full migration

Common Error Messages

These are the most frequently encountered MFA-related error messages during Microsoft 365 migration:

Configuration Change Error

Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication.

MFA Enrollment Required

Due to a configuration change made by your administrator, or because you moved to a new location, you must enroll in multi-factor authentication to access '[TargetTenantID]'.

Conditional Access Block

Sign-in was blocked because it came from an IP address with malicious activity or Your sign-in was blocked due to a Conditional Access policy.

Root Causes

Understanding the underlying causes helps prevent future authentication issues during migration:

Security Policies

  • • MFA enabled on migration accounts
  • • Conditional Access policies requiring MFA
  • • Location-based access restrictions
  • • Device compliance requirements

Account Configuration

  • • Insufficient administrative permissions
  • • Account lockout or suspension
  • • Password expiration policies
  • • Legacy authentication blocks

Impact on Migration

These issues affect both Source and Target connectors when using cross-tenant migrations. Always verify settings for all migration accounts in your project to ensure consistent access.

Step-by-Step Solution

1

Create Dedicated Migration Accounts

Set up separate accounts specifically for migration to avoid affecting regular user accounts with security policy changes.

Recommended naming: migration-admin@yourdomain.com or cloudiway-migration@yourdomain.com

Security tip: Use temporary accounts that can be deleted after migration completion.

2

Disable Multi-Factor Authentication

Turn off MFA specifically for the migration accounts to allow automated authentication.

Azure Portal Method:

Azure Portal → Azure Active Directory → Users → [Migration Account] → Authentication Methods → Disable MFA

PowerShell Method:

Set-MsolUser -UserPrincipalName migration-admin@domain.com -StrongAuthenticationRequirements @()
3

Configure Conditional Access Exclusions

Create security group exclusions to bypass conditional access policies for migration accounts.

Best Practice: Create a "Migration Accounts" security group and exclude it from MFA-requiring policies.

Path: Azure Portal → Azure Active Directory → Security → Conditional Access → Policies → [Select Policy] → Exclude Users/Groups

4

Assign Administrative Permissions

Ensure migration accounts have the minimum required administrative roles for successful data access.

Required Roles (choose appropriate):

  • SharePoint Migration: SharePoint Administrator
  • Exchange Migration: Exchange Administrator
  • Teams Migration: Teams Administrator + SharePoint Administrator
  • Full Migration: Global Administrator (temporary)

Security Note: Use the principle of least privilege. Assign only necessary permissions and remove them post-migration.

5

Configure Trusted IP Ranges (Optional)

Add Cloudiway's IP ranges to trusted locations to prevent location-based access blocks.

Path: Azure Portal → Azure Active Directory → Security → Conditional Access → Named Locations

IP Ranges

Contact Cloudiway support for the current list of IP ranges used by the migration infrastructure.

Verification & Testing

Follow this verification process to ensure your configuration changes resolve the MFA issues:

Testing Checklist

  1. Sign in to Microsoft 365 Admin Center using migration account credentials
  2. Verify no MFA prompt appears during authentication
  3. Test access to SharePoint Admin Center and Exchange Admin Center
  4. Return to Cloudiway platform and test connector connectivity
  5. Run a small test migration (1-2 users) to verify end-to-end access
  6. Monitor migration logs for any remaining authentication errors

Test URLs

Security Best Practices

✅ Recommended

  • • Use dedicated, temporary migration accounts
  • • Apply changes only to migration accounts
  • • Monitor account activity during migration
  • • Document all security changes made
  • • Set account expiration dates
  • • Use strong, unique passwords

❌ Avoid

  • • Disabling MFA organization-wide
  • • Using regular user accounts for migration
  • • Leaving migration accounts active post-migration
  • • Ignoring conditional access policy impacts
  • • Sharing migration account credentials
  • • Bypassing security reviews

Post-Migration Security

After migration completion, immediately re-enable MFA, remove administrative permissions, and delete or disable migration accounts. Consider using Azure App Registration with certificate-based authentication for enhanced security in future migrations.

Advanced Troubleshooting

Still Getting MFA Errors?

  • Check tenant-wide MFA settings: Security Defaults might be enabled
  • Review all conditional access policies: Look for policies without exclusions
  • Verify account status: Ensure accounts aren't blocked or suspended
  • Check session management: Some policies may require fresh authentication
  • Test from different locations: VPN or proxy settings may interfere

Alternative Solutions

Azure App Registration: Use application permissions instead of delegated user permissions for enhanced security and reliability.

Service Accounts: Create service accounts with specific migration permissions that bypass user-focused conditional access policies.

API-based Authentication: Leverage Microsoft Graph API with client credentials flow for seamless automated access.

Frequently Asked Questions

How long do changes take to propagate?

Conditional Access and MFA changes typically take 5-15 minutes to propagate across Microsoft's systems.

Can I use existing admin accounts?

While possible, we recommend creating dedicated migration accounts to avoid impacting production administrative access and maintain security best practices.

What if my organization requires MFA for all accounts?

Consider using Azure App Registration with application permissions or work with your security team to create temporary exceptions for migration accounts.

Was this article helpful?

Help us improve our documentation by rating this article.

We value your feedback

Help us improve your experience

What would you like to share with us?

Need direct support? Open a ticket