Skip to content

Enforce MFA

With Zero Trust policies, you can require that users log in to certain applications with specific types of multifactor authentication (MFA) methods. For example, you can create rules that only allow users to reach a given application if they authenticate with a physical hard key.

This feature is only available if you are using the following identity providers:

  • Okta
  • Microsoft Entra ID (formerly Azure AD)
  • OpenID Connect (OIDC)
  • SAML

To enforce an MFA requirement to an application:

  1. In Zero Trust, go to Access > Applications.

  2. Find the application for which you want to enforce MFA and select Configure. Alternatively, create a new application.

  3. Go to Policies.

  4. If your application already has a policy containing an identity requirement, find it and select Configure.

  5. Add the following rule to the policy:

    Rule typeSelectorValue
    RequireAuthentication methodmfa - multiple-factor authentication
  6. Save the policy.

Adding authentication methods into the JWT

When users authenticate with their identity provider, the identity provider then shares their username with Cloudflare Access. Cloudflare Access then writes that value into the JSON Web Token (JWT) generated for the user.

Certain identity providers can also share the multifactor authentication (MFA) method presented by the user to login. Cloudflare Access can add these values into the JWT and force. For example, if the user authenticated with their password and a physical hard key, the identity provider can send a confirmation to Cloudflare Access.

Cloudflare Access then stores that method into the same JWT issued to the user.

Cloudflare Access follows RFC 8176, Authentication Method Reference Values, to define authentication methods.