Is "Remember MFA on trusted device" supported for external tenant accounts created through a user flow?

Aaron-0171 0 Reputation points
2025-07-09T18:58:10.36+00:00

Here's the scenario I'm wondering about:

  • I have setup an external tenant with Entra External ID.
  • I have a sign-in / sign-up user flow created and associated with a .NET core application.
  • A conditional access policy is setup to require MFA for all users during sign-in.
  • Through the user flow I have registered new users (local accounts) that use either email OTP or SMS for multi-factor authentication.
  • Every time I sign-in with these accounts through the user flow, I am prompted for MFA.

Is there a way to remember MFA on trusted devices for this scenario?

I have tried enabling the following setting found under "Users > Per-user MFA > Service settings" but there was no change in the user flow. This seems like a global setting, but it's unclear if it only applies to users that have been setup with MFA through the Per-user MFA screen or other account types.

User's image

Microsoft Security | Microsoft Entra | Microsoft Entra External ID
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Raja Pothuraju 24,290 Reputation points Microsoft External Staff Moderator
    2025-07-10T12:46:58.6666667+00:00

    Hello Aaron-0171,

    The "Remember multi-factor authentication on trusted devices" feature is supported in both Microsoft Entra External ID and Azure AD B2C tenants. To confirm this, I performed a quick test in my own External ID tenant by enabling the "Remember multi-factor authentication on trusted devices" option for 7 days using the Per-user MFA service settings. Please refer to the screenshot below.

    User's image

    After enabling this setting, all users in my tenant were able to see the option on the login screen to remember the device for the number of days specified.User's image

    I conducted the test using a regular user in the tenant—not a local or guest (B2B) account.

    It's important to note that this feature is not compatible with B2B users. The option will not appear for B2B users signing into invited tenants. In other words, if a user's identity is managed by an external identity provider rather than your own tenant, this feature will not be available. Reference: Remember multi-factor authentication – how the feature works.

    User's image To summarize:

    • The feature is supported in both Entra External ID and Azure AD B2C tenants.
    • It only works for users who are created in the same tenant.
    • It does not work for B2B users signing into an external tenant.

    Any local account created within your tenant will be managed under External Identities. One key observation is that the User Principal Name (UPN) format will vary between local accounts and internal users.

    To help illustrate this, I'm attaching a screenshot from my demo tenant, which contains four different types of users:

    User's imageTo help illustrate this, I'm attaching a screenshot from my demo tenant, which contains four different types of users:

    1. CIAM Admin User – This user was created directly in my External ID (CIAM) tenant. As expected, the identity uses the format CIAMDomain.onmicrosoft.com since it is natively managed within the CIAM directory.
    2. Hari – This user was created from the Azure portal using the "Create new external user" option. I provided a personal Microsoft account email address, so the authentication is handled by the personal Microsoft account system.

      The key point here is that the UPN appears in the format ******@CIAMDomain.onmicrosoft.com, indicating that the user identity is managed externally and not natively within the CIAM tenant.

    3. Signup Flow User – This account was created using a sign-up user flow, which also results in the user being managed by an external identity provider.
    4. Guest User – This user was invited from another tenant. Guest user identities will always show ExternalAzureAD as their source, indicating that they reside in a different directory.

    So, to summarize: Local account identities are always managed by their respective identity providers (like personal Microsoft accounts, social IDPs, etc.)—not directly by your CIAM tenant.

    I hope this information is helpful. Please feel free to reach out if you have any further questions. For a more detailed explanation with an example, please refer to the following Q&A post which discusses a similar scenario.

    https://learn.microsoft.com/en-us/answers/questions/2265280/does-entra-external-tenant-support-trusted-device


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.