Entra ID Policy Deadline: Migrate MFA & SSPR Before Sept. 30
- David Steinhart, HBS Technical Architect - Systems
- Read Time: 3 mins
In this article...
- Why Microsoft is deprecating legacy MFA and SSPR policies on September 30, 2025
- What the new Authentication Methods Policy in Microsoft Entra ID is and how it works
- The risks of waiting until Microsoft enforces the change
- The benefits of migrating now, including modern authentication options and streamlined user experience
- A readiness checklist to help you plan your migration
Microsoft is retiring legacy Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) policies. By September 30, 2025, all organizations must migrate to the unified Authentication Methods Policy in Microsoft Entra ID. This is a move that strengthens security and simplifies user experience.
Additional good news is that this requirement also gives you a chance to modernize your identity infrastructure, strengthen defenses against credential-based attacks and improve your users’ experience.
Just looking for migration instructions?
Jumpt to the MFA and SSPR migration steps from Microsoft.
Why Migrating MFA and SSPR Policies Matters
For years, MFA and SSPR operated as separate policy silos. They worked. But they weren’t built for today’s threat landscape or tomorrow’s authentication needs. The unified Authentication Methods Policy changes that:
- Stronger security, lower risk. MFA blocks 99.9% of identity-based attacks, yet Gartner reports only 28% of enterprise accounts use it. Centralizing MFA and SSPR closes gaps while reducing admin overhead.
- A smoother user experience. One registration covers both MFA and password resets. That means less friction, fewer IT tickets and better compliance.
- Control the change, don’t react to it. Waiting until Microsoft flips the switch risks broken access flows, inconsistent registrations, and confused users. Proactive migration lets you set the pace.
What Is the Microsoft Entra ID Authentication Methods Policy?
The Authentication Methods Policy in Entra ID centralizes the management of all user authentication methods. From one place, you can enable, configure and assign methods to users or groups.
It also supports modern, phishing-resistant methods like:
- FIDO2 security keys
- Passkeys built into iOS, Android and Windows
- Temporary Access Pass (TAP) for secure onboarding
- QR Code + PIN sign-in for shared or kiosk devices
Admins can configure granular settings—like whether to allow office phones for voice calls or show application names and sign-in locations in Microsoft Authenticator—to reduce MFA fatigue and phishing risk.
To manage, head to: Microsoft Entra admin center > Entra ID > Authentication methods > Policies.
What to Expect from Your MFA and SSPR Migration
Migrating to the Authentication Methods Policy unlocks a lot more than just compliance:
- Combined registration: Users only register once for MFA and SSPR.
- Tiered MFA with Authentication Contexts: Require stronger MFA for high-risk apps, while keeping friction low for day-to-day tools.
- Clear communication templates: Microsoft provides messaging resources to help you onboard users smoothly.
This is also your chance to begin building a Zero Trust identity security foundation.
The Risks of Waiting to Migrate MFA and SSPR Policies
Microsoft hasn’t confirmed what happens if you miss the deadline. Two scenarios are likely:
- Legacy settings are disabled: You can no longer manage or change MFA/SSPR through the old ways.
- Legacy settings are ignored: Leaving users without approved authentication methods, risking tenant-wide lockout.
Either way, waiting until September 30, 2025, is a gamble.
Even Global Admins are subject to the new policy. If their methods aren’t migrated, they could potentially lose tenant access too.
MFA and SSPR Migration Readiness Checklist
- Identify current MFA/SSPR configuration
If you still see “per-user MFA” statuses like Enabled or Enforced, you’re running legacy. These were configurations in Azure AD and are not compatible with the new policy. - Verify Authentication Methods Policy
Configure your required MFA and SSPR settings and include modern methods. - Test critical accounts
Start with Global Administrators. Validate their access early.
Need Migration Assistance? Ask HBS
At HBS, we help organizations migrate identity controls without disruption. Our team will:
- Assess your current state: Map MFA/SSPR dependencies and risks.
- Design a migration plan: Phase the rollout to minimize friction.
- Implement and validate: Configure the new policy, update conditional access and test. We’ll also review and update conditional access policies post-migration to ensure they align with new authentication methods.
- Future-proof your identity security: Add phishing-resistant methods like FIDO2 and align with Zero Trust.
The September 30, 2025 deadline is approaching very quickly. Migrate now for less risk, stronger protection and a foundation ready for the future of authentication.
Talk to an HBS expert today to get started on your Entra ID authentication policy migration.
Related Content
Mandatory Microsoft MFA: Key Updates for Admins
Mandatory MFA is coming to Azure CLI, PowerShell, REST APIs, and more by Sept. 1, 2025. What’s changing, who’s affected, and how to prepare.
Microsoft Secure Score: What It Is, Why It Matters, and How to Improve Yours
Learn what Microsoft Secure Score is, how it works, what a good score looks like, practical ways to improve it. Tips, tools, and managed security options.
Mobile Device Security: Phishing, Mishing, and More
Protect your business from evolving mobile threats. Learn the top mobile security risks, best practices to mitigate them, and how HBS can help.