🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 2
Domain 2 — Module 3 of 8 38%
7 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 2: Microsoft Entra Capabilities Premium ⏱ ~12 min read

Authentication: Passwords, MFA & Passwordless

How do you prove you are who you say you are? Passwords, multi-factor authentication, FIDO2 keys, Windows Hello — and why passwordless is the future.

What is authentication?

☕ Simple explanation

Authentication is the digital equivalent of showing your ID at the door.

When you withdraw money from a bank, the teller asks for ID. You show your driver’s licence (something you have) and maybe answer a security question (something you know). If both check out, they hand over the cash.

Online authentication works the same way. You prove your identity using one or more “factors” — a password, a phone notification, a fingerprint. The more factors you provide, the more confident the system is that you really are you.

Authentication is the process of proving your identity to a system. In Microsoft Entra ID, this happens every time a user, device, or application requests access to a protected resource.

Entra ID supports multiple authentication methods with varying levels of security and convenience. The trend is moving away from passwords (which can be phished, guessed, or stolen) toward passwordless methods that are both more secure and easier to use.

The three factor categories

Every authentication method falls into one of three categories. The exam tests these directly:

FactorCategoryExamples
Something you knowKnowledgePassword, PIN, security questions
Something you havePossessionPhone, security key, smart card
Something you areBiometricFingerprint, face scan, iris scan

Key exam concept: Multi-factor authentication requires at least TWO factors from DIFFERENT categories. Password + security question is NOT MFA — both are “something you know.” Password + phone approval IS MFA — “something you know” plus “something you have.”

Authentication methods in Entra ID

Microsoft Entra ID offers several authentication methods, from traditional passwords to modern passwordless options:

Passwords

The most common but least secure method. Passwords can be phished, guessed, or stolen in data breaches. Microsoft is actively encouraging organisations to move beyond passwords.

Microsoft Authenticator app

A free mobile app that supports three modes:

  • Push notification — approve or deny a sign-in with one tap
  • Number matching — the sign-in screen shows a number, you enter it in the app (prevents MFA fatigue attacks)
  • Time-based one-time passcode (TOTP) — a 6-digit code that changes every 30 seconds

FIDO2 security keys

Physical hardware keys (like a YubiKey) that plug into USB or tap via NFC. They use public-key cryptography — no shared secrets that can be phished.

Windows Hello for Business

Uses biometrics (face or fingerprint) or a PIN tied to the specific device. The PIN never leaves the device and is backed by hardware security. It looks simple, but it’s actually strong passwordless authentication.

Certificate-based authentication

Uses digital certificates stored on smart cards or devices. Common in government and highly regulated environments.

Passkeys

The newest addition. Passkeys are a FIDO2-based credential stored on your device (phone, laptop, or security key). They’re synced across devices and resist phishing because they’re bound to the specific website.

Comparing authentication methods

More secure methods also tend to be easier for users
MethodSecurity LevelUser ExperiencePhishing Resistant
Password onlyLowFamiliar but frustratingNo
Password + SMS codeMediumAdds a stepPartially (SIM swap risk)
Password + Authenticator pushHighQuick tap to approvePartially (MFA fatigue risk)
Authenticator with number matchingHighRequires reading and typing a numberYes
FIDO2 security keyVery highTap or insert the keyYes
Windows Hello for BusinessVery highLook at camera or touch sensorYes
PasskeysVery highBiometric on deviceYes
💡 Exam tip: know which methods are 'passwordless'

The exam may ask which methods are considered passwordless. The answer: Windows Hello for Business, FIDO2 security keys, and the Microsoft Authenticator app (when configured for passwordless sign-in). These methods don’t use passwords at all — not even as a fallback.

SMS codes are NOT passwordless — they’re typically used as a second factor alongside a password.

Multi-factor authentication (MFA)

MFA requires users to provide two or more verification factors from different categories. It’s the single most effective defence against account compromise.

The statistic to remember: Microsoft reports that MFA blocks 99.9 percent of account compromise attacks. That’s not marketing — it’s based on real data from billions of sign-in attempts.

Why MFA works

An attacker who steals your password still can’t sign in because they don’t have your phone (second factor). An attacker who steals your phone can’t sign in because they don’t know your password (first factor). They’d need to compromise BOTH at the same time.

MFA in Entra ID

There are two ways to enable MFA:

Security Defaults (free):

  • Available in every Entra ID tenant at no extra cost
  • Requires all users to register for MFA using the Authenticator app
  • Blocks legacy authentication protocols (which can’t do MFA)
  • Perfect for small organisations like BrightStar

Conditional Access (requires P1):

  • Granular control over WHEN and HOW MFA is required
  • Example: “Require MFA for all admin sign-ins” or “Require MFA when signing in from outside the corporate network”
  • Can combine with device compliance, location, and risk signals
💡 Scenario: Raj rolls out MFA at Lakewood University

Raj enables Security Defaults as the first step — it’s free and covers all 5,000 users immediately. Every student and staff member must register the Authenticator app within 14 days.

Professor Chen complains: “I have to approve my phone every time I log in?” Raj explains that Entra ID uses smart detection — if Chen signs in from his usual campus laptop at the usual time, MFA may not be prompted. But if someone tries to sign in from an unfamiliar country, MFA kicks in immediately.

Six months later, Raj upgrades to Conditional Access (P1) for more control:

  • Students: MFA only from off-campus
  • Staff: MFA always
  • IT admins: MFA + compliant device required

MFA fatigue and number matching

When users get too many MFA prompts, they start approving them without thinking — this is called MFA fatigue. Attackers exploit this by flooding a user’s phone with approval requests until they tap “Approve” just to make it stop.

Number matching solves this. Instead of just tapping “Approve,” the user must type the two-digit number shown on the sign-in screen into the Authenticator app. If an attacker triggers the MFA prompt, the victim doesn’t know the number — so they can’t accidentally approve it.

Key exam concept: Number matching in the Authenticator app is now the default for MFA push notifications. It prevents MFA fatigue attacks by requiring the user to actively match a number displayed on the sign-in screen.

The path from passwords to passwordless

LevelWhat It MeansExample
Password onlySingle factor, weakest securityTyping a password to sign in
Password + MFATwo factors, strong protectionPassword plus Authenticator approval
PasswordlessNo password at all, strongest and easiestWindows Hello face scan, FIDO2 tap, passkey

The goal is to get everyone to passwordless. It’s more secure (nothing to phish) AND more convenient (no password to remember or type).

🎬 Video walkthrough

🎬 Video coming soon

Authentication and MFA — SC-900 Domain 2

Authentication and MFA — SC-900 Domain 2

~10 min

Flashcards

Question

What are the three authentication factor categories?

Click or press Enter to reveal answer

Answer

1) Something you know (password, PIN). 2) Something you have (phone, security key). 3) Something you are (fingerprint, face). MFA requires at least two factors from DIFFERENT categories.

Click to flip back

Question

What percentage of account compromise attacks does MFA block?

Click or press Enter to reveal answer

Answer

99.9 percent — based on Microsoft data from billions of sign-in attempts. MFA is the single most effective defence against credential theft, phishing, and brute-force attacks.

Click to flip back

Question

What is the difference between Security Defaults and Conditional Access for MFA?

Click or press Enter to reveal answer

Answer

Security Defaults: free, applies MFA to all users, uses Authenticator app, blocks legacy auth. Conditional Access: requires Entra ID P1, lets you create granular policies (who, when, where, what conditions). Security Defaults is the starting point; Conditional Access gives fine-grained control.

Click to flip back

Question

Which authentication methods are considered passwordless?

Click or press Enter to reveal answer

Answer

Windows Hello for Business, FIDO2 security keys, Microsoft Authenticator (passwordless mode), and passkeys. All are phishing-resistant and do not use passwords — not even as a fallback.

Click to flip back

Question

What is number matching in MFA?

Click or press Enter to reveal answer

Answer

A feature in the Authenticator app where the user must type the two-digit number shown on the sign-in screen. Prevents MFA fatigue attacks — if an attacker triggers the prompt, the victim doesn't know the number and can't approve it accidentally.

Click to flip back

Knowledge Check

Knowledge Check

A Lakewood University student uses a password and then approves a notification on their phone via the Authenticator app. How many authentication factors are used, and from which categories?

Knowledge Check

Sam has a tight budget and wants to enable MFA for all 50 BrightStar staff at zero cost. What should Sam use?

Knowledge Check

Raj notices that several staff members are approving MFA prompts they didn't initiate — attackers are spamming them with notifications. Which feature should Raj enable to prevent this?

← Previous

Hybrid & External Identities

Next →

Password Protection & Self-Service Reset

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.