You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/.vitepress/theme/components/EntraUseCaseCards.vue
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -9,29 +9,29 @@ const useCases = [
9
9
{
10
10
icon:'cloud',
11
11
title:'Microsoft 365 & Cloud Apps',
12
-
desc:'Secure access to Outlook, Teams, SharePoint and other cloud applications with Mobile ID as MFA — for every employee, on every device.',
13
-
methods: ['SIM', 'App'],
12
+
desc:'Secure access to Outlook, Teams, SharePoint and other cloud applications. Entra consumes the external MFA result while Mobile ID runs the strong method.',
13
+
methods: ['SIM', 'App', 'Passkey'],
14
14
color:'blue'
15
15
},
16
16
{
17
17
icon:'shield',
18
18
title:'VPN & Remote Access',
19
-
desc:'Protect VPN gateways, Citrix, VDI and remote desktop sessions. Mobile ID SIM works even on basic phones without app installation.',
19
+
desc:'Protect VPN gateways, Citrix, VDI and remote desktop sessions. SIM and App both work well for out-of-band MFA in client-driven and remote-session journeys.',
20
20
methods: ['SIM', 'App'],
21
21
color:'green'
22
22
},
23
23
{
24
24
icon:'lock',
25
25
title:'Privileged Access',
26
-
desc:'Enforce stronger authentication for admin accounts and sensitive systems. Mobile ID provides multiple strong methods to protect privileged access.',
27
-
methods: ['SIM', 'App'],
26
+
desc:'Require an external MFA step for admin accounts and sensitive systems. Entra decides when MFA is needed; Mobile ID handles the provider-side method.',
27
+
methods: ['SIM', 'App', 'Passkey'],
28
28
color:'pink'
29
29
},
30
30
{
31
31
icon:'users',
32
32
title:'Hybrid & Field Workforce',
33
-
desc:'Field workers without smartphones use SIM-based MFA. Office staff use the App with biometrics. One provider, every scenario covered.',
34
-
methods: ['SIM', 'App'],
33
+
desc:'Cover mixed workforces with one provider: SIM for users without smartphones, App for smartphone users, and passkeys for browser-centric journeys where enabled.',
Copy file name to clipboardExpand all lines: docs/oidc-integration-guide/cloud-integration-guide.md
+18-3Lines changed: 18 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,23 +4,38 @@ This chapter covers a few Mobile ID integration scenario examples with popular p
4
4
5
5
## Microsoft Entra ID
6
6
7
-
[MobileID](https://www.swisscom.ch/mid) integrates with Microsoft Entra ID using External MFA, enabling Multi-Factor-Authentication (MFA) for Entra ID logon. MobileID provides seamless inline user enrolment, self-service device management, and supports a range of authentication methods, including highly secure crypto-SIM tokens and app-based push authentication for iOS and Android, with advanced options such as Number Matching and Geofencing.
7
+
[MobileID](https://www.swisscom.ch/mid) integrates with Microsoft Entra ID using External MFA. In this model, Entra ID remains the identity platform and hands the MFA step to MobileID as the external provider.
8
+
9
+
Within the broader Mobile ID ecosystem, strong user authentication can be fulfilled with **Mobile ID SIM**, **Mobile ID App**, and **Mobile ID Passkeys**. Microsoft Entra ID does not need to understand or configure these internal methods individually. It consumes the successful result of the Mobile ID provider flow.
8
10
9
11
In 2020, Microsoft announced plans to replace custom controls with a new method for integrating third-party authentication. MobileID has been working closely with Microsoft to deliver an authentication solution for Microsoft External MFA, previously known as External Authentication Methods (EAM), available from May 2024 and generally available since March 2026.
10
12
11
-
MobileID via External MFA is fully recognized as a multifactor authentication method within Entra ID, meeting MFA policy requirements. Once MobileID is defined as an External MFA provider, you can create Entra ID conditional access policies with MFA using MobileID and assign these to specific users, groups, or applications.
13
+
MobileID via External MFA can satisfy the standard **Require multifactor authentication** grant control in Entra ID Conditional Access and is managed alongside the other authentication methods in Entra ID. It is not identical to every built-in Entra method, however: Microsoft does not currently support External MFA with Authentication Strengths.
12
14
13
15
::: info
14
16
External MFA in Microsoft Entra ID is now generally available. For the current Microsoft guidance, see the [GA announcement](https://techcommunity.microsoft.com/blog/microsoft-entra-blog/external-mfa-in-microsoft-entra-id-is-now-generally-available/4488926), [How to manage external MFA in Microsoft Entra ID](https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage), and the [Microsoft Entra External MFA method provider reference](https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-external-method-provider). External MFA replaces Custom Controls, which Microsoft plans to deprecate on September 30, 2026.
15
17
:::
16
18
19
+
### How the Entra External MFA Hand-off Works
20
+
21
+
Microsoft Entra ID talks to the external provider through the **OIDC implicit-flow pattern documented by Microsoft for External MFA**. In practice, Entra ID sends a request to the MobileID authorization endpoint with parameters such as `response_type=id_token`, `response_mode=form_post`, and an `id_token_hint` that identifies the user and tenant.
22
+
23
+
MobileID validates that Entra context, runs the provider-side authentication journey, and returns a signed `id_token` to Entra ID. Entra ID validates the returned claims and decides whether the MFA requirement is satisfied.
24
+
25
+
This separation is important for documentation and operations:
26
+
27
+
-**Entra ID** decides when MFA is required and consumes the external MFA result.
28
+
-**Mobile ID** decides how the user authenticates inside the provider journey.
29
+
- Method-specific controls from the standard Mobile ID OIDC integration, such as ACR values or passkey `keyringId` handling, are **not configured in the Entra admin center**.
- Users must specifically select the MobileID External MFA option during authentication. If they have other MFA methods configured besides MobileID, they may need to click "Other options" on the Microsoft "Verify your identity" prompt in order to choose MobileID.
38
+
- Microsoft Entra ID does not expose Mobile ID-specific method selection. Whether Mobile ID uses SIM, App, or Passkey inside the provider journey depends on the user's activated methods and the Mobile ID provider-side configuration for that Entra integration.
24
39
- Cross-tenant user authentication with MobileID External MFA has limitations. It will only work if:
25
40
- The external Microsoft Entra organization trusts MFA claims from the user's home tenant.
26
41
- The user has already established a valid MFA claim by authenticating to an application within their home tenant before accessing the cross-tenant application.
@@ -96,7 +111,7 @@ If you have multiple Entra ID authentication methods enabled, you may need to cl
You will be redirected to the MobileID prompt or user enrolment, depending on your configuration.
114
+
You will be redirected to the MobileID provider journey, where MobileID either starts user enrolment or prompts for one of the enabled authentication methods, depending on your configuration.
100
115
101
116
Once you complete the MobileID authentication, you'll return to Entra ID to finish logging in to the application.
Copy file name to clipboardExpand all lines: docs/oidc-integration-guide/passkey-authentication.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,12 @@ MobileID Passkeys are now live in the production environment as a **freshly laun
6
6
7
7
MobileID now supports **FIDO2 Passkeys** as an authentication method within the OpenID Connect service. Relying Parties can allow their users to authenticate using MobileID Passkeys - alongside or instead of the existing MobileID SIM, App, and OTP SMS methods.
8
8
9
+
::: info Scope: standard Mobile ID OIDC vs. Entra External MFA
10
+
This page documents the **standard Mobile ID OIDC relying-party integration**, where the RP uses the authorization code flow and can request Mobile ID-specific ACR values, passkey scopes, and `keyringId` handling.
11
+
12
+
**Microsoft Entra ID External MFA is a different integration pattern.** In that model, Entra ID calls the external provider with its own OIDC implicit-flow profile and consumes only the provider result. The Entra admin center does not expose these Mobile ID-specific ACR or passkey controls. See [Public Cloud Integration / Microsoft Entra ID](/oidc-integration-guide/cloud-integration-guide#microsoft-entra-id).
13
+
:::
14
+
9
15
## What Are Passkeys?
10
16
11
17
The MobileID ecosystem already offers several proven authentication methods: **MobileID SIM** (SIM-based authentication), **MobileID App** (push-based authentication on iOS and Android), and **OTP SMS**. With the introduction of **FIDO2 Passkeys**, MobileID now adds a modern, phishing-resistant authentication option to its portfolio - giving Relying Parties and their users even more flexibility to balance security and convenience.
0 commit comments