no Support for Yubikey/FIDO2-MFA-Authentication
Describe the bug We have phishing resistant MFA for all administrators using password + Yubikey FIDO2 authentication only.
To Reproduce Steps to reproduce the behavior:
- create an admin account in Entra ID
- create a Conditional Access policy to Require multifactor authentication
- enable "Require authentication strength" with "Phishing-resistant MFA"
- run "pac auth create --environment
" - login as an administrator with UPN and password
- The following error is shown:
Error Code: 53003 Request Id: ed2e7800-4636-4dfc-9879-3b1f4d901200 Correlation Id: 689f8b1c-ba3c-421c-9219-886c23a3605b Timestamp: 2025-03-14T13:46:13.793Z App-Name: Power Platform CLI - pac App-ID: 9cee029c-6210-4654-90bb-17e6e9d36617 IP-Adresse: 46.81.31.44 Gerätebezeichner: ab03d11a-42f0-45c3-b9fe-46dfbe3ecb1e Geräteplattform: Windows 10 Gerätestatus: Compliant
Expected behavior MFA authentication should take place where I insert my Yubikey, enter the PIN and push the button.
Screenshots
Desktop (please complete the following information):
- OS: Windows 11 Enterprise Germany
- Browser Edge
- Version 135.0.3179.11
Additional context