After I enabled and tested MFA for Windows logon, I noticed something odd β users who had already enrolled for MFA were not being prompted for MFA when logging into the ADSelfService Plus web portal (https://mfa-server:9251
).
Turns out, MFA for web portal login is not enforced by default β it needs to be configured separately. Here’s how I fixed it:
βοΈ Step-by-Step: Enabling MFA for Web Portal Login
π§ Step 1: Go to the Right Setting
- I logged into the admin console
- Navigated to:
Configuration β Under MFA> MFA for Applications β ADSelfService Plus Login

β Step 2: Enable MFA for Portal Logins
- Checked Enable MFA for ADSelfService Plus Login
- Selected the authentication methods I had allowed users to enroll with (e.g., Security Questions, Microsoft Authenticator)
- Set the required number of factors (I chose 2 if two level required)
- Save and Apply changes.


π§ͺ Step 3: Testing the Experience
- I opened the ADSelfService Plus portal in an incognito browser
- Logged in as a test user
- This time, after entering the password, the user was correctly prompted for the second factor



π« Removing CAPTCHA from the Web Portal Login
In my testing, users found the CAPTCHA prompt at login unnecessary, especially when MFA was already enabled. Here’s how I removed it from ADSelfService Plus.
π§ Step 1: Go to Admin β Admin Settings
- I logged into the ADSelfService Plus admin portal
- Navigated to:
Admin β Product Settings β Login Settings

β Step 2: Disable CAPTCHA
- Located the option:
β Show CAPTCHA in login page - Unchecked it
- Also unchecked Show CAPTCHA in reset/unlock pages, if not needed


4. Save it.
π§ͺ Step 3: Testing the Experience



π Things to Keep in Mind
- MFA for the web portal is not enabled by default
- It must be configured separately from endpoint MFA (Windows, OWA, VPN, etc.)
- Make sure users have enrolled in the methods youβve selected for authentication
- You can use Enrollment Reports to verify readiness