MFA is most effective when it is policy-driven rather than universally forced. Identity platforms need enough flexibility to require stronger verification for administrators, risky sign-ins, or sensitive actions without blocking every low-risk workflow.
Choose the Right Factors
Time-based one-time passwords and email codes are common starting points. Hardware keys and passkeys can be added for higher assurance environments. The right answer depends on the operational model of the customer, not only on the identity platform's technical capabilities.
Policy Before Prompts
Introduce MFA based on role, tenant policy, device state, or transaction risk. That approach keeps prompts predictable and avoids training users to treat every challenge as background noise.
Recovery Matters
Enrollment, backup methods, and account recovery are part of the security model. If those flows are weak, MFA adds user friction without adding much resilience. Treat recovery and revocation as first-class product features.