Switch branches/tags
Find file History
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.


Username/Password MFA Authentication Adapters


This project enables you to create and register an additional authentication provider in AD FS so that users can sign on with another factor (such as Azure MFA) first, then be prompted for their password second.

Why would I want this project?

Enabling password as a secondary factor protects the account and password from attacks by making it more difficult to access the password prompt and try common passwords, for example.


  • An AD FS server running Windows Server 2012 R2 or 2016
  • A development box running Visual Studio. For detailed requirements for AD FS external adapters see “Setting up the development box” in this blog.

Getting Started

  • Build the adapter using the process detailed under “Build the adapter” in this blog.

  • Copy the adapter dll to your test AD FS server and register it using the steps under “Register your provider in AD FS” in this blog.

  • Example powershell command line:

PS C:\>$typeName = "UsernamePasswordSecondFactor. UsernamePasswordAdapter, MFAadapter, Version=, Culture=neutral, PublicKeyToken=e675eb33c62805a0, processorArchitecture=MSIL”
PS C:\>Register-AdfsAuthenticationProvider -TypeName $typeName -Name “MyMFAAdapter”
PS C:\>net stop adfssrv
PS C:\>net start adfssrv 
  • Then create a policy that requires additional auth for sign on and give it a try. If you’re running AD FS 2012 R2, you can use the detailed steps in the blog to test.

Contributing (Special Note)

If you are contributing code, please be sure that you remove any signing key from any code you put in a pull request. This project is public, and anyone on the Internet can see it.

For the full Contributing details, please see the root README.