When vCenter Server is integrated with Microsoft Entra ID (formerly Azure AD) for Identity Federation, administrators may need to enforce Multi-Factor Authentication (MFA).
As vCenter Server offloads the authentication process to the external Identity Provider via OpenID Connect (OIDC), MFA cannot be enabled directly within the vSphere Client. Instead, it must be configured at the external Identity Provider level using Conditional Access Policies.
vCenter Server relies on the external Identity Provider (Entra ID) to validate the user's identity. If the Identity Provider does not have a policy requiring MFA for the vCenter application, users will not be prompted for MFA authentication.
MFA is enforced by creating a Conditional Access policy within the Microsoft Entra admin center for the vCenter App Registration.
vCenter Server must be successfully integrated with Microsoft Entra ID by following KB 322179 before following the below steps.
Check the below Microsoft link for more information regarding the MFA configuration:
Secure user sign-in events with Microsoft Entra multifactor authentication