OCI IAM is a native service of OCI that provides enterprise-class identity and access management features such as strong, adaptive authentication, user Lifecycle Management (LCM), and Single Sign-On (SSO) to enterprise applications. OCI IAM is deployed as identity domain(s) in OCI. Included domain(s) allow organizations to manage access to their Oracle Cloud services (network, compute, storage, etc.) and Oracle SaaS applications. Customers can choose to upgrade or create additional identity domains to accommodate other use cases such as managing workforce access to non-Oracle applications, enabling consumer access to customer-facing applications, or embedding IAM into custom-developed applications.
Each OCI IAM identity domain is a self-contained identity and access management solution that can be used to address a variety of IAM use cases. For example, you can use an OCI IAM identity domain to manage access for employees across numerous cloud and on-premises applications, enabling secure authentication, easy management of entitlements, and seamless SSO for end users. You might also want to stand up an identity domain to enable access to supply chain or ordering systems for business partners. You can also use identity domains to enable IAM for consumer-facing applications and allow consumer users to perform self-registration, social logon, and/or terms-of-use consent. Identity domains represent a comprehensive identity-as-a-service (IDaaS) solution accommodating numerous IAM use cases and scenarios.
No. OCI IAM considers these as separate user populations for licensing purposes. However, you can use the same OCI IAM service to manage two or more domains that can accommodate employees and nonemployees (partners, affiliates, consumers, etc.). Multiple domains can be used to access the same applications, but the rules and security policies for nonemployees typically differ from those applying to employees. Each domain has its own set of settings, configurations, and security policies that are unique for that user population. This is by design to accommodate for the widely varying requirements that are typical for different user populations.
Each OCI tenancy includes an Administrators group that provides full access to all OCI resources. It’s important to understand that all members of the OCI Administrators group have full access to manage OCI IAM identity domains. Oracle recommends careful use of this group. Administrative privileges can be granted within each domain via Administrator Roles which allow for separation of duties between groups of people. See Understanding Administrator Roles for more details.
Within each OCI region, there are either multiple Availability Domains (ADs) or Fault Domains (FD) (in single-AD regions). ADs and FDs serve similar functions, but FDs are physically closer together than ADs. Identity domains are deployed with redundant installations in each region (two across the AD/FDs) that provide high availability. OCI IAM identity domains also offer cross-region disaster recovery (DR) via an active-passive approach leveraging high-performance data replication. This provides reliable data recovery for identity domains in the unlikely event that an entire OCI region becomes unavailable. This DR is delivered through a single URL making it transparent to applications.
The key concepts of IAM are:
With OCI IAM, you can leverage a single model for authentication and authorization across all Oracle Cloud and Cloud Application services. OCI IAM makes it easy to manage access for organizations of all sizes, from one person working on a single project to large companies with many groups working on many projects at the same time, all within a single account. Resource management and authorization can happen at the account level or at the compartment level, while still allowing central auditing and billing. OCI IAM was built from the ground up to allow you to enforce the security principle of least privilege; by default, new users are not allowed to perform any actions on any resources. Administrators can then grant each user only the access appropriate for that specific user.
And in addition to managing OCI resources, OCI IAM puts an enterprise-class IDaaS solution at your fingertips. With the click of a button, you can deploy a robust IAM solution that can be used to address many IAM requirements across employee/workforce, partner, or consumer use cases.
OCI IAM provides broad support for multi-factor authentication (MFA) that includes a mobile MFA application offering options for push or one-time-passcode, support for FIDO2 authenticators, and support for SMS, Email, Phone Call, and more. OCI IAM also includes context-aware adaptive security that reduces risk without introducing hurdles to the end-user experience. Adaptive Security evaluates the user's device, network, location, and past behavior to create a risk score for the user's session. Administrators can configure MFA policies that may differ for specific applications or for specific groups of users.
Yes. To support enterprise requirements for auditing and compliance, all changes are recorded and these records can be made available to you at no additional cost.
OCI IAM is enabled by default at no additional charge. The very first user in your account is the default Administrator. All subsequent users are created through the IAM service, where you explicitly grant them privileges to interact with specified cloud resources.
You can access Oracle IAM using the Console, Rest API, or SDKs.
To reset your password for Oracle Cloud Infrastructure, you must first ensure that you have associated an email address with your account. Visit the user profile page for your Oracle Cloud Infrastructure account and add an email address that only you have access to. You will receive an email to confirm that you intended to register that address with your account. Then, you can reset your password with your email account unless it has been disabled by your tenant administrator.
A compartment is a secure logical container within your account used to host your infrastructure resources (such as compute, storage, and network), along with a set of access management policies for these resources. Compartments allow you to logically organize your cloud resources to support a wide variety of use cases.
The following are a few common ways to use compartments to:
Yes. Compartments are logical groupings of resources distinct from the physical constructs of Availability Domains. An individual compartment can contain resources across Availability Domains.
All policies are attached to either the root compartment or a child compartment. Each policy consists of one or more policy statements that follow this basic syntax:
Allow group to in compartment
Policy statements allow you to use compartments to simplify permission management; for instance, you can write a policy that allows the group HRAdministrators to manage all resources in the compartment HRCompartment.
Yes, you can delete compartments.
Yes, you can move entire compartment trees and their included resources to other parent compartments.
Yes, you can move resources from one compartment into another.
Yes, you can create a hierarchy of compartments by nesting them. With hierarchical or nested compartments, the system administrator is able to organize resources and enable lower-level administrators to do the same, while still retaining full visibility and control via policy.
The maximum depth of a nested compartment is six.
Yes, policies on higher-level compartments do get inherited by sub compartments.
Yes, you can track costs and usage by compartments in My Services.
For each account, Oracle Cloud Infrastructure automatically creates a top-level compartment known as the root compartment. Much like the root folder in a file system, the root compartment behaves exactly like its child compartments, except for a few special characteristics:
Note: Currently, you can create additional compartments only within the root compartment, and not within other compartments.
Generally, resources should be created in a compartment that is not the root compartment. It is best to design your compartment hierarchy before you begin creating compartments and resources.
A user is someone who can successfully authenticate against OCI IAM, and who has sufficient privileges to either consume or manage cloud resources within your account. Administrators can create one or more users within their account and assign them to groups in order to give them permissions to resources in specific compartments.
Your account is provisioned with a single user: the default administrator, and a single group: Administrators, of which the default administrator user is a member. This group (Administrators) has full access in your account. This special user (default administrator) must create any additional users, or grant permission to other users to create new users.
By default, a new user does not have permission to use any resource or service within your account – all permissions must be explicitly granted. This approach allows you to adhere to the security principle of least privilege whereby you grant each user only the access required for that specific user. You must either explicitly add the user to an existing group or create a new group for them, and then assign appropriate permissions to that group through a policy.
Administrators can deactivate or lock a user to disable their access temporarily. They can also reset user passwords or remove keys.
Yes, password policies allow you to set an expiration time for passwords. You can also automate password resets, key changes, or edits to users and group memberships through REST API and SDKs.
A policy is a document consisting of descriptive policy statements that grant specific permissions to groups of users. They are written with an easy-to-understand SQL-like syntax. Example policies might enforce:
A policy allows a group to work in certain ways with specific types of resources in a particular compartment. Optionally, policies can contain a conditional clause ("where ...") that further restricts the policy statement. Policies adhere to the following syntax:
Allow group to in compartment [where]
For example, here is a policy statement that grants permissions to use compute instances:
Allow group Developers to use instances in compartment ProjectA
For more details, see the OCI IAM section of the Oracle Cloud Infrastructure documentation.
Yes. A policy granting permissions in the root compartment automatically grants the same permissions for all child compartments. For example, the following policy gives permission to all users in the group "InstanceAdmins" to manage instances in the root compartment as well as all child compartments:
Allow Group InstanceAdmins to manage instances in tenancy
Yes. Each policy is "attached" to a compartment. Where you attach it controls who can then modify it or delete it. If you attach a policy to the root compartment, then anyone with access to manage policies in the root compartment can change or delete it. If you instead attach the policy to the compartment, then anyone with access to manage policies in that compartment can change or delete it. In practical terms, this means it is easy to give compartment administrators (i.e., a group with access to "manage all-resources" in the compartment) access to manage their own compartment's policies, without giving them broader access to manage policies that reside in the account.
For more information about policy and policy statements, see "Getting Started with Policies" and "Common Policies" in the Oracle Cloud Infrastructure documentation.
These FAQs guide users through Oracle Cloud Infrastructure (OCI) Identity and Access Management deny policies, which allow users who can manage policies to explicitly block actions, enhancing security and simplifying access control in OCI tenancies. For more details, see the OCI Identity and Access Management documentation.
IAM Deny is an opt-in feature that must be explicitly enabled by a tenancy administrator via going to the OCI Console, then Policies, then Actions, then Policy settings. It can’t be enabled by regular users or policy authors. Once enabled, the feature becomes a permanent part of the tenancy’s IAM framework and can’t be disabled via the UI. However, a tenancy administrator with the ability to write deny policies can effectively control the use of deny policies by writing a root-level deny policy that blocks all users from creating or modifying deny policies, except for the default administrator group. An example is Deny any-user to manage policies in tenancy where target.policy.type='DENY'
When IAM Deny is enabled
With OCI Identity and Access Management deny statements, you can write explicit deny policies to block specific actions in OCI tenancies, complementing OCI Identity and Access Management allow statements for precise access control. For example, you can use Deny any-user to inspect all-resources in tenancy where request.service='streaming' to set a guardrail preventing all access to the OCI Streaming service across your tenancy, while allowing other permissions via allow statements.
IAM deny policies share the same limits as allow policies. A tenancy can have up to 100 IAM policy objects, each containing up to 50 policy statements (deny or allow), but the total number of policy statements across all objects in the tenancy is limited to 100.
IAM deny policies use the existing meta-verbs: manage, use, read, and inspect. No new meta-verbs are introduced. Unlike allow statements, which grant permissions additively (for example, manage includes all lower permissions), deny statements are subtractive, blocking only the specified permission and any higher level in the hierarchy.
For example, the policy Deny group DevOps to manage instance in compartment Prod blocks only the manage permission, allowing DevOps to perform use, read, and inspect actions. However, denying inspect blocks all permissions, as it’s the base-level permission.
Deny policies are created in the same OCI Console interface as allow policies. Navigate to Identity & Security, then Policies, select a compartment, and use the policy editor to add the deny keyword alongside allow. The process requires no separate interface.
No, deny policies use the same policy object as allow policies. Both are managed within the same policy object, simplifying administration.
Yes, you can combine deny and allow statements in one policy object for flexible access control.
For example, a single policy could include allow and deny statements as shown below:
Deny group Interns to use instance in compartment Finance
Allow group Admins to manage all-resources in compartment Finance
These policies allow Admins to manage all resources in the Finance compartment while preventing Interns from doing any write operation on instances, streamlining access control.
To prevent policy users who can manage policies from writing deny policies, create a deny policy at root level to block deny policy creation.
Example: Deny group PolicyAdmins to manage policies in tenancy where target.policy.type='DENY'
This policy ensures PolicyAdmins can’t create or modify deny policies while still allowing them to manage allow policies. Default administrator groups remain exempt and can write deny policies if needed.
To block an entire OCI service, create a deny policy at the root compartment targeting the service’s resources or actions using a condition such as request.service.name.
For example, to block the OCI Streaming service tenancywide
Deny any-user to inspect all-resources in tenancy where request.service.name='streaming'
This policy prevents all access to the OCI Streaming service, which is useful for compliance in industries such as healthcare. Place the policy at the root compartment to ensure it applies across all compartments, reducing policy sprawl.
To prevent a group from managing resources in a specific region, use a deny policy with a request.region condition.
For example, if you want to prevent a group from performing any actions beyond read-only access in a specific region, you can write a deny policy like this:
Deny group RegionalAdmins to use all-resources in tenancy where request.region='sa-saopaulo-1'
This policy blocks the RegionalAdmins group from using resources in the São Paulo region but allows use, read, and inspect permissions. It’s ideal for financial institutions addressing compliance with regional data residency laws.
To deny a group from accessing compute instances in a specific compartment, use
Deny group DevTeam to inspect instance in compartment ProjectX
This policy blocks all permissions (inspect, read, use, manage) on compute instances in the ProjectX compartment. For example, a technology company can use this to prevent the DevTeam from accessing production instances, isolating development and production environments for enhanced security.
To deny a group from managing object storage resources in a specific compartment, use
Deny group StorageUsers to inspect object-family in compartment DataLake
This policy blocks all permissions (inspect, read, use, manage) on object storage resources in the DataLake compartment. For example, a healthcare organization can apply this to prevent StorageUsers from accessing sensitive patient data, supporting compliance with privacy regulations.
To delegate tasks securely to users who can manage policy in a child compartment, you can
For example, to allow users who can manage policy in a child compartment to manage compute resources in a compartment while restricting network changes and deny policy creation, use the following policies:
Deny group ProjectAdmins to manage network-family in compartment ProjectX
ProjectAdmins to manage policies in compartment ProjectXwhere target.policy.type='DENY'
Allow group ProjectAdmins to manage instance-family in compartment ProjectX
These policies enable ProjectAdmins to manage instances in ProjectX, block them from modifying networks, and prevent them from writing deny policies, supporting secure delegation. A financial organization might use this approach to allow sub-admins to manage compute resources while maintaining strict control over network configurations and policy management.
Yes, OCI Identiy and Access Management uses a deny first evaluation model, where deny policies are evaluated before allow policies in the compartment hierarchy. If a request matches a deny policy, access is blocked, regardless of any allow policies. Default administrator groups are exempt from deny policies to prevent lockouts.
For example, the following policies may exist in the Prod compartment:
Deny group Devs to manage instance-family in compartment Prod
Allow group Devs to manage all-resources in compartment Prod
The deny policy blocks Devs from managing instances, while default admins can still manage instances.
The default administrator group is exempt from deny policies, so its members can log in, view, and edit policies to resolve lockouts. This safeguard helps prevent tenancywide outages.
Example: If Deny any-user to inspect all-resources in tenancy is applied, default admins group users can still log in and access the policy editor to remove or adjust it.
A tenancywide deny policy, such as Deny any-user to inspect all-resources in tenancy, can block all user access, causing an outage. To recover:
1. Log in as a member of the default administrator group (exempt from deny policies).
2. In the OCI Console, go to Identity & Security, then Policies.
3. Locate the problematic policy in the root compartment.
4. Edit or delete the policy (for example, change Deny any-user to inspect all-resources in tenancy to Deny group Interns to inspect all-resources in tenancy).
5. Alternatively, use the following OCI command-line interface: oci iam policy update --policy-id
'["Deny group Interns to inspect all-resources in tenancy"]
For example, if a user who can manage policy in a child compartment accidentally applies Deny any-user to inspect all-resources in tenancy, a default admin group user can log in and modify it to target only the Guests group, preventing future lockouts. To avoid such issues, test policies thoroughly and limit deny policy authorship.
Denying manage blocks only the manage permission, leaving use, read, and inspect intact.
Example: Deny group DevOps to manage instance in compartment Production prevents DevOps from managing instances but allows them to use, read, or inspect them.
Denying use blocks both use and manage permissions, but read and inspect are still allowed.
Example: Deny group Testers to use bucket in compartment QA stops Testers from using or managing buckets but permits reading or inspecting them.
Denying read blocks read, use, and manage permissions, but inspect is still allowed.
Example: Deny group Auditors to read logs in compartment Logging prevents Auditors from reading, using, or managing logs but allows inspection.
Denying inspect blocks all permissions (inspect, read, use, manage) since inspect is the base-level permission.
Example: Deny group Viewers to inspect instance in compartment Public completely blocks Viewers from accessing instances.
Review OCI audit logs to track actions blocked by deny policies. If a policy such as Deny any-user to inspect cloud-shell in tenancy causes issues, refine it to Deny group Interns to inspect cloud-shell in tenancy. Set up alerts for policy changes to stay proactive.
Example: Monitor logs to adjust Deny group Drivers to manage instance-family in compartment Fleet if it blocks legitimate tasks.
OCI’s deny first model prioritizes deny policies over allow policies, which can lead to disruptions if policies are overly broad. Common mistakes include applying tenancywide or compartmentwide lockouts or using overly broad tag-based conditions.
For example, a policy such as Deny any-user to inspect all-resources in tenancy can block all access, causing a tenancywide lockout. Instead, use targeted policies, such as the following:
Deny group Interns to inspect all-resources in compartment Public
This restricts access for the Interns group only, avoiding unintended disruptions. A technology company might use this approach to limit guest access while preserving functionality for other users. To prevent issues, test policies in a sandbox environment, keep them simple, and restrict deny policy authorship.
Yes, deny statements support cross-tenancy scenarios. A single deny endorse or deny admit statement can block cross-tenancy requests, unlike endorse/admit pairs requiring both to be satisfied.
The following source tenancy is an example:
Endorse group Devs to use object-family in tenancy PartnerTenancy Deny endorse group Devs to manage object-family in tenancy PartnerTenancy
This allows Devs to use object storage in the PartnerTenancy but blocks management actions. A partner organization can use this to enable data sharing while maintaining control over resources.
OCI Zero Trust Packet Routing operates at layer 4 (network level) of the Open Systems Interconnection model while IAM deny policies enforce access at layer 7 (application level). If OCI Zero Trust Packet Routing allows communication, IAM deny policies can still block actions.
Example:
dynamic-group FrontEnd in VCN web:vcn to connect to backend:server-instance in VCN vcn:server permits network traffic.FrontEnd to manage instance-family in compartment ProjectA blocks instance management despite OCI Zero Trust Packet Routing allowance.OCI Zero Trust Packet Routing and IAM policies are evaluated sequentially, with IAM as the final gatekeeper.
Standard system policies always override user-defined deny policies to ensure essential services function (for example, Allow any-user to read domains in tenancy where target.domain.id='request.domain.id').
Example: A deny policy such as Deny group Users to read domains in tenancy won’t block a standard system policy allowing domain access.
OCI Identity and Access Management uses a deny first evaluation model, where deny policies are evaluated before allow policies in the compartment hierarchy. If a request matches a deny policy, access is blocked, regardless of any allow policies. System-defined policies may override user-defined denies (see question 27). Default administrator groups are exempt from deny policies, so they can manage policies during lockouts.
Example: If Deny group Users to manage instance-family in compartment Prod exists alongside Allow group Users to manage all-resources in compartment Prod, the deny policy blocks instance management.
In the current release, IAM Deny policies don’t override Oracle Identity Cloud Service administration roles (for example, identity domain administrator, security administrator, and user manager). This is a limitation. In the next release, IAM Deny will take precedence over Oracle Identity Cloud Service administration roles for consistent access control.
OCI Private Service Access allows access to Oracle services over a private network path instead of through the public internet. OCI Private Service Access is designed for customers who want private connectivity between their workloads and Oracle services—for compliance, performance, or security reasons.
If you’re using OCI Private Service Access to securely access a service (such as OCI Object Storage or OCI Streaming), you may want to enforce that all access must go through OCI Private Service Access. With IAM Deny, you can explicitly block all non-OCI Private Service Access traffic to a service, even if allow policies exist.
For example, to allow access to OCI Object Storage only through OCI Private Service Access, use
Deny any-user to access object-family in tenancy where any {not request.gateway.id, request.gateway.type !='privateserviceaccess'}
This policy prevents users from accessing OCI Object Storage unless their traffic is routed through an OCI Private Service Access endpoint. It’s especially useful if you’ve configured an OCI Private Service Access setup for sensitive data and want to eliminate the risk of access via unintended public routes.
OCI offers IAM deny policies and Oracle Security Zones to secure your tenancy by preventing unsafe actions. While both strengthen your security, they differ in how they work and their flexibility.
environment:production.For further assistance, visit the OCI Identity and Access Management documentation or contact your OCI account team.
A group is a collection of users who need similar access privileges to either use or manage a specific resource within your account. Users can be in multiple groups. Permissions are additive. For example, if membership in one group allows a user to use compute instances, and membership in a second group allows that user to manage block volumes, then the user is permitted to manage both instances and block volumes.
Administrators write policies that specify groups (not individual users) with the required access they need, whether to a specific compartment or the account. Administrators then add users to the appropriate groups.
Yes. Your account is provisioned with a single default administrator who belongs to an Administrators group within your root compartment. This group has full privileges to create and manage all Oracle Cloud Infrastructure resources in your account, including users, groups, policies, and compartments, as well as all other cloud infrastructure resources within any compartments. You can add additional users to this Administrators group.
Password policies allow you to set an expiration time for passwords. A default password policy sets passwords to expire after 120 days. This is configurable and different policies can be applied to subsets of users.
Use dynamic resource groups to assign a set of compute resources to a group. You can then assign that group permissions through a policy. This enables a compute instance to access other OCI resources in a secure manner without embedding credentials into scripts.
Identity federation is a mechanism to delegate user management for your Oracle Cloud Infrastructure tenancy to another entity called an Identity Provider or IdP. This is useful to companies that have an existing Identity system they would like to use, rather than creating and maintaining a new set of users. Federation requires a one-time configuration between Oracle Cloud Infrastructure and the IdP known as a Federation Trust.
Federated users (external identities) are users you manage outside of Oracle Cloud Infrastructure (for example, in your corporate directory), but to whom you grant access to your Oracle Cloud Infrastructure account. They differ from Oracle Cloud Infrastructure users, which are created and maintained in your Oracle Cloud Infrastructure account.
Yes. Federated users can access the Oracle Cloud Infrastructure Console.
Yes. Federated users can access the Oracle Cloud Infrastructure SDK and CLI.
Federated users cannot change nor reset their passwords in the Oracle Cloud Infrastructure Console.
You use the same Oracle Cloud Infrastructure policies to manage federated users that you use to manage native users. You map roles and groups in your Identity Provider to groups in Oracle Cloud Infrastructure. When a federated user logs in, the Oracle Cloud Infrastructure Console then applies policies based on their Oracle Cloud Infrastructure group membership, just as with native users. See the documentation for examples.
A single role or group in your Identity Provider can be mapped to multiple Oracle Cloud Infrastructure groups. Also, multiple roles or groups in your Identity Provider can be mapped to a single Oracle Cloud Infrastructure group.
There is no limit to the number of federated users who can be given access to the console.
OCI IAM supports any SAML 2.0-, Open ID Connect-, or OAuth- compliant identity provider including popular solutions such as Oracle Access Manager, Microsoft Active Directory Federation Services (AD FS), and Okta.
Historically, accounts were secured with a simple username and password. But passwords can be difficult to remember and relatively easy to capture using common cyberattack techniques, such as network sniffing, phishing, and brute-force attacks. If somebody steals your credentials, they can impersonate you and access all of your accounts and resources.
Multifactor authentication (MFA) is a popular security feature that helps reduce the risk of account takeover by strengthening the assurance that an application user is who they claim to be. MFA requires users to provide more than one authentication factor. There are three categories of authentication factors: something you know (such as a password or PIN), something you have (such as a security token or mobile phone), and something you are (such as biometric data like a fingerprint or face scan). With MFA enabled, even if an attacker manages to obtain your password, they will not be able to authenticate as you without also providing the additional evidence required by MFA. This can help prevent unauthorized access and protect against sensitive information being compromised or inappropriate actions being taken. Enabling MFA also helps address regulatory compliance requirements and adherence to industry standards, such as those provided by the National Institute of Standards and Technology (NIST).
Oracle recommends enabling MFA for all users. At a minimum, you should enable MFA for users with administrative privileges, such as the ability to create and manage OCI resources. You should also require MFA for access to any application that hosts sensitive information or allows for high-risk actions.
When MFA is enabled for the first time by an administrator, users will be prompted to enroll in MFA during their next sign-in. After initial enrollment, users will be challenged for MFA during the sign-in process on each subsequent visit. If the administrator enables Trusted Devices, users will have an option to select "trust this device," which removes the requirement for MFA if the user returns on the same device.
For more information, users can reference the following guidance:
No. MFA is not strictly mandatory in all circumstances. If you are granting access to a public website, for example, you typically would not require any authentication. If you want users to sign in when making a purchase so you know which account to charge and where to deliver products, perhaps a username and password are sufficient. But, if that same user wants to change the payment method or delivery address, or if the application allows actions that could impact your organization, then MFA is recommended.
Oracle strongly recommends that you enable MFA for all cloud and application administrators. Ultimately, you should evaluate whether to enforce MFA based on your organization's internal security policies and risk assessment. But it's a good practice to start with a policy that MFA is always mandatory and require executive approvals for any applications for which you want to make MFA optional.
To fully understand available factors and cost, it's important to first understand which type of OCI tenancy you have. To determine if your tenancy has OCI Identity and Access Management (IAM) with identity domains or if it has OCI IAM without identity domains, review this documentation.
The specific instructions for implementing MFA vary depending on which type of OCI tenancy you have. To determine if your tenancy has OCI IAM with identity domains or if it has OCI IAM without identity domains, review this documentation.
If you don't implement MFA, you will have an increased risk that a targeted account takeover attack could succeed. But with MFA, your tenancy and/or other authentication processes will continue to operate normally.