How-To Guide

How to Enforce MFA in Google Workspace

Enable and enforce 2-Step Verification across your Google Workspace organization with a phased rollout, security key options, and exception handling.

FK

Farhad Mirza Khawar

Founder of HIPAA Agent and Cyber Defense Agent. Compliance infrastructure for SMBs. Sacramento, CA.

2026-05-01

Before You Start

  • Super Admin access to the Google Workspace Admin Console
  • Users with smartphones capable of running the Google Authenticator app or Google prompts
  • A communication plan for notifying users about the rollout
1

Review current 2-Step Verification enrollment status

Sign in to the Google Workspace Admin Console at admin.google.com. Navigate to Reporting, then User Reports, then Security. This report shows which users have 2-Step Verification enrolled and which methods they are using. Export the report to a spreadsheet and categorize users by enrollment status. Identify users who have never enrolled, users who are enrolled but using less secure methods like SMS, and users already using security keys or Google prompts. Also check the Admin Roles section to identify all super admin and delegated admin accounts, as these should be the first group to have MFA enforced. This baseline data will guide your phased rollout plan.

2

Allow 2-Step Verification enrollment organization-wide

Before you can enforce 2-Step Verification, you must first allow users to enroll. In the Admin Console, navigate to Security, then Authentication, then 2-Step Verification. Make sure the setting Allow users to turn on 2-Step Verification is enabled. If you have organizational units set up, ensure this setting is enabled at the top-level organization. Configure the allowed verification methods. For maximum security, enable Security Key Only as the required method for admin accounts. For general users, allow Any verification method initially, which includes Google prompts, Authenticator app, phone, and security keys. Set the enrollment period to give users time to register before enforcement begins.

3

Create a phased enforcement plan using organizational units

Google Workspace enforces 2-Step Verification at the organizational unit level, so plan your rollout in phases. Create or identify organizational units for your rollout groups. Phase one should include IT staff and administrators. Phase two should include managers and power users who handle sensitive data. Phase three covers all remaining users. For each phase, set the enforcement date at least two weeks after the communication goes out. In the Admin Console under Security, then Authentication, then 2-Step Verification, select the organizational unit for phase one and set Enforcement to On with a start date. Users who have not enrolled by the enforcement date will be locked out of their accounts until they complete enrollment.

4

Set a new user enrollment period and grace period

Configure how new users joining the organization are handled. In the 2-Step Verification settings, set the New user enrollment period to define how many days new hires have to enroll before enforcement kicks in. A common setting is seven days. Also configure the Frequency setting to determine how often users are prompted for their second factor. The default asks for MFA on every new device and periodically on trusted devices. For higher security environments, set it to require MFA on every sign-in. If your organization allows users to mark devices as trusted, set the trusted device policy to expire after a reasonable period such as thirty days rather than allowing indefinite trust, which weakens the security benefit of MFA.

5

Communicate to users and support enrollment

Send a company-wide email explaining that 2-Step Verification is being required and provide clear enrollment instructions. Direct users to myaccount.google.com/signinoptions/two-step-verification to begin setup. Recommend Google prompts as the easiest method since it requires only tapping a notification on their phone. Provide instructions for the Google Authenticator app as a backup method. Create a short FAQ document addressing common questions such as what happens if they lose their phone, how to use backup codes, and whether personal devices are required. Hold optional drop-in sessions where users can get hands-on help. Ensure your IT help desk is staffed to handle increased support requests during each enforcement phase.

6

Enforce and monitor the rollout

On each phase enforcement date, verify that enforcement is active for the correct organizational unit. Monitor the Security reports in the Admin Console for sign-in failures related to 2-Step Verification. Users who are locked out will need temporary exceptions or direct support to complete enrollment. In the Admin Console, you can generate backup codes for a locked-out user by navigating to their account, selecting Security, then 2-Step Verification, and clicking Get Backup Verification Codes. Use these to help the user sign in and complete their enrollment. After all phases are complete, review the organization-wide enrollment report to confirm one hundred percent coverage and document any approved exceptions with their justification and compensating controls.

Common Mistakes to Avoid

Enforcing 2-Step Verification before allowing an enrollment period, causing immediate lockouts

Not creating backup verification codes for users before enforcement, leaving no recovery path

Allowing SMS as the only second factor, which is vulnerable to SIM swapping attacks

Forgetting to enforce MFA on super admin accounts first, leaving the highest-privilege accounts unprotected

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card.

Get My Cyber Defense Score™ →