Entra ID Microsoft Authenticator Registration campain

Entra ID Microsoft Authenticator Registration campain

Hi All,

I recently had a customer that still allows SMS for MFA Authentication on theyr Entra ID Tenant.

We all know, that SMS and Voice, should not be used anymore for MFA Authentication.

In addition, i would point out, that can lead to a very bad situation, when using Teams Phone as your Voice destination. Think of how you want to authenticate to Teams, when receiving the MFA Voice call there 😂

Preparation of Showcase

I had to Showcase the Microsoft Authenticator Registration Campain.

For that purpose, i had to enable SMS Authentication in my Tenant again

But made sure, it’s only available for a Group (that contains our Testuser)

Now im am able to register my MobilePhone for SMS under SecurityInfo

Registration campain

Now let’s activate the Registration campain for Microsoft Authenticator. It’s assigned to all Users with no Exclusion Group. For the purpose of teh Test i limited the Snooze to 1 Day.

Enduser experience

The following Screenshots simulate the Enduser experience.

First Login after enabling the Authenticator registration campain with SMS as MFA Factor

Enter the Code received by SMS

Now i am presented with the Registration - skipped here

The next time, i clicked on “Next”

Here starts the Wizard for the Microsoft Authenticator App registration

It’s done - Microsoft Authenticator is registered. Sadly the Default sign-in Method is still SMS

The user can check the Registered Methods in SecurityInfo and also change the default sign-in Method.

At the next Login with MFA the Authenticator App was used

This is because in the Settings the System-preffered multifactor Authentication tries to use the most secure Authentication Method, even the default sign-in Method is set to SMS.

Regards
Andres Bohren

EntraID Logo

Security Logo