Entra ID Microsoft Authenticator Registration campain

Hi All,
I recently had a customer that still allows SMS for MFA Authentication on theyr Entra ID Tenant.
We all know, that SMS and Voice, should not be used anymore for MFA Authentication.
In addition, i would point out, that can lead to a very bad situation, when using Teams Phone as your Voice destination. Think of how you want to authenticate to Teams, when receiving the MFA Voice call there 😂


Preparation of Showcase
I had to Showcase the Microsoft Authenticator Registration Campain.
For that purpose, i had to enable SMS Authentication in my Tenant again


But made sure, it’s only available for a Group (that contains our Testuser)


Now im am able to register my MobilePhone for SMS under SecurityInfo


Registration campain
Now let’s activate the Registration campain for Microsoft Authenticator. It’s assigned to all Users with no Exclusion Group. For the purpose of teh Test i limited the Snooze to 1 Day.


Enduser experience
The following Screenshots simulate the Enduser experience.
First Login after enabling the Authenticator registration campain with SMS as MFA Factor


Enter the Code received by SMS


Now i am presented with the Registration - skipped here


The next time, i clicked on “Next”


Here starts the Wizard for the Microsoft Authenticator App registration








It’s done - Microsoft Authenticator is registered. Sadly the Default sign-in Method is still SMS


The user can check the Registered Methods in SecurityInfo and also change the default sign-in Method.


At the next Login with MFA the Authenticator App was used


This is because in the Settings the System-preffered multifactor Authentication tries to use the most secure Authentication Method, even the default sign-in Method is set to SMS.


Regards
Andres Bohren

EntraID Logo


Security Logo
