Edit

Frequently asked questions about account recovery in Microsoft Entra ID

The following are frequently asked questions about account recovery in Microsoft Entra ID. For questions not answered here, ask the community on the Microsoft Q&A question page for Microsoft Entra ID.

This FAQ covers:

How account recovery works

What license is required to use account recovery?

Users need a Microsoft Entra ID P1 license to use account recovery. A Face Check license is also required, either through Entra Suite or standalone. The identity verification provider cost depends on the offer you subscribe to in the Microsoft Security Store.

Where does user data go during the identity verification process?

Identity verification providers have their own privacy and data retention policies as part of the verification offer from the Microsoft Security Store. For details, see your provider's documentation.

How is the Verified ID matched against Microsoft Entra ID account details?

Account recovery first verifies proof of presence by comparing the photo on the user's government-issued ID to a real-time Face Check. Next, the system matches the first name and last name claims from the verified government ID against the user's First name and Last name profile properties in Microsoft Entra ID. Only these two properties are used for matching — Display name and User principal name are not used in the account recovery matching process.

Admins can configure the match confidence level for each identity verification profile:

  • Exact — The first name and last name from the verified credential must match the user's First name and Last name properties in Microsoft Entra ID exactly.

  • Relaxed — Uses cross-field word matching to accommodate variations in how names appear on government-issued documents versus Microsoft Entra ID user profiles.

How relaxed matching works

Government-issued documents — particularly passports — may contain a user's full legal name in a single field without distinguishing between first name and last name. Some identity verification providers place the full name entirely in the first name or last name claim of the verified credential. Additionally, a user's Microsoft Entra ID profile may contain only a subset of the names in their full legal name. For example, a user whose passport reads "Maria Elena Garcia Lopez" might have only "Maria" as the First name and "Garcia" as the Last name in their Microsoft Entra ID profile.

To handle these variations, relaxed matching uses the following logic:

  • The First name property in Microsoft Entra ID must match any word in either the first name or last name claim from the verified credential.

  • AND the Last name property in Microsoft Entra ID must match any word in either the first name or last name claim from the verified credential.

  • Both conditions must be true for the match to succeed.

In the example above, "Maria" matches a word in the verified credential's first name claim ("Maria Elena"), and "Garcia" matches a word in the last name claim ("Garcia Lopez") — so the match succeeds even though the Microsoft Entra ID profile contains only a subset of the full legal name.

This approach allows successful matching when names are split differently between the verified credential and Microsoft Entra ID, or when a user profile contains a subset of the full legal name on the government-issued document.

If name matching fails under either confidence level, the user can't complete recovery and needs to follow their normal helpdesk process.

For organizations that need stronger validation beyond name matching, custom authentication extensions can validate additional claims against organizational data.

What happens when people with the same name try to recover an account?

Admins can use custom authentication extensions to process identity claims from the verification provider and compare them against organizational data — such as an HRIS system or employee directory — to disambiguate between users with similar names.

Without a custom authentication extension, recovery attempts from users with the same name as another user may be blocked. To avoid this, enable a custom authentication extension on the identity verification profile and validate additional attributes beyond first and last name.

Do I have to use a Temporary Access Pass (TAP) for account recovery?

Yes. TAP is required for account recovery in this release.

What if the user doesn't have Microsoft Authenticator on their device?

During the recovery flow, the identity verification provider reminds the user to download the app if needed. Microsoft Authenticator just needs to be installed — the user doesn't have to sign in to it to store the Verified ID issued by the provider.

Should I enable account recovery for all users in my organization?

Account recovery supports a phased rollout through identity verification profiles. Each profile targets specific user groups, so you can start with a small test group in Evaluation mode and expand as you gain confidence.

A recommended approach:

  • Create a profile in Evaluation mode targeting a small test group to validate the identity verification flow.

  • Switch the profile to Production mode once testing confirms the flow works for your users.

  • Create additional profiles for broader user populations as needed.

For certain accounts — such as those belonging to a CEO or finance controller — you might restrict recovery to in-person or remote processes that include a human in the loop. These accounts may not be appropriate for self-service recovery due to their sensitive nature.

How do I estimate the cost of account recovery across my organization?

Account recovery requests typically affect about 1%–3% of users each month. The cost savings estimator in the Microsoft Entra admin center (under Entra ID > Account recovery) helps you project potential savings. Enter your current helpdesk costs, target user count, and the cost per verification from your chosen provider. The estimator compares current spending with projected self-service recovery costs so you can model savings for your scenario.

Identity verification profiles

What is an identity verification profile?

An identity verification profile is a configuration object that defines how identity verification is set up for a specific group of users. Profiles control which identity verification provider performs verification, which users are in scope, and how account validation is handled. Today, identity verification profiles are used to configure account recovery — and they're designed to support additional identity verification scenarios in the future.

Each profile specifies:

  • User group scope — Which users the profile applies to, defined by included and excluded groups

  • Identity verification provider — The third-party provider that performs identity proofing

  • Account validation rules — How identity claims are matched, including match confidence and optional custom authentication extension

  • Recovery mode — For account recovery scenarios: Evaluation (testing) or Production (full recovery)

Profiles are created through a wizard in the Microsoft Entra admin center under Entra ID > Account recovery > Profiles.

Can I create multiple identity verification profiles?

Yes. Organizations can create multiple profiles to support different user populations with different configurations. For example:

  • A profile for corporate employees using one identity verification provider with strict matching

  • A profile for frontline workers using a different provider with relaxed matching

  • A profile in Evaluation mode for a pilot group testing a new provider

Each profile operates independently with its own user scope, provider, validation rules, and mode settings.

What are Evaluation and Production modes?

Each identity verification profile operates in one of two modes:

  • Evaluation — Users can test the identity verification flow to confirm it works correctly. Accounts are not recovered in this mode. Use Evaluation to validate the experience before enabling full recovery.

  • Production — Users who complete identity verification can fully recover their accounts, receive a Temporary Access Pass, and re-enroll authentication methods.

You can switch a profile from Evaluation to Production at any time by editing the profile in the Microsoft Entra admin center.

How do I set the priority when a user matches multiple profiles?

The Profiles tab in the Microsoft Entra admin center includes a Set priority option. When a user belongs to groups that match multiple profiles, the system evaluates profiles in priority order and applies the first matching profile.

Account validation and custom authentication extensions

What match confidence levels are available?

Two match confidence levels are available for name matching:

  • Exact — The first name and last name from the identity verification provider must match the user's Microsoft Entra ID profile properties exactly.

  • Relaxed — Allows minor variations in name matching to account for differences like abbreviations or transliterations.

Match confidence is configured per identity verification profile.

How do custom authentication extensions work with account recovery?

Custom authentication extensions add organization-specific account validation logic during the recovery process. When a user completes identity verification, the verified claims from the provider are passed to your organization's endpoint — an Azure Function, Logic App, or REST API — which validates them against authoritative data sources such as:

  • HRIS systems (employee records)

  • Employee directories

  • Badge management systems

The extension returns a match decision to the account recovery flow. This enables validation beyond first and last name matching and helps disambiguate users with similar names.

Important

All data processed by the custom authentication extension stays within your organization's trust boundary. No organizational data is shared with Microsoft — only the match result is returned to account recovery.

What do I need to set up a custom authentication extension?

To use a custom authentication extension with account recovery, you need:

  • An Azure Function, Logic App, or REST API endpoint that can receive verified claims and return a match decision

  • Access to your organization's authoritative data source (HRIS, employee directory, or similar)

  • The endpoint registered as a custom authentication extension in Microsoft Entra ID

Enable the extension in the Account validation step of the identity verification profile wizard.

Identity verification provider (IDV) selection and usage

Can I bring my own IDV and contract to account recovery?

Account recovery only supports reviewed and approved providers through the Microsoft Security Store.

Can I use my own IDV in the recovery flow?

Currently, account recovery only supports identity verification providers from the Microsoft Security Store. This ensures consistency in the recovery flow for users.

Can I skip the IDV document verification if I already have a Verified ID from the provider?

In the most common total-lockout recovery scenario, the user doesn't have an existing Verified ID in their wallet because they're on a new device. Account recovery focuses on this most common case — acquiring a new Verified ID from the provider during recovery.

If a user's government ID is denied by the IDV, what should they do?

As part of the IDV sign-up and provisioning process, the tenant receives contact instructions to work with the provider's support team to debug specific ID issuance failures for individual users.

Does the IDV flow support mobile driver's licenses, European Digital Identity (EUDI), or electronic identification (eID)?

Currently, account recovery supports user verification through standard verified credentials with Microsoft Entra Verified ID.

Troubleshooting

I'm seeing "Application Management" errors for Core Directory in the admin audit logs.

These errors are unrelated to account recovery and can be safely ignored.