Microsoft Authenticator application does not receive sign-in approval request for Microsoft Azure Directories

Emmanuel Pineda 0 Reputation points
2025-01-29T21:17:55.3166667+00:00

I am trying to log in with an account similar to this: ******@outlook.com at https://portal.azure.com/. When I log in to an online mail or office service, the authentication application receives the notification and I can approve it and log in without any problem, but when I try to log in to a specific Windows Azure directory I do not receive the notification and the code that is generated in the authentication application is 8 digits and the form allows only 6 digits.

User's image

User's image

That account is the only admin account I have, how can I add the account as an external user if I no longer have access, is there any way to create support ticket for the Microsoft Azure team to help me fix this?

Thank in advance!

Microsoft Security | Microsoft Entra | Microsoft Entra ID
Microsoft Security | Microsoft Authenticator
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Bandela Siri Chandana 3,055 Reputation points Microsoft External Staff Moderator
    2025-01-30T05:18:33.3366667+00:00

    Hi @Emmanuel Pineda
    Thank you for posting your issue on Microsoft Q&A.

    I understand that you are trying to log in to the Microsoft account using a personal account and encountering error that "account needs to be added as an external user in the tenant first".

    When you use a personal Microsoft account to log in, you are connected to the Microsoft Services tenant by default, which does not have a linked directory for performing any actions and as you are using personal account you will receive 8-digit code in authenticator app. This behavior is expected. As you are global administrator you can Re-register MFA for user.

    If you want to access Entra portal using your personal Microsoft account only, you can invite that user as a guest user as mentioned here: https://learn.microsoft.com/en-us/azure/active-directory/external-identities/add-users-administrator#add-guest-users-to-the-directory and assign the Global Administrator role.

    You will receive an invite email once you are added to an azure tenant and accept it, you can use https://portal.azure.com/#create/Microsoft.AzureActiveDirectory URL to create your own tenant as well.

    Or you can create a new tenant, open in-private/incognito browser window (just to avoid SSO), access https://azure.microsoft.com/en-us/free/ to create a free Azure account.

    When you create a new tenant, you by default become the Global Administrator of the new tenant and have full access to all the options in that tenant.

    Hope this helps. Do let us know if you have any further queries.

    If this answers your query, do click `Accept Answer` and `Yes`.

    Thanks,

    B. Siri Chandana.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.