Hi @Joseph Freni,
Thank you for reaching out to Microsoft Q&A forum and sharing your experience.
Microsoft has been phasing out support for VOIP-based phone numbers and strongly discouraging the use of SMS and voice calls for multi-factor authentication (MFA) due to security vulnerabilities:
- SMS and voice calls are transmitted in cleartext, making them susceptible to interception.
- SIM swapping attacks can redirect MFA codes to attackers.
- Phishing tools can easily exploit SMS-based MFA.
- Telephony fraud and regulatory issues also pose risks.
Therefore, Microsoft recommends switching to:
- Microsoft Authenticator app
- FIDO2 security keys
- Temporary Access Pass
- Passkeys and passwordless sign-in.
You can see more detail at: Planning for mandatory multifactor authentication for Azure and other admin portals.
Here're suggestions you can try:
- Switch to App-Based MFA
- Use Microsoft Authenticator or other supported apps
- Ensure users register with mobile numbers or app-based methods
- Check Authentication Method Policies
- Go to Microsoft Entra Admin Center
- Navigate to Authentication Methods > Policies
- Ensure VOIP numbers are not blocked by policy settings
- Navigate to Authentication Methods > Policies
- Go to Microsoft Entra Admin Center
- Use Microsoft Authenticator or other supported apps
- Use Teams Calling with MFA
- If your Yealink Teams phones are part of a secure Teams environment, consider integrating Teams-based sign-in with passwordless options instead of relying on VOIP MFA.
I hope this information is helpful. Please try the steps above and let me know the result. If you need further assistance, feel free to reach out, I'm always here and ready to support you!
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.