Share via

Locked out of Azure Portal -- Authenticator generates 8-digit code but Azure requires 6-digit code (personal MSA account, post-MFA enforcement)

Nolan Garrett 25 Reputation points
2026-03-06T18:31:20.1966667+00:00

I have a personal Microsoft account (MSA) with a Microsoft Family subscription. The primary email is a custom domain alias, but the underlying account is an @outlook.com address. I'm trying to sign into Azure Portal to register a new app in Entra ID.
Tagging @Raja Pothuraju per their request as well.

The problem:

When I sign into portal.azure.com, it redirects me to sign in with my @outlook.com address and then prompts for a 6-digit MFA code. My Microsoft Authenticator app only generates 8-digit codes for this account (the personal MSA entry). The 6-digit field won't accept the 8-digit code. The alternate sign-in option offers a push notification, but no notification ever arrives in my Authenticator app.

I can sign into every other Microsoft service (Outlook, OneDrive, account.microsoft.com) without issue using the 8-digit codes and push notifications.

What I understand is happening:

Azure Portal authenticates through Microsoft Entra ID, which uses standard 6-digit TOTP codes. My Authenticator is registered on the MSA side only, which uses a proprietary 8-digit code format. Push notifications sent by Entra ID never arrive because there is no Entra ID device registration for my account -- only an MSA registration. These are two separate MFA systems sharing the same email address.

What I've tried:

  1. Added a standard 6-digit TOTP entry via account.microsoft.com/security using "Set up a different Authenticator app" and scanning the QR code as "Other (Google, Facebook, etc.)" in the Authenticator app. Azure Portal rejected this code -- it appears the TOTP secret is registered on the MSA side, not the Entra ID side.
  2. Attempted to register MFA through aka.ms/mfasetup. This rejected my personal account, saying it cannot be used.
  3. Tried Azure CLI with az login --use-device-code. Same MFA wall.
  4. Tried signing in through entra.microsoft.com. Same 6-digit prompt, same result.
  5. No alternate verification methods are offered beyond the 6-digit code and the non-functional push notification.

Environment:

  • Personal Microsoft Account (not work/school)
  • Microsoft Family subscription
  • Custom domain alias on the account
  • This issue started after the October 2024 mandatory MFA enforcement for Azure Portal

What I need:

A way to register MFA on the Entra ID side of my account, or a temporary MFA exemption so I can complete registration. I appear to be in a catch-22 where I can't set up Entra ID MFA because I can't sign into Azure, and I can't sign into Azure because I don't have Entra ID MFA configured.

Has anyone resolved this without calling Microsoft support? If a Microsoft employee can assist, I'd appreciate being contacted directly.I have a personal Microsoft account (MSA) with a Microsoft Family subscription. The primary email is a custom domain alias, but the underlying account is an @outlook.com address. I'm trying to sign into Azure Portal to register a new app in Entra ID.

The problem:

When I sign into portal.azure.com, it redirects me to sign in with my @outlook.com address and then prompts for a 6-digit MFA code. My Microsoft Authenticator app only generates 8-digit codes for this account (the personal MSA entry). The 6-digit field won't accept the 8-digit code. The alternate sign-in option offers a push notification, but no notification ever arrives in my Authenticator app.

I can sign into every other Microsoft service (Outlook, OneDrive, account.microsoft.com) without issue using the 8-digit codes and push notifications.

What I understand is happening:

Azure Portal authenticates through Microsoft Entra ID, which uses standard 6-digit TOTP codes. My Authenticator is registered on the MSA side only, which uses a proprietary 8-digit code format. Push notifications sent by Entra ID never arrive because there is no Entra ID device registration for my account -- only an MSA registration. These are two separate MFA systems sharing the same email address.

What I've tried:

  1. Added a standard 6-digit TOTP entry via account.microsoft.com/security using "Set up a different Authenticator app" and scanning the QR code as "Other (Google, Facebook, etc.)" in the Authenticator app. Azure Portal rejected this code -- it appears the TOTP secret is registered on the MSA side, not the Entra ID side.
  2. Attempted to register MFA through aka.ms/mfasetup. This rejected my personal account, saying it cannot be used.
  3. Tried signing in through entra.microsoft.com. Same 6-digit prompt, same result.
  4. No alternate verification methods are offered beyond the 6-digit code and the non-functional push notification.

Environment:

  • Personal Microsoft Account (not work/school)
  • Microsoft Family subscription
  • Custom domain alias on the account

What I need:

A way to register MFA on the Entra ID side of my account, or a temporary MFA exemption so I can complete registration. I appear to be in a catch-22 where I can't set up Entra ID MFA because I can't sign into Azure, and I can't sign into Azure because I don't have Entra ID MFA configured.

Microsoft Security | Microsoft Entra | Microsoft Entra ID

Answer accepted by question author
  1. Rukmini 35,485 Reputation points Microsoft External Staff Moderator
    2026-03-06T18:38:04.2766667+00:00

    Hello Nolan Garrett

    The issue pertains to a tenant lockout, where no other global admin in the tenant has the necessary permissions to login and make changes in your tenant.

    To resolve this, we have engaged our Data Protection team through a support ticket. They will reach out to you via email or phone to help restore access to the tenant and assist in resolving the issue.

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.