Share via

Disabling Microsoft Authenticator for test accounts in Microsoft Entra ID

Jakub Śliwiński 0 Reputation points
2026-05-20T22:28:36.7933333+00:00

In Azure, I have provisioned a couple test accounts in Microsoft Entra ID to test some RBAC features. When I'm trying to log on these test accounts for the first time, I'm always getting asked to set up the Microsoft Authenticator app for them. But since these are just temporary test accounts, I don't think this should be necessary. Is there any way to turn this off for them?

Microsoft Security | Microsoft Entra | Microsoft Entra ID

1 answer

Sort by: Most helpful
  1. AI answer

    2026-05-20T22:28:46.38+00:00

    Disable Microsoft Authenticator (MFA) only for the specific test accounts by using Conditional Access, instead of turning it off tenant-wide.

    From the context:

    • User-based authentication scenarios that cannot work with MFA are handled by disabling MFA only for the test accounts and only in test environments.
    • Disabling security defaults or MFA globally is explicitly discouraged because it affects all users.

    Actionable approach:

    1. Keep tenant-wide MFA/security defaults enabled for normal users.
    2. Create or adjust a Conditional Access policy in Microsoft Entra ID that excludes the specific test accounts (or a dedicated test group) from MFA requirements in the test environment.
    3. Use these test accounts for RBAC testing; they will no longer be forced to register Microsoft Authenticator when signing in.

    This way, only the designated test accounts bypass MFA/Authenticator, while security remains enforced for all production users.


    References:

    AI-generated content may be incorrect. Read our transparency notes for more information.

    Was this answer helpful?

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.