A cloud-based identity and access management service for securing user authentication and resource access
Disabling Microsoft Authenticator for test accounts in Microsoft Entra ID
In Azure, I have provisioned a couple test accounts in Microsoft Entra ID to test some RBAC features. When I'm trying to log on these test accounts for the first time, I'm always getting asked to set up the Microsoft Authenticator app for them. But since these are just temporary test accounts, I don't think this should be necessary. Is there any way to turn this off for them?
Microsoft Security | Microsoft Entra | Microsoft Entra ID
1 answer
Sort by: Most helpful
-
AI answer
2026-05-20T22:28:46.38+00:00 Disable Microsoft Authenticator (MFA) only for the specific test accounts by using Conditional Access, instead of turning it off tenant-wide.
From the context:
- User-based authentication scenarios that cannot work with MFA are handled by disabling MFA only for the test accounts and only in test environments.
- Disabling security defaults or MFA globally is explicitly discouraged because it affects all users.
Actionable approach:
- Keep tenant-wide MFA/security defaults enabled for normal users.
- Create or adjust a Conditional Access policy in Microsoft Entra ID that excludes the specific test accounts (or a dedicated test group) from MFA requirements in the test environment.
- Use these test accounts for RBAC testing; they will no longer be forced to register Microsoft Authenticator when signing in.
This way, only the designated test accounts bypass MFA/Authenticator, while security remains enforced for all production users.
References:
AI-generated content may be incorrect. Read our transparency notes for more information.