Recuperar contraseña cuenta corporativa: Authenticator

Jose Guerrero 1 Reputation point
2022-07-29T22:32:24.73+00:00

Hola equipo de soporte. Solicito su ayuda validando la ipción que tengo de recuperar la contraseña de mi cuenta corporativa con dominio @co.atento.com con el objetivo de poder usar la app Autenthicator

Saludos

Jose Guerrero

Microsoft Security | Microsoft Authenticator
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Anonymous
    2022-07-29T22:38:14.76+00:00

    Q&A forums are English only.

    Not sure what is meant, You can restore from backup (assuming there was one) but make sure no accounts have been added to the newly install app. Then sign on with recovery account to do the restore.

    You can recover your account credentials from your cloud account, but you must first make sure that the account you're recovering doesn't exist in the Microsoft Authenticator app. For example, if you're recovering your personal Microsoft account, you must make sure you don't have a personal Microsoft account already set up in the authenticator app. This check is important so we can be sure we're not overwriting or erasing an existing account by mistake.
    https://support.microsoft.com/en-us/account-billing/back-up-and-recover-account-credentials-in-the-authenticator-app-bb939936-7a8d-4e88-bc43-49bc1a700a40

    --please don't forget to upvote and Accept as answer if the reply is helpful--

    0 comments No comments

  2. Carlos Solís Salazar 18,276 Reputation points MVP Volunteer Moderator
    2022-07-29T22:58:46.007+00:00

    Hi @Jose Guerrero

    Thank you for asking this question on the **Microsoft Q&A Platform. **

    You must ask a Global administrator in your organization to follow the following:

    I have provided the steps below to reset and unblock MFA in Azure Active Directory via Azure Portal and PowerShell.

    Using Azure Portal:

    • Sign in to the Azure portal with the tenant Global Administrator account.
    • Navigate to Azure Active Directory > Users > All users > Choose the user you wish to perform an action on >** select Authentication methods** > Require Re-register MFA.
    • Once this is done, the next time the user signs in, he/she will be requested to set up a new MFA authentication method.

    Note: The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.

    Using PowerShell:

    • Install the MSOnline PowerShell module.
    • Run Connect-MSOLService and sign in with the Global Administrator account.
    • Run Set-MsolUser -UserPrincipalName ******@contoso.com -StrongAuthenticationMethods @() cmdlet to reset the MFA registration information.

    Read MoreManage user authentication methods for Azure AD Multi-Factor Authentication

    Hope this helps,
    Carlos Solís Salazar

    ----------

    Accept Answer and Upvote, if any of the above helped, this thread can help others in the community looking for remediation for similar issues.

    NOTE: To answer you as quickly as possible, please mention me in your reply.



Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.