Manage user authentication methods for Microsoft Entra multifactor authentication
Users in Microsoft Entra ID have two distinct sets of contact information:
- Public profile contact information, which is managed in the user profile and visible to members of your organization. For users synced from on-premises Active Directory, this information is managed in on-premises Windows Server Active Directory Domain Services.
- Authentication methods, which are always kept private and only used for authentication, including multifactor authentication. Administrators can manage these methods in a user's authentication method blade and users can manage their methods in Security Info page of MyAccount.
When managing Microsoft Entra multifactor authentication methods for your users, Authentication administrators can:
- Add authentication methods for a specific user, including phone numbers used for MFA.
- Reset a user's password.
- Require a user to re-register for MFA.
- Revoke existing MFA sessions.
- Delete a user's existing app passwords
Add authentication methods for a user
You can add authentication methods for a user by using the Microsoft Entra admin center or Microsoft Graph.
For security reasons, public user contact information fields should not be used to perform MFA. Instead, users should populate their authentication method numbers to be used for MFA.
To add authentication methods for a user in the Microsoft Entra admin center:
- Sign in to the Microsoft Entra admin center as at least an Authentication Administrator.
- Browse to Identity > Users > All users.
- Choose the user for whom you wish to add an authentication method and select Authentication methods.
- At the top of the window, select + Add authentication method.
- Select a method (phone number or email). Email may be used for self-password reset but not authentication. When adding a phone number, select a phone type and enter phone number with valid format (e.g. +1 4255551234).
- Select Add.
The preview experience allows administrators to add any available authentication methods for users, while the original experience only allows updating of phone and alternate phone methods.
Manage methods using PowerShell
Install the Microsoft.Graph.Identity.Signins PowerShell module using the following commands.
Connect-MgGraph -Scopes "User.Read.all","UserAuthenticationMethod.Read.All","UserAuthenticationMethod.ReadWrite.All"
Select-MgProfile -Name beta
List phone based authentication methods for a specific user.
Get-MgUserAuthenticationPhoneMethod -UserId email@example.com
Create a mobile phone authentication method for a specific user.
New-MgUserAuthenticationPhoneMethod -UserId firstname.lastname@example.org -phoneType "mobile" -phoneNumber "+1 7748933135"
Remove a specific phone method for a user
Remove-MgUserAuthenticationPhoneMethod -UserId email@example.com -PhoneAuthenticationMethodId 3179e48a-750b-4051-897c-87b9720928f7
Authentication methods can also be managed using Microsoft Graph APIs. For more information, see Authentication and authorization basics.
Manage user authentication options
Steps in this article might vary slightly based on the portal you start from.
If you're assigned the Authentication Administrator role, you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object. To manage user settings, complete the following steps:
Browse to Identity > Users > All users.
Choose the user you wish to perform an action on and select Authentication methods. At the top of the window, then choose one of the following options for the user:
- Reset password resets the user's password and assigns a temporary password that must be changed on the next sign-in.
- Require re-register MFA deactivates the user's hardware OATH tokens and deletes the following authentication methods from this user: phone numbers, Microsoft Authenticator apps and software OATH tokens. If needed, the user is requested to set up a new MFA authentication method the next time they sign in.
- Revoke MFA sessions clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
Delete users' existing app passwords
For users that have defined app passwords, administrators can also choose to delete these passwords, causing legacy authentication to fail in those applications. These actions may be necessary if you need to provide assistance to a user, or need to reset their authentication methods. Non-browser apps that were associated with these app passwords will stop working until a new app password is created.
To delete a user's app passwords, complete the following steps:
Browse to Identity > Users > All users.
Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
Select Manage user settings, then check the box for Delete all existing app passwords generated by the selected users, as shown in the following example:
- Select save, then close.
This article showed you how to configure individual user settings. To configure overall Microsoft Entra multifactor authentication service settings, see Configure Microsoft Entra multifactor authentication settings.
If your users need help, see the User guide for Microsoft Entra multifactor authentication.