Events
Mar 17, 9 PM - Mar 21, 10 AM
Join the meetup series to build scalable AI solutions based on real-world use cases with fellow developers and experts.
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Namespace: microsoft.graph
Authentication methods are the ways that users authenticate in Microsoft Entra ID. Authentication methods in Microsoft Entra ID include password and phone (for example, SMS and voice calls), which are manageable in Microsoft Graph beta endpoint today, among many others such as FIDO2 security keys and the Microsoft Authenticator app. Authentication methods are used in primary, second-factor, and step-up authentication, and also in the self-service password reset (SSPR) process.
The authentication method APIs are used to manage a user's authentication methods. For example:
The ability for a user to use an authentication method is governed by the authentication method policy for the tenant. For example, only users in the R&D department might be enabled to use the FIDO2 method while all users might be enabled to use Microsoft Authenticator.
We don't recommend using the authentication methods APIs for scenarios where you need to iterate over your entire user population for auditing or security check purposes. For these types of scenarios, we recommend using the authentication method registration and usage reporting APIs (available on the beta
endpoint only).
Note
Requests to the authentication methods APIs time-out after 60 seconds.
Authentication method | Description | Examples |
---|---|---|
emailAuthenticationMethod | A user can use an email address as part of the Self-Service Password Reset (SSPR) process. | See a user's authentication email address. Add, update, or remove an email address to a user. |
fido2AuthenticationMethod | A user can use a FIDO2 security key to sign-in to Microsoft Entra ID. | Delete a lost FIDO2 security key. |
microsoftAuthenticatorAuthenticationMethod | A user can use Microsoft Authenticator app to sign-in or perform multi-factor authentication to Microsoft Entra ID | Delete a Microsoft Authenticator authentication method. |
passwordAuthenticationMethod | A password is currently the default primary authentication method in Microsoft Entra ID. | Reset a user's password |
phoneAuthenticationMethod | A user can use a phone to authenticate using SMS or voice calls as allowed by policy. | See a user's authentication phone numbers. Add, update, or remove a phone number for a user. Enable or disable a primary mobile phone for SMS sign-in. |
softwareOathAuthenticationMethod | Allow users to perform multifactor authentication using an application that supports the OATH TOTP specification and provides a one-time code. | Get and delete a software OATH token assigned to a user. |
temporaryAccessPassAuthenticationMethod | A time-limited passcode that serves as a strong credential and allows onboarding of passwordless credentials. | Create and manage a customized time-limted passcode for a given user to use for strong authentication or recovery. |
windowsHelloForBusinessAuthenticationMethod | Windows Hello for Business is a passwordless sign-in method on Windows devices. | See devices where a user has enabled Windows Hello for Business sign-in. Delete a Windows Hello for Business credential. |
The following authentication methods are not yet supported in Microsoft Graph v1.0.
Authentication method | Description | Examples |
---|---|---|
Default method | Represents the method the user has selected as default for performing multi-factor authentication. | Change a user's default MFA method. NOTE: Managing the details of the default method is currently supported only through the MSOL Get-MsolUser and Set-MsolUser cmdlets, using the StrongAuthenticationMethods property. |
Hardware token | Allow users to perform multifactor authentication using a physical device that provides a one-time code. | Get a hardware token assigned to a user. |
Security questions and answers | Allow users to validate their identity when performing a self-service password reset. | Delete a security question a user registered. |
Authentication states | Manage a user's sign-in preferences and per-user MFA | See or set the MFA state for a user. See or set the system-preferred multifactor authentication (MFA) setting. |
To require users to set up a new multifactor authentication the next time they sign in, call the individual DELETE authentication method operations to delete each of the user's current authentication methods. After the user has no more methods, they're prompted to register the next time they sign in where strong authentication is required.
You can monitor tenant-level authentication method registration and usage, including users registered or unregistered for MFA and passwordless authentication, and users registered or unregistered for SSPR by using the Authentication methods usage report APIs.
Events
Mar 17, 9 PM - Mar 21, 10 AM
Join the meetup series to build scalable AI solutions based on real-world use cases with fellow developers and experts.
Register now