Combined registration for SSPR and Microsoft Entra multifactor authentication - Microsoft Entra ID (2024)

  • Article

Before combined registration, users registered authentication methods for Microsoft Entra multifactor authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for multifactor authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both multifactor authentication and SSPR. We recommend this video on How to enable and configure SSPR in Microsoft Entra ID.

Combined registration for SSPR and Microsoft Entra multifactor authentication - Microsoft Entra ID (1)

Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the user documentation to prepare your users for the new experience and help to ensure a successful rollout.

Microsoft Entra ID combined security information registration is available for Azure US Government but not Microsoft Azure operated by 21Vianet.

My Account pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages continue to render in the last language used. If you clear the cache, the pages re-render.

If you want to force a specific language, you can add ?lng=<language> to the end of the URL, where <language> is the code of the language you want to render.

Combined registration for SSPR and Microsoft Entra multifactor authentication - Microsoft Entra ID (2)

Methods available in combined registration

Combined registration supports the authentication methods and actions in the following table.

MethodRegisterChangeDelete
Microsoft AuthenticatorYes (maximum of 5)NoYes
Other authenticator appYes (maximum of 5)NoYes
Hardware tokenNoNoYes
PhoneYesYesYes
Alternate phoneYesYesYes
Office phone*YesYesYes
EmailYesYesYes
Security questionsYesNoYes
PasswordsNoYesNo
App passwords*YesNoYes
Passkey (FIDO2)*YesNoYes

Note

If you enable Microsoft Authenticator for passwordless authentication mode in the Authentication methods policy, users need to also enable passwordless sign-in in the Authenticator app.

Alternate phone can only be registered in Manage mode on https://aka.ms/mysecurityinfo and requires Voice calls to be enabled in the Authentication methods policy.

Office phone can only be registered in Interrupt mode if the users Business phone property has been set. Office phone can be added by users in Managed mode from https://aka.ms/mysecurityinfo without this requirement.

App passwords are available only to users who have been enforced for per-user MFA. App passwords aren't available to users who are enabled for Microsoft Entra multifactor authentication by a Conditional Access policy.

Passkey (FIDO2), can only be added in Manage mode on https://aka.ms/mysecurityinfo.

Users can set one of the following options as the default multifactor authentication method.

  • Microsoft Authenticator – push notification or passwordless
  • Authenticator app or hardware token – code
  • Phone call
  • Text message

Note

Virtual phone numbers aren't supported for Voice calls or SMS messages.

Third party authenticator apps don't provide push notification. As we continue to add more authentication methods to Microsoft Entra ID, those methods become available in combined registration.

Combined registration modes

There are two modes of combined registration: interrupt and manage.

  • Interrupt mode is a wizard-like experience, presented to users when they register or refresh their security info at sign-in.
  • Manage mode is part of the user profile and allows users to manage their security info.

For both modes, users who have previously registered a method that can be used for Microsoft Entra multifactor authentication need to perform multifactor authentication before they can access their security info. Users must confirm their information before continuing to use their previously registered methods.

Interrupt mode

Combined registration adheres to both multifactor authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip (indefinitely) the registration interruption and complete it at a later time.

The following are sample scenarios where users might be prompted to register or refresh their security info:

  • multifactor authentication registration enforced through Identity Protection: Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
  • multifactor authentication registration enforced through per-user multifactor authentication: Users are asked to register during sign-in. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
  • multifactor authentication registration enforced through Conditional Access or other policies: Users are asked to register when they use a resource that requires multifactor authentication. They register multifactor authentication methods and SSPR methods (if the user is enabled for SSPR).
  • SSPR registration enforced: Users are asked to register during sign-in. They register only SSPR methods.
  • SSPR refresh enforced: Users are required to review their security info at an interval set by the admin. Users are shown their info and can confirm the current info or make changes if needed.

When registration is enforced, users are shown the minimum number of methods needed to be compliant with both multifactor authentication and SSPR policies, from most to least secure. Users going through combined registration where both MFA and SSPR registration are enforced and the SSPR policy requires two methods will first be required to register an MFA method as the first method and can select another MFA or SSPR specific method as the second registered method (e.g. email, security questions etc.)

Consider the following example scenario:

  • A user is enabled for SSPR. The SSPR policy requires two methods to reset and has enabled Microsoft Authenticator app, email, and phone.
  • When the user chooses to register, two methods are required:
    • The user is shown Microsoft Authenticator app and phone by default.
    • The user can choose to register email instead of Authenticator app or phone.

When they set up Microsoft Authenticator, the user can click I want to setup a different method to register other authentication methods. The list of available methods is determined by the Authentication methods policy for the tenant.

Combined registration for SSPR and Microsoft Entra multifactor authentication - Microsoft Entra ID (3)

The following flowchart describes which methods are shown to a user when interrupted to register during sign-in:

Combined registration for SSPR and Microsoft Entra multifactor authentication - Microsoft Entra ID (4)

If you have both multifactor authentication and SSPR enabled, we recommend that you enforce multifactor authentication registration.

If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up to date, or they can make changes if they need to. Users must perform multifactor authentication to access this page.

Manage mode

Users can access manage mode by going to Security info or by selecting Security info from My Account. From there, users can add methods, delete or change existing methods, change the default method, and more.

Key usage scenarios

Change a password in MySignIns

A user navigates to Security info. After signing in, the user can change their password. If the user authenticates with a password and a multifactor authentication method, they will be able to use the enhanced user experience to change their password without entering their existing password. When finished, the user has the new password updated on the Security info page. Authentication methods such as Temporary Access Pass (TAP) aren't supported for password change unless the user knows their existing password.

Protect Security info registration with Conditional Access

To secure when and how users register for Microsoft Entra multifactor authentication and self-service password reset, you can use user actions in Conditional Access policy. This functionality may be enabled in organizations that want users to register for Microsoft Entra multifactor authentication and SSPR from a central location, such as a trusted network location during HR onboarding. Learn more on how to configure common Conditional Access policies for securing security info registration.

Set up security info during sign-in

An admin has enforced registration.

A user has not set up all required security info and goes to the Microsoft Entra admin center. After the user enters the user name and password, the user is prompted to set up security info. The user then follows the steps shown in the wizard to set up the required security info. If your settings allow it, the user can choose to set up methods other than those shown by default. After users complete the wizard, they review the methods they set up and their default method for multifactor authentication. To complete the setup process, the user confirms the info and continues to the Microsoft Entra admin center.

Set up security info from My Account

An admin hasn't enforced registration.

A user who hasn't yet set up all required security info goes to https://myaccount.microsoft.com. The user selects Security info in the left pane. From there, the user chooses to add a method, selects any of the methods available, and follows the steps to set up that method. When finished, the user sees the method that was set up on the Security info page.

Set up other methods after partial registration

If a user has partially satisfied MFA or SSPR registration due to existing authentication method registrations performed by the user or admin, users will only be asked to register additional information allowed by the Authentication methods policy settings when registration is required. If more than one other authentication method is available for the user to choose and register, an option on the registration experience titled I want to set up another method will be shown and allow the user to set up their desired authentication method.

Combined registration for SSPR and Microsoft Entra multifactor authentication - Microsoft Entra ID (5)

Delete security info from My Account

A user who has previously set up at least one method navigates to https://aka.ms/mysecurityinfo. The user chooses to delete one of the previously registered methods. When finished, the user no longer sees that method on the Security info page.

Change the default method from My Account

A user who has previously set up at least one method that can be used for multifactor authentication navigates to https://aka.ms/mysecurityinfo. The user changes the current default method to a different default method. When finished, the user sees the new default method on the Security info page.

Switch directory

An external identity such as a B2B user may need to switch the directory to change the security registration information for a third-party tenant.In addition, users who access a resource tenant may be confused when they change settings in their home tenant but don't see the changes reflected in the resource tenant.

For example, a user sets Microsoft Authenticator app push notification as the primary authentication to sign-in to home tenant and also has SMS/Text as another option.This user is also configured with SMS/Text option on a resource tenant.If this user removes SMS/Text as one of the authentication options on their home tenant, they get confused when access to the resource tenant asks them to respond to SMS/Text message.

To switch the directory in the Microsoft Entra admin center, click the user account name in the upper right corner and click Switch directory.

Combined registration for SSPR and Microsoft Entra multifactor authentication - Microsoft Entra ID (6)

Or, you can specify a tenant by URL to access security information.

https://mysignins.microsoft.com/security-info?tenant=<Tenant Name>

https://mysignins.microsoft.com/security-info/?tenantId=<Tenant ID>

Note

Customers attempting to register or manage security info through combined registration or the My Sign-ins page should use a modern browser such as Microsoft Edge.

IE11 is not officially supported for creating a webview or browser in applications as it will not work as expected in all scenarios.

Applications that have not been updated and are still using Azure AD Authentication Library (ADAL) that rely on legacy webviews can fallback to older versions of IE. In these scenarios, users will experience a blank page when directed to the My Sign-ins page. To resolve this issue, switch to a modern browser.

Next steps

To get started, see the tutorials to enable self-service password reset and enable Microsoft Entra multifactor authentication.

Learn how to enable combined registration in your tenant or force users to re-register authentication methods.

You can also review the available methods for Microsoft Entra multifactor authentication and SSPR.

Combined registration for SSPR and Microsoft Entra multifactor authentication - Microsoft Entra ID (2024)

FAQs

How to configure the Microsoft Entra multifactor authentication registration policy? ›

Policy configuration
  1. Sign in to the Microsoft Entra admin center as at least a Security Administrator.
  2. Browse to Protection > Identity Protection > Multifactor authentication registration policy. Under Assignments > Users. ...
  3. Set Policy enforcement to Enabled.
  4. Select Save.
May 6, 2024

How to disable require Microsoft Entra ID multifactor authentication registration? ›

Sign in to the Microsoft Entra admin center > Browse to Microsoft Entra ID (Azure AD) > Properties > Select Manage security defaults > Set Security defaults to disabled > Select Save.

What is the difference between MFA and SSPR? ›

SSPR gives users the ability to change or reset their password, with no administrator or help desk involvement. Although both are related to security, MFA is an (additional) security layer while SSPR is a recovery feature.

How to enable combined security info registration? ›

Sign in to the Microsoft Entra admin center as at least an Conditional Access Administrator. Browse to Protection > Conditional Access. Select + New policy. Enter a name for this policy, such as Combined Security Info Registration on Trusted Networks.

How do I enable MFA for users in Entra? ›

Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator. Browse to Protection > Conditional Access, select + New policy, and then select Create new policy. Enter a name for the policy, such as MFA Pilot. Under Assignments, select the current value under Users or workload identities.

How do I require all users to register for Multifactor authentication? ›

Under Access controls > Grant, select Grant access, Require multifactor authentication, and select Select. Confirm your settings and set Enable policy to Report-only. Select Create to create to enable your policy.

How do I remove device registration from Microsoft Authenticator? ›

Go to account.microsoft.com/devices, sign in, and find the device you want to remove. Select Show details to see info for that device. Under your device's name, select More actions > Remove. Review your device details, select the check box, I'm ready to remove this device, then select Remove.

How do I remove a device from my MFA registration? ›

Removing a Phone/Tablet
  1. Select the device you would like to remove from your MFA account.
  2. Click the [UNLINK THIS -DEVICE-] button.
  3. At the Unlink -DEVICE- window, click the [UNLINK IT!] button. If this is the last device on your account, continuing will unlink the device and disable MFA.

How do I disable Microsoft multi factor authentication? ›

Go to Office 365 Admin Center > Users > Active users > Click More next to +Add a user > Multifactor Authentication setup. Check an account>click Disable under quick steps on the right. Thanks in advance for your understanding!

How do I migrate MFA and SSPR policy settings? ›

Start migrating MFA and SSPR to the new Authentication Methods...
  1. Open Azure Active Directory – Users.
  2. Open legacy MFA portal under Per-User MFA.
  3. Take a note of the verification options. ...
  4. Go back to Azure Active Directory.
  5. Open Password reset – Authentication methods. ...
  6. Go back to Azure Active Directory.
Jan 26, 2024

How do I know if a user is registered for MFA? ›

Option 1 Using Microsoft Entra Admin Center
  1. Sign-in to the Microsoft Entra admin center.
  2. Go to All Users residing under Identity»Users and select Per-user MFA. ...
  3. In the list of users, view the multi-factor authentication status field to see the current MFA status for each user.

What is the SSPR registration policy? ›

The SSPR policy requires two methods to reset and has enabled Microsoft Authenticator app, email, and phone. When the user chooses to register, two methods are required: The user is shown Microsoft Authenticator app and phone by default. The user can choose to register email instead of Authenticator app or phone.

How do I enable my SSPR account? ›

From the Properties page, under the option Self service password reset enabled, choose Selected. If your group isn't visible, choose No groups selected, browse for and select your Microsoft Entra group, like SSPR-Test-Group, and then choose Select. To enable SSPR for the select users, select Save.

How do I turn on multi authentication? ›

Turn on MFA for each account or app!
  1. Go to Settings. It may be called Account Settings, Settings & Privacy or similar.
  2. Look for and turn on MFA. It may be called two-factor authentication, two-step authentication or similar.
  3. Confirm. Select which MFA method to use from the options provided by each account or app.

How do I enable MFA on my service account? ›

How to configure an MFA-enabled service account
  1. Log in to portal.azure.com using your Global Administrator credentials.
  2. Click Azure Active Directory under Azure services.
  3. Choose Security from the left pane.
  4. Click MFA under the Manage category in the left pane.
  5. Choose the Additional cloud-based MFA settings option.

How to set up Multifactor authentication in Microsoft? ›

Steps: Turn on multifactor authentication
  1. Sign in to the Microsoft Entra admin center as least a Security Administrator.
  2. Browse to Identity > Overview > Properties.
  3. Select Manage security defaults.
  4. Set Security defaults to Enabled.
  5. Select Save.
Feb 22, 2024

How do I set up MFA on LogMeIn? ›

Here's how:
  1. Log in to your account at LogMeIn.com using your email address and password.
  2. At the top of the page, select Settings > Account Settings. ...
  3. Under Security, select edit next to Setup Multifactor Authentication. ...
  4. To change from email or a third-party app to receiving text messages, select Use text message instead.

How do I enable registration campaign policy using the Microsoft Entry Admin Center? ›

Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator. Browse to Protection > Authentication methods > Registration campaign and click Edit. For State: Select Enabled to enable the registration campaign for all users.

What is the MFA registration policy? ›

Multifactor authentication provides a means to verify who you are using more than just a username and password. It provides a second layer of security to user sign-ins. For users to be able to respond to MFA prompts, they must first register for Microsoft Entra Multifactor Authentication.

References

Top Articles
Latest Posts
Article information

Author: Barbera Armstrong

Last Updated:

Views: 6468

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Barbera Armstrong

Birthday: 1992-09-12

Address: Suite 993 99852 Daugherty Causeway, Ritchiehaven, VT 49630

Phone: +5026838435397

Job: National Engineer

Hobby: Listening to music, Board games, Photography, Ice skating, LARPing, Kite flying, Rugby

Introduction: My name is Barbera Armstrong, I am a lovely, delightful, cooperative, funny, enchanting, vivacious, tender person who loves writing and wants to share my knowledge and understanding with you.