Microsoft Entra IDMicrosoft Technologies

Step-by-Step Guide : How to enable passwordless authentication with Microsoft Authenticator

Passwords are inherently weak and susceptible to being broken. Even strengthening a password only slows down an attack; it does not make it unbreakable. Today, multi-factor authentication (MFA) is the cornerstone of identity protection. However, it still relies on the use of passwords. This is why passwordless authentication is a more secure and convenient alternative to the other two options. With passwordless authentication, the process shifts from “something you know” to “something you have” or “something you are.”

Authentication Strength

Source : https://learn.microsoft.com/en-us/entra/identity/authentication/media/concept-authentication-passwordless/passwordless-convenience-security.png

Microsoft Entra ID supports five passwordless authentication option to choose from. The method organization use is depend on the business needs and organization readiness.

  • Windows Hello for Business
  • Platform Credential for macOS
  • Platform single sign-on (PSSO) for macOS with smart card authentication
  • Microsoft Authenticator
  • Passkeys (FIDO2)
  • Certificate-based authentication

Although each method achieves the same outcome, the technology behind them varies. Among the five options, passwordless authentication using Microsoft Authenticator is relatively easy to implement. This is due to its minimal reliance on other hardware components or resources. As long as users have an iOS or Android device with Microsoft Authenticator installed, they can use passwordless authentication.

Authentication Strength and Passwordless authentication

We can use conditional access policies to enforce authentication strength. Rather than relying solely on MFA, this approach allows us to select a stronger authentication method based on business needs. There are three authentication strengths to choose from.

  1. MFA strength
  2. Passwordless MFA strength
  3. Phishing-resistant MFA strength

Among the three options, the second and third utilize passwordless authentication. However, not all passwordless authentication methods support these strength levels. For instance, Microsoft Authenticator’s passwordless authentication can only be used with the Passwordless MFA strength. This is an important consideration when selecting the appropriate passwordless authentication method for your business. More info : https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-strengths

Passwordless authentication with Microsoft Authenticator

Microsoft Authenticator employs technology similar to Windows Hello for Business, utilizing key-based authentication. However, because it involves a mobile device and an application, the authentication process is a bit more complex.

passwordless authentication flow
  1. The user inputs their username.
  2. Microsoft Entra ID detects the presence of a strong credential and initiates the Strong Credential flow.
  3. A notification is sent to the app through Apple Push Notification Service (APNS) for iOS devices or Firebase Cloud Messaging (FCM) for Android devices.
  4. The user receives the push notification and opens the app.
  5. The app connects to Microsoft Entra ID and receives a proof-of-presence challenge and nonce.
  6. The user completes the challenge by entering their biometric data or PIN to unlock the private key.
  7. The nonce is signed with the private key and sent back to Microsoft Entra ID.
  8. Microsoft Entra ID validates the public/private key pair and issues a token.

Source : https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-passwordless#microsoft-authenticator

Another advantage of this method is that it allows the same device to be used for passwordless authentication across multiple accounts.

In this blog, I will demonstrate how to enable passwordless authentication with Microsoft Authenticator.

Enable Authentication Method

Let’s begin the configuration by enabling Microsoft Authenticator as an authentication method.

  1. Log in to Microsoft Entra as a Global Admin or Authentication Policy Administrator.
  2. Navigate to Protection > Authentication methods > Policies.
authentication policies
  1. Select Microsoft Authenticator from the list.
Microsoft authenticator as login method
  1. In the next window, select “Enable” and set “All users” as the target. Keep the Authentication mode as “Any” and click Save.
enable Microsoft authenticator for all users

This allows all users to use Microsoft Authenticator as an authentication method.

Temporary Access Pass

If we decide not to use passwords, it’s unnecessary to provide a password to the user during the initial setup. Instead, we can issue a Temporary Access Pass for setting up the Microsoft Authenticator app.

To enable Temporary Access Pass as an authentication method, follow the same steps as described above.

temporary access pass

Setup Temporary Access Pass for User

I have a test user created with a temporary password. The next step is to create a Temporary Access Pass. Here’s how you can do it:

  1. Log in to Microsoft Entra as an Authentication Administrator, Privileged Authentication Administrator, or Global Administrator.
  2. Navigate to Identity > Users.
  3. Click on the test user.
  4. Go to Authentication methods and click on + Add authentication method.
authentication methods for user
  1. From the dropdown menu, select “Temporary Access Pass.” Choose how long it should be valid and whether it should be a one-time code (I recommend using the one-time use option for additional security). Finally, click on Add.
temporary access pass properties
  1. The Access Pass details will be displayed. Note down the code and share it with the user.
issued temporary access pass

User Registration

Now that we have a user and a temporary access pass, let’s see how we can register the user.

I’ll demonstrate this using an iPhone with the latest Microsoft Authenticator already installed.

  1. Open Microsoft Authenticator, click on Add account, and then choose Work or school account
add account to authenticator
  1. Enter the username and click on Next.
entering user name
  1. On the next page, enter the Temporary Access Pass and click on Sign-In.
typing temporary access pass
  1. Once logged in, click on Continue to register the device.
register account for authenticator login

After registering the device, the account will be added. Now, the account is ready for passwordless sign-in.

passwordless sign-in enabled

Testing

Now that everything is set up for testing,

I visited https://portal.azure.com and entered the username of the test user, then clicked on Next.

enter username

As expected, it prompted for phone sign-in.

prompt for authenticator sign-in

Once the login was approved through the Microsoft Authenticator app, I successfully logged in.

The passwordless sign-in using the Microsoft Authenticator app is functioning as anticipated. In this test, the end user never needed to know the temporary password and only used the one-time Temporary Access Pass to register the app.

For existing users, you can enable phone sign-in using the following steps:

  1. Open Microsoft Authenticator and select the registered account.
  2. Choose “Enable phone sign-in.”
  3. Follow the instructions in the app to complete the registration process.

This concludes the blog post, and I hope you now have a better understanding of how to enable passwordless authentication using Microsoft Authenticator. If you have any questions, feel free to contact me at rebeladm@live.com.

Related posts
Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Entra ID Entitlement Management access packages enable administrators to offer a self-service…
Read more
Cyber SecurityMicrosoft Entra ID

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions…
Read more
Azure servicesMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes

The Entra ID lifecycle workflow is a feature of Microsoft Entra ID identity governance and Microsoft…
Read more
Newsletter
Become a Trendsetter

Sign up and get the best of RebelAdmin, tailored for you.

Leave a Reply

Your email address will not be published. Required fields are marked *