Skip to content

Commit 37d1a54

Browse files
Merge pull request #245189 from Justinha/default-phone
updates from Julia
2 parents e0930c2 + f8a8b0c commit 37d1a54

File tree

2 files changed

+24
-15
lines changed

2 files changed

+24
-15
lines changed

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/23/2023
9+
ms.date: 07/17/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -21,17 +21,10 @@ ms.collection: M365-identity-device-management
2121

2222
For direct authentication using text message, you can [Configure and enable users for SMS-based authentication](howto-authentication-sms-signin.md). SMS-based sign-in is great for Frontline workers. With SMS-based sign-in, users don't need to know a username and password to access applications and services. The user instead enters their registered mobile phone number, receives a text message with a verification code, and enters that in the sign-in interface.
2323

24-
Users can also verify themselves using a mobile phone or office phone as secondary form of authentication used during Azure AD Multi-Factor Authentication or self-service password reset (SSPR).
24+
Users can also verify themselves using a mobile phone or office phone as secondary form of authentication used during Azure AD Multi-Factor Authentication or self-service password reset (SSPR). Azure AD Multi-Factor Authentication and SSPR support phone extensions only for office phones.
2525

26-
> [!NOTE]
27-
> Phone call verification is not available for Azure AD tenants with trial subscriptions. For example, signing up for a trial EMS licenses, will not provide the capability for phone call verification.
28-
29-
To work properly, phone numbers must be in the format *+CountryCode PhoneNumber*, for example, *+1 4251234567*.
30-
31-
> [!NOTE]
32-
> There needs to be a space between the country/region code and the phone number.
33-
>
34-
> Password reset and Azure AD Multi-Factor Authentication support phone extensions only in office phone.
26+
>[!NOTE]
27+
>Phone call verification isn't available for Azure AD tenants with trial subscriptions. For example, if you sign up for a trial license Microsoft Enterprise Mobility and Security (EMS), phone call verification isn't available. Phone numbers must be provided in the format *+CountryCode PhoneNumber*, for example, *+1 4251234567*. There must be a space between the country/region code and the phone number.
3528
3629
## Mobile phone verification
3730

@@ -44,7 +37,7 @@ If users don't want their mobile phone number to be visible in the directory but
4437
Microsoft doesn't guarantee consistent SMS or voice-based Azure AD Multi-Factor Authentication prompt delivery by the same number. In the interest of our users, we may add or remove short codes at any time as we make route adjustments to improve SMS deliverability. Microsoft doesn't support short codes for countries/regions besides the United States and Canada.
4538

4639
> [!NOTE]
47-
> Starting July 2023, we apply delivery method optimization such that tenants with a free or trial subscription may receive an SMS message or voice call.
40+
> Starting July 2023, we will apply delivery method optimizations such that tenants with a free or trial subscription may receive an SMS message or voice call.
4841
4942
### SMS message verification
5043

@@ -58,6 +51,8 @@ Android users can enable Rich Communication Services (RCS) on their devices. RCS
5851

5952
With phone call verification during SSPR or Azure AD Multi-Factor Authentication, an automated voice call is made to the phone number registered by the user. To complete the sign-in process, the user is prompted to press # on their keypad.
6053

54+
The calling number that a user receives the voice call from differs for each country. See [phone call settings](howto-mfa-mfasettings.md#phone-call-settings) to view all possible voice call numbers.
55+
6156
## Office phone verification
6257

6358
With office phone call verification during SSPR or Azure AD Multi-Factor Authentication, an automated voice call is made to the phone number registered by the user. To complete the sign-in process, the user is prompted to press # on their keypad.

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/29/2023
9+
ms.date: 07/17/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -162,9 +162,20 @@ Users can have a combination of up to five OATH hardware tokens or authenticator
162162

163163
If users receive phone calls for MFA prompts, you can configure their experience, such as caller ID or the voice greeting they hear.
164164

165-
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following number. Users with spam filters should exclude this number.
165+
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following numbers. Users with spam filters should exclude these numbers.
166+
167+
Default number: *+1 (855) 330-8653*
168+
169+
The following table lists more numbers for different countries.
170+
171+
| Country | Number |
172+
|:-----------|:----------------|
173+
| Croatia | +385 15507766 |
174+
| Ghana | +233 308250245 |
175+
| Sri Lanka | +94 117750440 |
176+
| Ukraine | +380 443332393 |
177+
166178

167-
* *+1 (855) 330-8653*
168179

169180
> [!NOTE]
170181
> When Azure AD Multi-Factor Authentication calls are placed through the public telephone network, sometimes the calls are routed through a carrier that doesn't support caller ID. Because of this, caller ID isn't guaranteed, even though Azure AD Multi-Factor Authentication always sends it. This applies both to phone calls and text messages provided by Azure AD Multi-Factor Authentication. If you need to validate that a text message is from Azure AD Multi-Factor Authentication, see [What SMS short codes are used for sending messages?](multi-factor-authentication-faq.yml#what-sms-short-codes-are-used-for-sending-sms-messages-to-my-users-).
@@ -175,6 +186,9 @@ To configure your own caller ID number, complete the following steps:
175186
1. Set the **MFA caller ID number** to the number you want users to see on their phones. Only US-based numbers are allowed.
176187
1. Select **Save**.
177188

189+
> [!NOTE]
190+
> When Azure AD Multi-Factor Authentication calls are placed through the public telephone network, sometimes the calls are routed through a carrier that doesn't support caller ID. Because of this, caller ID isn't guaranteed, even though Azure AD Multi-Factor Authentication always sends it. This applies both to phone calls and text messages provided by Azure AD Multi-Factor Authentication. If you need to validate that a text message is from Azure AD Multi-Factor Authentication, see [What SMS short codes are used for sending messages?](multi-factor-authentication-faq.yml#what-sms-short-codes-are-used-for-sending-sms-messages-to-my-users-).
191+
178192
### Custom voice messages
179193

180194
You can use your own recordings or greetings for Azure AD Multi-Factor Authentication. These messages can be used in addition to the default Microsoft recordings or to replace them.

0 commit comments

Comments
 (0)