You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-number-match.md
+27-7Lines changed: 27 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 11/03/2022
7
+
ms.date: 11/04/2022
8
8
ms.author: justinha
9
9
author: mjsantani
10
10
ms.collection: M365-identity-device-management
@@ -17,7 +17,7 @@ This topic covers how to enable number matching in Microsoft Authenticator push
17
17
18
18
>[!NOTE]
19
19
>Number matching is a key security upgrade to traditional second factor notifications in Microsoft Authenticator that will begin to be enabled by default for all users starting February 27, 2023.<br>
20
-
>We highly recommend enabling number matching in the near-term for improved sign-in security.
20
+
>We highly recommend enabling number matching in the nearterm for improved sign-in security.
21
21
22
22
## Prerequisites
23
23
@@ -358,20 +358,40 @@ To enable number matching in the Azure AD portal, complete the following steps:
358
358
359
359
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
360
360
361
-
Number match will be enabled for all users of Microsoft Authenticator app after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
361
+
Number match will be enabled for all users of Microsoft Authenticator after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
362
362
363
-
### Can I opt out of number matching?
363
+
### How should users be prepared for default number matching?
364
364
365
-
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
365
+
Here are differences in sign-in scenarios that Microsoft Authenticator users will see after number matching is enabled by default:
366
+
367
+
- Authentication flows will require users to do number match when using Microsoft Authenticator. If their version of Microsoft Authenticator doesn’t support number match, their authentication will fail.
368
+
- Self-service password reset (SSPR) and combined registration will also require number match when using Microsoft Authenticator.
369
+
- AD FS adapter will require number matching on [supported versions of Windows Server](#ad-fs-adapter). On earlier versions, users will continue to see the **Approve**/**Deny** experience and won’t see number matching until you upgrade.
370
+
- NPS extension versions beginning 1.2.2131.2 will require users to do number matching. Because the NPS extension can’t show a number, the user will be asked to enter a One-Time Passcode (OTP). The user must have an OTP authentication method such as Microsoft Authenticator or software OATH tokens registered to see this behavior. If the user doesn’t have an OTP method registered, they’ll continue to get the **Approve**/**Deny** experience.
371
+
372
+
To create a registry key that overrides this behavior and prompts users with **Approve**/**Deny**:
373
+
374
+
1. On the NPS Server, open the Registry Editor.
375
+
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
376
+
1. Set the following Key Value Pair:
377
+
Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP
378
+
Value = FALSE
379
+
1. Restart the NPS Service.
366
380
367
-
### What about my Apple Watch?
381
+
- Apple Watch will remain unsupported for number matching. We recommend you uninstall the Microsoft Authenticator Apple Watch app because you have to approve notifications on your phone.
368
382
369
-
Apple Watch will remain unsupported for number matching. We recommend you uninstall the Microsoft Authenticator Apple Watch app because you have to approve notifications on your phone.
383
+
### Can I opt out of number matching?
384
+
385
+
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
370
386
371
387
### What happens if a user runs an older version of Microsoft Authenticator?
372
388
373
389
If a user is running an older version of Microsoft Authenticator that doesn't support number matching, authentication won't work if number matching is enabled. Users need to upgrade to the latest version of Microsoft Authenticator to use it for sign-in.
374
390
391
+
### Why is my user prompted to tap on one out of three numbers instead of entering the number in their Microsoft Authenticator app?
392
+
393
+
Older versions of Microsoft Authenticator prompt users to tap and select a number instead of entering the number in their Microsoft Authenticator app. These authentications won't fail, but we highly recommend that users update to the latest version of the app to be able to enter the number.
0 commit comments