Skip to content

Commit 865351c

Browse files
[Azure AD] Conditional Access - Supportability 720606
1 parent 10a5aa5 commit 865351c

File tree

1 file changed

+27
-6
lines changed

1 file changed

+27
-6
lines changed

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 27 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Authentication methods - Azure Active Directory
3-
description: What authentication methods are available in Azure AD for MFA and SSPR
3+
description: Authentication methods available in Azure AD for MFA and SSPR
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/20/2019
9+
ms.date: 06/17/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -177,7 +177,9 @@ Once any errors have been addressed, the administrator then can activate each ke
177177

178178
Users may have a combination of up to five OATH hardware tokens or authenticator applications such as the Microsoft Authenticator app configured for use at any time.
179179

180-
## Mobile phone
180+
## Phone options
181+
182+
### Mobile phone
181183

182184
Two options are available to users with mobile phones.
183185

@@ -190,18 +192,18 @@ To work properly, phone numbers must be in the format *+CountryCode PhoneNumber*
190192
>
191193
> Password reset does not support phone extensions. Even in the +1 4255551234X12345 format, extensions are removed before the call is placed.
192194
193-
### Text message
195+
#### Text message
194196

195197
An SMS is sent to the mobile phone number containing a verification code. Enter the verification code provided in the sign-in interface to continue.
196198

197-
### Phone call
199+
#### Phone call
198200

199201
An automated voice call is made to the phone number you provide. Answer the call and press # in the phone keypad to authenticate
200202

201203
> [!IMPORTANT]
202204
> Starting in March of 2019 the phone call options will not be available to MFA and SSPR users in free/trial Azure AD tenants. SMS messages are not impacted by this change. Phone call will continue to be available to users in paid Azure AD tenants. This change only impacts free/trial Azure AD tenants.
203205
204-
## Office phone
206+
### Office phone
205207

206208
An automated voice call is made to the phone number you provide. Answer the call and presses # in the phone keypad to authenticate.
207209

@@ -217,6 +219,25 @@ The office phone attribute is managed by your administrator.
217219
>
218220
> Password reset does not support phone extensions. Even in the +1 4255551234X12345 format, extensions are removed before the call is placed.
219221
222+
### Troubleshooting phone options
223+
224+
Common problems related to authentication methods using a phone number:
225+
226+
* Blocked caller ID on a single device
227+
* Troubleshoot device
228+
* Wrong phone number, incorrect country code, home phone number versus work phone number
229+
* Troubleshoot user object and configured authentication methods. Ensure correct phone numbers are registered.
230+
* Wrong PIN entered
231+
* Confirm user has used the correct PIN registered in Azure MFA Server.
232+
* Call forwarded to voicemail
233+
* Ensure user has phone turned on and that service is available in their area or use alternate method.
234+
* User is blocked
235+
* Have administrator unblock the user in the Azure portal.
236+
* SMS is not subscribed on the device
237+
* Have the user change methods or activate SMS on the device.
238+
* Faulty telecom providers (No phone input detected, missing DTMF tones issues, blocked caller ID on multiple devices, or blocked SMS across multiple devices)
239+
* Microsoft uses multiple telecom providers to route phone calls and SMS messages for authentication. If you are seeing any of the above issues have a user attempt to use the method at least 5 times within 5 minutes and have that user's information available when contacting Microsoft support.
240+
220241
## App Passwords
221242

222243
Certain non-browser apps do not support multi-factor authentication, if a user has been enabled for multi-factor authentication and attempt to use non-browser apps, they are unable to authenticate. An app password allows users to continue to authenticate

0 commit comments

Comments
 (0)