Skip to content

Commit f8a8b0c

Browse files
committed
added second topic
1 parent 4b54361 commit f8a8b0c

File tree

2 files changed

+20
-8
lines changed

2 files changed

+20
-8
lines changed

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,12 +21,10 @@ ms.collection: M365-identity-device-management
2121

2222
For direct authentication using text message, you can [Configure and enable users for SMS-based authentication](howto-authentication-sms-signin.md). SMS-based sign-in is great for Frontline workers. With SMS-based sign-in, users don't need to know a username and password to access applications and services. The user instead enters their registered mobile phone number, receives a text message with a verification code, and enters that in the sign-in interface.
2323

24-
Users can also verify themselves using a mobile phone or office phone as secondary form of authentication used during Azure AD Multi-Factor Authentication or self-service password reset (SSPR).
24+
Users can also verify themselves using a mobile phone or office phone as secondary form of authentication used during Azure AD Multi-Factor Authentication or self-service password reset (SSPR). Azure AD Multi-Factor Authentication and SSPR support phone extensions only for office phones.
2525

26-
> [!NOTES]
27-
> - Phone call verification isn't available for Azure AD tenants with trial subscriptions. For example, if you sign up for a trial license Microsoft Enterprise Mobility and Security (EMS), phone call verification isn't available.
28-
> - Password reset and Azure AD Multi-Factor Authentication only support phone extensions for office phones.
29-
> - Phone numbers must be provided in the format *+CountryCode PhoneNumber*, for example, *+1 4251234567*. There must be a space between the country/region code and the phone number.
26+
>[!NOTE]
27+
>Phone call verification isn't available for Azure AD tenants with trial subscriptions. For example, if you sign up for a trial license Microsoft Enterprise Mobility and Security (EMS), phone call verification isn't available. Phone numbers must be provided in the format *+CountryCode PhoneNumber*, for example, *+1 4251234567*. There must be a space between the country/region code and the phone number.
3028
3129
## Mobile phone verification
3230

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/29/2023
9+
ms.date: 07/17/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -162,9 +162,20 @@ Users can have a combination of up to five OATH hardware tokens or authenticator
162162

163163
If users receive phone calls for MFA prompts, you can configure their experience, such as caller ID or the voice greeting they hear.
164164

165-
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following number. Users with spam filters should exclude this number.
165+
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following numbers. Users with spam filters should exclude these numbers.
166+
167+
Default number: *+1 (855) 330-8653*
168+
169+
The following table lists more numbers for different countries.
170+
171+
| Country | Number |
172+
|:-----------|:----------------|
173+
| Croatia | +385 15507766 |
174+
| Ghana | +233 308250245 |
175+
| Sri Lanka | +94 117750440 |
176+
| Ukraine | +380 443332393 |
177+
166178

167-
* *+1 (855) 330-8653*
168179

169180
> [!NOTE]
170181
> When Azure AD Multi-Factor Authentication calls are placed through the public telephone network, sometimes the calls are routed through a carrier that doesn't support caller ID. Because of this, caller ID isn't guaranteed, even though Azure AD Multi-Factor Authentication always sends it. This applies both to phone calls and text messages provided by Azure AD Multi-Factor Authentication. If you need to validate that a text message is from Azure AD Multi-Factor Authentication, see [What SMS short codes are used for sending messages?](multi-factor-authentication-faq.yml#what-sms-short-codes-are-used-for-sending-sms-messages-to-my-users-).
@@ -175,6 +186,9 @@ To configure your own caller ID number, complete the following steps:
175186
1. Set the **MFA caller ID number** to the number you want users to see on their phones. Only US-based numbers are allowed.
176187
1. Select **Save**.
177188

189+
> [!NOTE]
190+
> When Azure AD Multi-Factor Authentication calls are placed through the public telephone network, sometimes the calls are routed through a carrier that doesn't support caller ID. Because of this, caller ID isn't guaranteed, even though Azure AD Multi-Factor Authentication always sends it. This applies both to phone calls and text messages provided by Azure AD Multi-Factor Authentication. If you need to validate that a text message is from Azure AD Multi-Factor Authentication, see [What SMS short codes are used for sending messages?](multi-factor-authentication-faq.yml#what-sms-short-codes-are-used-for-sending-sms-messages-to-my-users-).
191+
178192
### Custom voice messages
179193

180194
You can use your own recordings or greetings for Azure AD Multi-Factor Authentication. These messages can be used in addition to the default Microsoft recordings or to replace them.

0 commit comments

Comments
 (0)