Registration Process
When users sign into an application that requires MFA for the first time, they must register a verification method. This registration flow ensures the user selects a method they can access consistently. For every sign-in that requires MFA, users must complete verification using their registered method.
Authentication Methods and Service Support
Authentication Methods and Service Support
Why Some Methods Are SSPR‑Only: These methods are not strong enough or not secure enough to be used as MFA during sign-in. They are only meant to help a user recover their password — not to secure access to resources.
| Authentication Method | MFA | SSPR | Reason |
|---|---|---|---|
| Password | ✔️ | ✔️ | Primary credential used in both flows. |
| Security Questions | ❌ | ✔️ | Weak, knowledge‑based; not secure enough for MFA. |
| Email Address | ❌ | ✔️ | Email can be compromised; not a strong second factor. |
| Windows Hello for Business | ✔️ | ✔️ | TPM‑backed keys and biometrics; strong authentication. |
| FIDO2 Security Key | ✔️ | ✔️ | Phishing‑resistant hardware key. |
| Microsoft Authenticator App | ✔️ | ✔️ | Strong possession factor; supports push and OTP. |
| OATH Hardware Token | ✔️ | ✔️ | TOTP codes; secure one‑time passwords. |
| OATH Software Token | ✔️ | ✔️ | App‑based TOTP; strong enough for MFA. |
| Text Message (SMS) | ✔️ | ✔️ | Accepted possession factor; widely supported. |
| Voice Call | ✔️ | ✔️ | Phone‑based verification; similar to SMS. |
| App Passwords | ✔️ (limited) | ❌ | Legacy workaround for non‑modern auth apps. |
Method Details
Security Questions
Windows Hello for Business
FIDO2 Security Keys
Microsoft Authenticator App
OATH Tokens
OATH Hardware Tokens
OATH Software Tokens
Text Message and Voice Call
App Passwords
Monitoring MFA and SSPR Adoption
Microsoft Entra ID provides monitoring through Usage and Insights. Administrators can track:
This information helps identify training needs or problematic authentication methods.