

- #Microsoft authenticator how to
- #Microsoft authenticator update
- #Microsoft authenticator Patch
- #Microsoft authenticator download
They just need to uninstall and reinstall the application, but for them, sometimes, it is confusing.
#Microsoft authenticator download
If they have to download it again and use it again on their phone, it is something that gets complicated. It is tricky if they have already had the Authenticator app and then work somewhere else.
#Microsoft authenticator Patch
Change the Query to PATCH and Run "# the end users, it can be confusing if they have worked for another company that had the Authenticator app.
#Microsoft authenticator update
Then update the Request body similar to the Request body as shown below. Leverage the Response body to create the Request body section. Retrieve your existing policy via a GET. Users who aren't enabled for Microsoft Authenticator won't see these features. Only users who are enabled for Microsoft Authenticator under Microsoft Authenticator’s includeTargets will see the application name or geographic location.
#Microsoft authenticator how to
The following example shows how to update displayAppInformationRequiredState and displayLocationInformationRequiredState under featureSettings. In that case, do a GET first, update only the relevant fields, and then PATCH. You might need to PATCH the entire schema to prevent overwriting any previous configuration. In these examples, we'll use any, but if you don't want to allow passwordless, use push. The value of Authentication Mode can be either any or push, depending on whether or not you also want to enable passwordless phone sign-in. In featureSettings, change displayAppInformationRequiredState and displayLocationInformationRequiredState from default to enabled. The possible values are: ‘group’, 'administrativeUnit’, ‘role’, unknownFutureValue’.Įxample of how to enable additional context for all users The kind of entity targeted, such as group, role, or administrative unit. You can only include one group for each feature.Įnabled explicitly enables the feature for the selected group.ĭisabled explicitly disables the feature for the selected group.ĭefault allows Azure AD to manage whether the feature is enabled or not for the selected group. You can only exclude one group for each feature.Ī single entity that is included in this feature. Value is ignored for phone sign-in notifications.ĭetermines whether the user is shown application name in Microsoft Authenticator notification.ĭetermines whether the user is shown geographic location context in Microsoft Authenticator notification.Īuthentication method feature configuration propertiesĪ single entity that is excluded from this feature. Require number matching for MFA notifications. MicrosoftAuthenticator featureSettings properties Push: Only traditional second factor push notifications are allowed. MicrosoftAuthenticator includeTarget propertiesĪny: Both passwordless phone sign-in and traditional second factor notifications are allowed.ĭeviceBasedPush: Only passwordless phone sign-in notifications are allowed. MicrosoftAuthenticatorFeatureSettings collectionĪ collection of Microsoft Authenticator features. MicrosoftAuthenticatorAuthenticationMethodTarget collectionĪ collection of users or groups who are enabled to use the authentication method. The Authentication method policy identifier. MicrosoftAuthenticatorAuthenticationMethodConfiguration properties Then use the following API endpoint to change the displayAppInformationRequiredState or displayLocationInformationRequiredState properties under featureSettings to enabled and include or exclude the groups you want: Identify your single target group for each of the features. In Graph Explorer, you'll need to consent to the and permissions. Make sure you use the new policy schema for Microsoft Graph APIs. Geographic location: displayLocationInformationRequiredState.Application name: displayAppInformationRequiredState.Under featureSettings, you can use the following name mapping for each feature: You can enable and disable application name and geographic location separately. The additional context can be combined with number matching to further improve sign-in security. When a user receives a passwordless phone sign-in or MFA push notification in Microsoft Authenticator, they'll see the name of the application that requests the approval and the location based on the IP address where the sign-in originated from. Passwordless phone sign-in and multifactor authentication On-premises synchronized security groups and cloud-only security groups are supported for the Authentication method policy. Make sure you use the new schema to help prevent errors.Īdditional context can be targeted to only a single group, which can be dynamic or nested. The older policy schema is now deprecated. The policy schema for Microsoft Graph APIs has been improved.
