• CoopaLoopa@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    24
    ·
    1 year ago

    This is specifically an issue with corporate M365 accounts when a user tries to migrate to a new phone without access to the old phone where the authenticator was setup.

    Personal MS accounts can backup their auth secret keys to cloud storage, and when signing in on a new device, it authenticates you with your cloud storage (Google/Apple) and properly restores your MS Authenticator app.

    The issue is that while MS says you can backup your corporate M365 accounts in MS Authenticator, it doesnt actually store the secret key, so it’s useless.

    Have your administrator enable TAP (Temporary Access Passwords) on the tenant. Then an M365 admin can create a TAP for your account that lets you login without a password/2FA. You can use the TAP to login and rejoin MS Authenticator app. The TAP expires in 1 hour by default.

    • spiffy_spaceman@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      I’m in this particular loop at work where I don’t want and don’t really need an account, so I’m going to pretend I didn’t see this and if you could ensure that IT doesn’t see this, that’d be great, thanks.

    • AggressivelyPassive@feddit.de
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      MS auth also supports SMS via phone number. That’s a whole new level of insecure, but lets you migrate to a new phone rather easily.

      I’m 90% sure, all that 2FA crap is a sham anyway.