- Public profile contact information, which is managed in the user profile and visible to members of your organization. For users synced from on-premises Active Directory, this information is managed in on-premises Windows Server Active Directory Domain Services.
- Authentication methods, which are always kept private and only used for authentication, including multi-factor authentication (MFA). Administrators can manage these methods in a user's authentication method blade and users can manage their methods in Security Info page of MyAccount.
When managing Azure AD Multi-Factor Authentication methods for your users, Authentication administrators can:
- Add authentication methods for a specific user, including phone numbers used for MFA.
- Reset a user's password.
- Require a user to re-register for MFA.
- Revoke existing MFA sessions.
- Delete a user's existing app passwords
Add authentication methods for a user
You can add authentication methods for a user via the Azure portal or Microsoft Graph.
For security reasons, public user contact information fields should not be used to perform MFA. Instead, users should populate their authentication method numbers to be used for MFA.
To add authentication methods for a user via the Azure portal:
- Sign in to the Azure portal.
- Browse to Azure Active Directory > Users > All users.
- Choose the user for whom you wish to add an authentication method and select Authentication methods.
- At the top of the window, select + Add authentication method.
- Select a method (phone number or email). Email may be used for self-password reset but not authentication. When adding a phone number, select a phone type and enter the phone number with a valid format (e.g. +1 4255551234).
- Select Add.
The preview experience allows administrators to add any available authentication methods for users, while the original experience only allows updating of phone and alternate phone methods.
Manage methods using PowerShell:
Install the Microsoft.Graph.Identity.Signins PowerShell module using the following commands.
Install-module Microsoft.Graph.Identity.Signins Connect-MgGraph -Scopes UserAuthenticationMethod.ReadWrite.All Select-MgProfile -Name beta
List phone-based authentication methods for a specific user.
Get-MgUserAuthenticationPhoneMethod -UserId firstname.lastname@example.org
Create a mobile phone authentication method for a specific user.
New-MgUserAuthenticationPhoneMethod -UserId email@example.com -phoneType "mobile" -phoneNumber "+1 7748933135"
Remove a specific phone method for a user
Remove-MgUserAuthenticationPhoneMethod -UserId firstname.lastname@example.org -PhoneAuthenticationMethodId 3179e48a-750b-4051-897c-87b9720928f7
Authentication methods can also be managed using Microsoft Graph APIs, more information can be found in the document Azure AD authentication methods API overview
Manage user authentication options
If you're assigned the Authentication Administrator role, you can require users to reset their password, re-register for MFA, or revoke existing MFA sessions from their user object. To manage user settings, complete the following steps:
Sign in to the Azure portal.
On the left, select Azure Active Directory > Users > All users.
Choose the user you wish to perform an action on and select Authentication methods. At the top of the window, then choose one of the following options for the user:
Reset Password resets the user's password and assigns a temporary password that must be changed on the next sign-in.
Require Re-register MFA makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
Revoke MFA Sessions clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
Delete users' existing app passwords
For users that have defined app passwords, administrators can also choose to delete these passwords, causing legacy authentication to fail in those applications. These actions may be necessary if you need to provide assistance to a user, or need to reset their authentication methods. Non-browser apps that were associated with these app passwords will stop working until a new app password is created.
To delete a user's app passwords, complete the following steps:
- Sign in to the Azure portal.
- On the left-hand side, select Azure Active Directory > Users > All users.
- Select Multi-Factor Authentication. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
- Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
- Select Manage user settings, then check the box for Delete all existing app passwords generated by the selected users, as shown in the following example:
- Select save, then close.