Blog Post

Microsoft Entra Blog
2 MIN READ

New Microsoft Authenticator security features are now available!

Alex_Simons's avatar
Alex_Simons
Icon for Microsoft rankMicrosoft
Nov 18, 2021

Howdy folks,

 

Last year, we shared ‘It’s Time To Hang Up On Phone Transports for Authentication’. Today, we are making Microsoft Authenticator even more secure for our users and easier to rollout for our admins.

 

  1. Admins can now prevent accidental approvals in Microsoft Authenticator with number matching and additional context (Public Preview).
  2. Admins can now setup GPS-location based Conditional Access policies using Microsoft Authenticator (GA).
  3. Admins can now nudge their users to setup Microsoft Authenticator during sign-in using the Registration Campaign feature (GA).

 

We would love for you to try these security upgrades to Microsoft Authenticator and let us know your thoughts! For more details about these exciting features please read below:

 

Number matching in Microsoft Authenticator MFA experience (Public Preview)

To increase security and reduce accidental approvals, admins can require users to enter the number displayed on the sign-in screen when approving an MFA request in Authenticator.

 

Figure 1 - Number Matching

 

To learn how to enable number matching for your users, click here.

 

Additional context in Microsoft Authenticator approval requests (Public Preview)

Another way to reduce accidental approvals is to show users additional context in Authenticator notifications. This feature will show users which application they are signing into and their sign-in location based on IP address.

 

Figure 2 - Additional Context with number match in notifications

 

To learn how to enable additional context for your users, click here.

 

GPS-based Named Locations (Generally Available)

Admins can now use Conditional Access policies to restrict resource access to the boundaries of a specific country by using the GPS signal from the Microsoft Authenticator.

 

Users with this feature enabled will be prompted to share their GPS location via the Microsoft Authenticator app during sign-in. To ensure the integrity of the GPS location, Microsoft Authenticator will deny authentication if the device is jailbroken or rooted.

 

Figure 3 – Add a new Named Location using GPS coordinates

 

To learn more, check out admin documentation, Graph API documentation, and FAQ page.

 

Microsoft Authenticator Registration Campaign (Generally Available)

Using the Microsoft Authenticator Registration Campaign, you can now nudge your users to set up Authenticator and move away from less secure telephony methods. The feature targets users who are enabled for Microsoft Authenticator but have not set it up. Users are prompted to set up Authenticator after completing an MFA sign-in and after the set-up experience their default authentication method is changed to the Microsoft Authenticator app.

 

To learn how to enable a Registration Campaign for your users, click here.

 

enable Registration Campaign

 

We want to hear from you! Feel free to leave comments down below or reach out to us on aka.ms/AzureADFeedback.

Regards,

Alex Simons (@Alex_A_Simons)

Corporate VP of Program Management

Microsoft Identity Division

 

 

Learn more about Microsoft identity:

Updated Nov 23, 2021
Version 4.0

46 Comments

  • Hotzenwalder's avatar
    Hotzenwalder
    Brass Contributor

    When using the Additional Context for MFA I see the location where my IP address is registered for my provider, which is some datacenter elsewhere in the country instead of seeing my actual location based on GPS coordinates. I guess MFA looks at what IP address the login is initiated from. If someone tries to logon from the other side of the world it's quite obvious to the user that the login in not genuine and the MFA request should be rejected, but if a user is logging on from his workplace at the office or at home and gets a location that is probably referring to the location of the datacenter of ther internet provider they might get confused with the location being shown in the MFA request. 

    It is somehow possible to get a more accurate location. If I use https://iplocation.com/ I get a location in my hometown. If I use https://www.iplocation.net/ I get a location elsewhere based on my current internet provider. 

    Is it possible to get a accurate location with additional context? 

  • stitch777's avatar
    stitch777
    Copper Contributor

    Happy to participate with the beta Apple Watch app - Are there plans to add more functionality?  Looking to ditch my phone if Apple Watch App matures.

  • When can we search accounts to find an account that doesn’t do Approval prompt?

  • it only keeps getting better. Well done!

     

    Any idea when "Admins can now prevent accidental approvals in Microsoft Authenticator with number matching and additional context (Public Preview)" will be GA?. Had many users having their accounts getting compromised due to accidental approvals.

     

    Thanks,

    Jose

  • Sander de Wit's avatar
    Sander de Wit
    Brass Contributor

    When enabling the app context, it breaks the ability to unlock using an apple watch.

  • pber01's avatar
    pber01
    Copper Contributor

    Please give us the option to enable the App context but disable the Location/Map.