SOLVED

Have MFA request identify source of request - Android App

%3CLINGO-SUB%20id%3D%22lingo-sub-3040462%22%20slang%3D%22en-US%22%3EHave%20MFA%20request%20identify%20source%20of%20request%20-%20Android%20App%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3040462%22%20slang%3D%22en-US%22%3E%3CP%3EIssue%3A%20When%20MFA%20is%20required%2C%20pop%20up%20in%20Android%20only%20states%3A%3CBR%20%2F%3E%26nbsp%3BApprove%20Sign-in%3F%3CBR%20%2F%3ECompany%20name%3CBR%20%2F%3EUPN%3CBR%20%2F%3E%26nbsp%3B%20Deny%26nbsp%3B%20%26nbsp%3BApprove%3CBR%20%2F%3E%3CBR%20%2F%3EThere%20is%20no%20where%20indicating%20the%20app%2C%20IP%2C%20location%2C%20etc%20that%20is%20generating%20this%20request.%20This%20information%20would%20be%20helpful%20in%20knowing%20if%20a%20users%20account%20was%20compromised%2C%20IE%20why%20am%20I%20trying%20to%20sign%20in%20from%20France%2C%20when%20I'm%20in%20Canada.%3CBR%20%2F%3E%3CBR%20%2F%3EDesired%3A%20When%20MFA%20pop-up%20is%20presented%2C%20provide%20more%20details%20on%20the%20source%20of%20the%20MFA%20request%20to%20help%20user%20decide%20if%20the%20request%20is%20legitimate.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20get%20multiple%20MFA%20requests%20a%20week%20due%20to%20company%20security%20policy%2C%20it%20would%20be%20nice%20to%20know%20where%20the%20requests%20are%20getting%20generated%20from.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3040462%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAuthentication%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Emobile%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOffice%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3041360%22%20slang%3D%22en-US%22%3ERe%3A%20Have%20MFA%20request%20identify%20source%20of%20request%20-%20Android%20App%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3041360%22%20slang%3D%22en-US%22%3EThank%20you%20for%20the%20quick%20reply%2C%20will%20check%20out%20the%20Additional%20Context%20feature.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3041058%22%20slang%3D%22en-US%22%3ERe%3A%20Have%20MFA%20request%20identify%20source%20of%20request%20-%20Android%20App%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3041058%22%20slang%3D%22en-US%22%3EHi%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1060128%22%20target%3D%22_blank%22%3E%40sgu222e%3C%2FA%3E%2C%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%20for%20the%20feedback.%20Luckily%2C%20you%20were%20not%20the%20only%20one%20waiting%20for%20this%20feature.%3CBR%20%2F%3EThe%20good%20news%20is%20that%20Microsoft%20has%20released%20the%20Additional%20Context%20feature%2C%20which%20gives%20you%20more%20insight%20into%20the%20Application%20that%20triggered%20the%20MFA%20request%20and%20the%20location.%20Keep%20in%20mind%20that%20the%20feature%20is%20in%20Public%20Preview%20at%20the%20time%20of%20writing%2C%20which%20means%3B%20normal%20service%20level%20agreements%20do%20not%20apply.%3CBR%20%2F%3E%3CBR%20%2F%3EMore%20information%20about%20the%20feature%20and%20how%20to%20get%20started%20can%20be%20found%20in%20this%20tech%20article.%20Good%20luck!%20For%20now%2C%20have%20a%20lovely%20weekend!%3CBR%20%2F%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fnew-microsoft-authenticator-security-features-are-now-available%2Fba-p%2F2464386%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fnew-microsoft-authenticator-security-features-are-now-available%2Fba-p%2F2464386%3C%2FA%3E%3C%2FLINGO-BODY%3E
New Contributor

Issue: When MFA is required, pop up in Android only states:
 Approve Sign-in?
Company name
UPN
  Deny   Approve

There is no where indicating the app, IP, location, etc that is generating this request. This information would be helpful in knowing if a users account was compromised, IE why am I trying to sign in from France, when I'm in Canada.

Desired: When MFA pop-up is presented, provide more details on the source of the MFA request to help user decide if the request is legitimate. 

 

I get multiple MFA requests a week due to company security policy, it would be nice to know where the requests are getting generated from. 

2 Replies
best response confirmed by sgu222e (New Contributor)
Solution
Hi @sgu222e,

Thanks for the feedback. Luckily, you were not the only one waiting for this feature.
The good news is that Microsoft has released the Additional Context feature, which gives you more insight into the Application that triggered the MFA request and the location. Keep in mind that the feature is in Public Preview at the time of writing, which means; normal service level agreements do not apply.

More information about the feature and how to get started can be found in this tech article. Good luck! For now, have a lovely weekend!

https://techcommunity.microsoft.com/t5/azure-active-directory-identity/new-microsoft-authenticator-s...
Thank you for the quick reply, will check out the Additional Context feature.