Introducing password removal for Microsoft Accounts

Published Sep 15 2021 06:00 AM 81.7K Views
Microsoft

Common attacks such as phishing, password spray, and credential stuffing rely on one unchanging truth: when it comes to passwords, human behavior is predictable. Armed with this predictability, bad actors still succeed most of time when attempting these types of attacks, even though the tools they’re using are 30 years old.

 

Starting today, we’re excited to announce that anyone using a consumer Microsoft account can go completely passwordless! You can now delete your password from your Microsoft account—or set up a new account with no password—and sign-in using other more secure and convenient authentication methods such as the Microsoft Authenticator app, Windows Hello, or physical security keys.

 

All it takes is three easy steps: Visit Advanced Security Options for your Microsoft account, select Passwordless Account, then follow the on-screen prompts. That’s it! Once you’ve removed your password, you can sign in to your account by approving a notification from the Microsoft Authenticator app.

 

Successful password removal.JPG

 

Passwordless1.JPG

 

In The passwordless future is here post, Vasu Jakkal explains in detail why signing in without a password is faster, easier, and more secure. Best of all, once your password is gone, you can finally forget it for good!

 

Passwords leave enterprises vulnerable

Since attackers only need a single password to breach an account and start infiltrating an organization, it’s alarming that one in 100 people “protect” a critical account with easily guessed passwords. The most common passwords from 2011, such as 123456, abc123, and iloveyou, are still on the list of top 20 (worst) passwords!

 

In the past decade, the industry has championed two-step verification, which can reduce the risk of compromise by 99.9%. Verifying identity with a password plus an additional factor has helped, but hackers are already starting to bypass the second step. As long as passwords are still part of the equation, they’re vulnerable.

 

Bringing passwordless technology to you

A couple of years ago, we shared a four-step approach to ending the era of passwords for organizations:

 

Bringing passwordless technology to you.png

 

Our identity product team has been singularly focused on this goal, collaborating with product teams across Microsoft and with the standards community toward eliminating passwords from the directory. And we’ve made tremendous progress.

 

Join us on October 13th for Your Passwordless Future Starts Now digital event, where Vasu, members of my team, and experts across Microsoft will share insights and best practices for building a passwordless future. It's 90 minutes you won't want to miss!

 

What’s next

We’re continually innovating to bring passwordless options to more customers. In addition to building new and exciting ways to sign in without a password, we’ll soon start the development work necessary to eliminate passwords for Azure AD accounts. Administrators will be able to choose whether passwords are required, allowed, or simply don’t exist for a set of users. Users will be able to choose not to set a password when creating an account or to remove their password from an existing account.

 

As we continue to build a passwordless future, your feedback will be invaluable. Please share your questions and comments at answers.microsoft.com.

 

 

Learn more about Microsoft identity:

20 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-2752709%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20password%20removal%20for%20Microsoft%20accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2752709%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20any%20way%20to%20block%20Microsoft%20Accounts%20from%20being%20created%20on%20your%20company%20domain%20yet%3F%26nbsp%3B%3CBR%20%2F%3ESo%20that%20you%20can%20prevent%20your%20employees%20from%20accidentally%20making%20a%20%22Personal%22%20Microsoft%20Account%20on%20their%20Company%20Email%20address%2C%20and%20making%20their%20life%20confusing%20a%20lot%20of%20the%20time%20when%20they%20sign%20in%3F%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20can%20help%20find%20existing%20MSA%20Accounts%20on%20your%20Company%20domain%2C%20but%20not%20prevent%20new%20ones%20-%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fsysmansquad.com%2F2020%2F11%2F23%2Ffind-microsoft-accounts%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EFind%20Microsoft%20Accounts%20on%20Company%20Domains%3C%2FA%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22two-buttons-sideways_white-768x288.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310590i96170367FCB053E0%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22two-buttons-sideways_white-768x288.png%22%20alt%3D%22two-buttons-sideways_white-768x288.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CDIV%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2753060%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20password%20removal%20for%20Microsoft%20accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2753060%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F671742%22%20target%3D%22_blank%22%3E%40PsychoData%3C%2FA%3E%26nbsp%3BWhen%20you%20link%20a%20company%20domain%20name%20as%20managed%20one%20to%20a%20Azure%20AD%20tenant%2C%20then%20users%20should%20not%20be%20able%20to%20create%20personal%20MSA%20using%20that%20domain%20name.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22VladimrMach_0-1631717438226.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310608iBA1A754A703B9D61%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22VladimrMach_0-1631717438226.png%22%20alt%3D%22VladimrMach_0-1631717438226.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2747280%22%20slang%3D%22en-US%22%3EStarting%20today%3A%20password%20removal%20for%20Microsoft%20accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2747280%22%20slang%3D%22en-US%22%3E%3CP%3ECommon%20attacks%20such%20as%20phishing%2C%20password%20spray%2C%20and%20credential%20stuffing%20rely%20on%20one%20unchanging%20truth%3A%20when%20it%20comes%20to%20passwords%2C%20human%20behavior%20is%20predictable.%20Armed%20with%20this%20predictability%2C%20bad%20actors%20still%20succeed%20most%20of%20time%20when%20attempting%20these%20types%20of%20attacks%2C%20even%20though%20the%20tools%20they%E2%80%99re%20using%20are%2030%20years%20old.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EToday%20we%E2%80%99re%20excited%20to%20announce%20that%20anyone%20using%20a%20consumer%20Microsoft%20account%20can%20go%20completely%20passwordless!%20You%20can%20now%20delete%20your%20password%20from%20your%20Microsoft%20account%E2%80%94or%20set%20up%20a%20new%20account%20with%20no%20password%E2%80%94and%20sign-in%20using%20other%20more%20secure%20and%20convenient%20authentication%20methods%20such%20as%20the%20Microsoft%20Authenticator%20app%2C%20Windows%20Hello%2C%20or%20physical%20security%20keys.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAll%20it%20takes%20is%20three%20easy%20steps%3A%20Visit%20%3CA%20href%3D%22https%3A%2F%2Faccount.live.com%2Fproofs%2Fmanage%2Fadditional%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAdvanced%20Security%20Options%3C%2FA%3E%20for%20your%20Microsoft%20account%2C%20select%20%3CSTRONG%3EPasswordless%20Account%3C%2FSTRONG%3E%2C%20then%20follow%20the%20on-screen%20prompts.%20That%E2%80%99s%20it!%20Once%20you%E2%80%99ve%20removed%20your%20password%2C%20you%20can%20sign%20in%20to%20your%20account%20by%20approving%20a%20notification%20from%20the%20Microsoft%20Authenticator%20app.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Successful%20password%20removal.JPG%22%20style%3D%22width%3A%20703px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310420iD86DBCA0D75F0D58%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Successful%20password%20removal.JPG%22%20alt%3D%22Successful%20password%20removal.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Passwordless1.JPG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310421iF4509477F683BDE3%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Passwordless1.JPG%22%20alt%3D%22Passwordless1.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F09%2F15%2Fthe-passwordless-future-is-here-for-your-microsoft-account%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EThe%20passwordless%20future%20is%20here%3C%2FA%3E%20post%2C%20Vasu%20Jakkal%20explains%20in%20detail%20why%20signing%20in%20without%20a%20password%20is%20faster%2C%20easier%2C%20and%20more%20secure.%20Best%20of%20all%2C%20once%20your%20password%20is%20gone%2C%20you%20can%20finally%20forget%20it%20for%20good!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-2144732931%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%20id%3D%22toc-hId-2145511315%22%3E%3CSTRONG%3EPasswords%20leave%20enterprises%20vulnerable%20%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3ESince%20attackers%20only%20need%20a%20single%20password%20to%20breach%20an%20account%20and%20start%20infiltrating%20an%20organization%2C%20it%E2%80%99s%20alarming%20that%20one%20in%20100%20people%20%E2%80%9Cprotect%E2%80%9D%20a%20critical%20account%20with%20easily%20guessed%20passwords.%20The%20most%20common%20passwords%20from%202011%2C%20such%20as%20%3CEM%3E123456%3C%2FEM%3E%2C%20%3CEM%3Eabc123%3C%2FEM%3E%2C%20and%20%3CEM%3Eiloveyou%3C%2FEM%3E%2C%20are%20%3CEM%3Estill%3C%2FEM%3E%20on%20the%20list%20of%20top%2020%20(worst)%20passwords!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20the%20past%20decade%2C%20the%20industry%20has%20championed%20two-step%20verification%2C%20which%20can%20reduce%20the%20risk%20of%20compromise%20by%2099.9%25.%20Verifying%20identity%20with%20a%20password%20plus%20an%20additional%20factor%20has%20helped%2C%20but%20hackers%20are%20already%20starting%20to%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fall-your-creds-are-belong-to-us%2Fba-p%2F855124%23%3A~%3Atext%3DAll%2520Authenticators%2520Are%2520Vulnerable%2520%2520%2520Credential%2520%2Cindicates%2520approva%2520...%2520%252013%2520more%2520rows%2520%22%20target%3D%22_blank%22%3Ebypass%20the%20second%20step%3C%2FA%3E.%20As%20long%20as%20passwords%20are%20still%20part%20of%20the%20equation%2C%20they%E2%80%99re%20vulnerable.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-337278468%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%20id%3D%22toc-hId-338056852%22%3E%3CSTRONG%3EBringing%20passwordless%20technology%20to%20you%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EA%20couple%20of%20years%20ago%2C%20we%20shared%20a%20four-step%20approach%20to%20ending%20the%20era%20of%20passwords%20for%20organizations%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Bringing%20passwordless%20technology%20to%20you.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310145i1D1B5BA0869BCF63%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Bringing%20passwordless%20technology%20to%20you.png%22%20alt%3D%22Bringing%20passwordless%20technology%20to%20you.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOur%20identity%20product%20team%20has%20been%20singularly%20focused%20on%20this%20goal%2C%20collaborating%20with%20product%20teams%20across%20Microsoft%20and%20with%20the%20standards%20community%20toward%20eliminating%20passwords%20from%20the%20directory.%20And%20we%E2%80%99ve%20made%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F12%2F17%2Fa-breakthrough-year-for-passwordless-technology%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Etremendous%20progress%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EJoin%20us%20on%20October%2013th%20for%20%3CA%20href%3D%22https%3A%2F%2Fpasswordlessfuturedigitalevent.eventcore.com%2Fauth%2Flogin%3Focid%3DAID3037729_QSG_542099%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EYour%20Passwordless%20Future%20Starts%20Now%3C%2FA%3E%20digital%20event%2C%20where%20Vasu%2C%20members%20of%20my%20team%2C%20and%20experts%20across%20Microsoft%20will%20share%20insights%20and%20best%20practices%20for%20building%20a%20passwordless%20future.%20It's%2090%20minutes%20you%20won't%20want%20to%20miss!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1470175995%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%20id%3D%22toc-hId--1469397611%22%3E%3CSTRONG%3EWhat%E2%80%99s%20next%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EWe%E2%80%99re%20continually%20innovating%20to%20bring%20passwordless%20options%20to%20more%20customers.%20In%20addition%20to%20building%20new%20and%20exciting%20ways%20to%20sign%20in%20without%20a%20password%2C%20we%E2%80%99ll%20soon%20start%20the%20development%20work%20necessary%20to%20eliminate%20passwords%20for%20Azure%20AD%20accounts.%20Administrators%20will%20be%20able%20to%20choose%20whether%20passwords%20are%20required%2C%20allowed%2C%20or%20simply%20don%E2%80%99t%20exist%20for%20a%20set%20of%20users.%20Users%20will%20be%20able%20to%20choose%20not%20to%20set%20a%20password%20when%20creating%20an%20account%20or%20to%20remove%20their%20password%20from%20an%20existing%20account.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20we%20continue%20to%20build%20a%20passwordless%20future%2C%20your%20feedback%20will%20be%20invaluable.%20Please%20share%20your%20questions%20and%20comments%20at%20answers.microsoft.com.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3ELearn%20more%20about%20Microsoft%20identity%3A%3C%2FEM%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CEM%3EReturn%20to%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fbg-p%2FIdentity%22%20target%3D%22_blank%22%3E%3CEM%3EAzure%20Active%20Directory%20Identity%20blog%20home%3C%2FEM%3E%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EJoin%20the%20conversation%20on%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2Fazuread%2Fstatus%2F1278418103903363074%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ETwitter%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%20and%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ELinkedIn%3C%2FEM%3E%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EShare%20product%20suggestions%20on%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ffeedback.azure.com%2Fforums%2F169401-azure-active-directory%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3EAzure%20Feedback%20Forum%3C%2FEM%3E%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2747280%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20can%20now%20delete%20your%20password%20from%20your%20Microsoft%20account%E2%80%94or%20set%20up%20a%20new%20account%20with%20no%20password!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Successful%20password%20removal.JPG%22%20style%3D%22width%3A%20703px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310422i7B844A9A3A7C9FBE%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Successful%20password%20removal.JPG%22%20alt%3D%22Successful%20password%20removal.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2747280%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EProduct%20Announcements%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2753218%22%20slang%3D%22en-US%22%3ERe%3A%20Announcing%20password%20removal%20for%20Microsoft%20accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2753218%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F219999%22%20target%3D%22_blank%22%3E%40Vladim%C3%ADr%20Mach%3C%2FA%3E%26nbsp%3BInteresting%20-%20that%20must%20be%20fairly%20new!%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20definitely%20used%20to%20be%20possible%20-%20because%20I%20got%20these%20screenshots%20by%20signing%20up%20for%20like%206%20Microsoft%20Accounts%20on%20Company%20Domains%20in%20a%20lab%20environment%20with%20a%20work%20email%20address%20before.%26nbsp%3B%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EAny%20idea%20when%20that%20happened%20or%20a%20post%20explaining%20the%20changes%20or%20anywhere%20that%20you%20can%20manage%20this%20setting%3F%26nbsp%3B%3C%2FP%3E%3CP%3EAlso%20-%20did%20this%20blocking%20do%20anything%20for%20existing%20Microsoft%20Accounts%20on%20Company%20domain%20names%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2753607%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2753607%22%20slang%3D%22en-US%22%3E%3CP%3EInteresting%2C%20there%20must%20be%20a%20delay%20of%20some%20sort%20before%20it%20will%20recognize%20it%20as%20a%20verified%20domain.%26nbsp%3B%3C%2FP%3E%3CP%3EI%20frequently%20remove%20and%20add%20several%20of%20my%20test%20domains%20to%20demo%20and%20test%20tenants%2C%20so%20maybe%20it%20wasn't%20recognized%20as%20a%20%22current%20work%20domain%22%20and%20it%20let%20me%20register%20my%20test%20accounts.%26nbsp%3B%3C%2FP%3E%3CP%3EThanks!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2754367%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2754367%22%20slang%3D%22en-US%22%3E%3CP%3EYes%20they%20have%20introduced%20a%20new%20blocker%20that%20prevent%20new%20home%20accounts%20with%20Domains%20that%20are%20known%20in%20Azure.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20appreciate%20the%20passwordless%20strategy.%20Also%20like%20that%20Windows%20Hello%20is%20now%20also%20accepted%20for%20local%20UAC.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOne%20thing%20you%20should%20help%20to%20improve%20soon.%20Please%20allow%20hello%20secure%20key%20for%20passwordless%20login%20in%20workgroups%20%2F%20home%20accounts.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20works%20now%20complementary%20for%20OOBE%20in%20Windows%2010%20and%2011%20but%20not%20as%20a%20login%20method%20as%20of%20Windows%20Hello%20secure%20key.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20is%20only%20possible%20for%20enterprise%20customers.%20If%20people%20could%20use%20their%20FIDO2%20device%20at%20home%2C%20instead%20of%20a%20password%20this%20would%20bring%20things%20to%20a%20better%20Level%20of%20acceptance.%20Yubikey%20has%20very%20good%20offers%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F532694%22%20target%3D%22_blank%22%3E%40Joy_Chik%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20security%20key%20for%20hello%20currently%20works%20for%20home%20users%20only%20for%20web%20authentication%20not%20for%20Windows%20login.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20should%20be%20changed%20soon.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2754702%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2754702%22%20slang%3D%22en-US%22%3E%3CBLOCKQUOTE%3E%3CP%3EStarting%20today%2C%20we%E2%80%99re%20excited%20to%20announce%20that%20anyone%20using%20a%20consumer%20Microsoft%20account%20can%20go%20completely%20passwordless!%20You%20can%20now%20delete%20your%20password%20from%20your%20Microsoft%20account%E2%80%94%3CSTRONG%3Eor%20set%20up%20a%20new%20account%20with%20no%20password%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FBLOCKQUOTE%3E%3CP%3EPasswordless%20MSA%20creation%20has%20been%20available%20for%20a%20long%20time%20on%20iOS%20and%20Android.%20What's%20exactly%20new%20here%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F532694%22%20target%3D%22_blank%22%3E%40Joy_Chik%3C%2FA%3E%26nbsp%3B%3FWindows%20maybe%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2754787%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2754787%22%20slang%3D%22en-US%22%3E%3CP%3Esad%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Screenshot%202021-09-16%20105539.png%22%20style%3D%22width%3A%20448px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310724iC533443E28221BB7%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Screenshot%202021-09-16%20105539.png%22%20alt%3D%22Screenshot%202021-09-16%20105539.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2753560%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2753560%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F671742%22%20target%3D%22_blank%22%3E%40PsychoData%3C%2FA%3E%26nbsp%3BCreating%20new%20Microsoft%20Accounts%20using%20Azure%20AD%20managed%20domains%20was%20disabled%20back%20in%202016.%20(Yay!)%20The%20following%20is%20a%202018%20repost%20of%20the%20original%202016%20article.%26nbsp%3B%20See%20the%20section%20that%20states%2C%20%22%3CSPAN%3EStarting%20today%2C%20we're%20blocking%20the%20ability%20to%20create%20a%20new%20personal%20Microsoft%20account%20using%20a%20work%2Fschool%20email%20address%2C%20when%20the%20email%20domain%20is%20configured%20in%20Azure%20AD.%22%3C%2FSPAN%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-active-directory-identity%2Fcleaning-up-the-azuread-and-microsoft-account-overlap%2Fba-p%2F245105%22%20target%3D%22_blank%22%3ECleaning%20up%20the%20%23AzureAD%20and%20Microsoft%20account%20overlap%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2755051%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2755051%22%20slang%3D%22en-US%22%3E%3CP%3EMy%20Live%20account%20is%20no%20longer%20prompting%20for%20a%20password%2C%20rather%20going%20straight%20to%20the%20Authenticator%2C%20WITHOUT%20making%20any%20changes.%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20this%20the%20intended%20behaviour%3F%3C%2FP%3E%3CP%3EIn%20what%20way%20is%20this%202FA%2C%20when%20it's%20ONLY%20the%20Authenticator%3F%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Recce2070_0-1631774426614.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310745i9E07035C4615CB5C%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Recce2070_0-1631774426614.png%22%20alt%3D%22Recce2070_0-1631774426614.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2755373%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2755373%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1157444%22%20target%3D%22_blank%22%3E%40Recce2070%3C%2FA%3E%26nbsp%3BOnly%20using%20your%20Authenticator%20App%20is%20indeed%20two%20factor%20authN.%3C%2FP%3E%3CP%3E1.%20Something%20you%20have%20%3D%20your%20Phone%3C%2FP%3E%3CP%3E2.%20Something%20your%20know%20%2F%20or%20are%20%3D%20PIN%20to%20unlock%20your%20phone%20to%20access%20the%20Authenticator%20App%20or%20using%20biometrics%20like%20fingerprint%20or%20facial%20recognition%20(FaceID)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETherefore%20two%20factor%20does%20not%20always%20need%20to%20involve%20a%20password.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2755802%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2755802%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3EI%20just%20tried%20this%20new%20feature.%20I%20noticed%20that%20if%20you%20remove%20your%20password%20you%20must%20enter%20a%20secondary%20email%20and%20a%20mobile%20phone%20number.%20This%20to%20two%20methods%2C%20even%20combined%2C%20cannot%20be%20considered%20secure%20method%20of%20authentication.%20There's%20no%20guarantee%20that%20the%20secondary%20mail%20is%20protected%20with%20secure%20password%20and%20MFA.%20Same%20thing%20with%20the%20SMS%20(SIM%20swapping%20or%20SS7%20attack).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWith%20no%20password%20cofigured%20in%20my%20account%20I%20try%20lo%20login.%20Microsoft%20will%20send%20a%20code%20to%20my%20secondary%20mail%20and%20a%20second%20code%20(if%20you%20use%202FA)%20via%20SMS%2C%20then%20you%20are%20ask%20to%20set%20a%20password%20for%20your%20account.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERight%20now%20is%20not%20possibile%20to%20login%20only%20using%20strong%20authentication%20mechanism%20(Security%20Keys%2C%20Authenticator%20or%20Windows%20Hello)%20you%20must%20have%20some%20sort%20of%20%22insecure%22%20fallback%20method%20(SMS%2C%20alternative%20email%20or%20password).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2756598%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2756598%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F219999%22%20target%3D%22_blank%22%3E%40Vladim%C3%ADr%20Mach%3C%2FA%3E%26nbsp%3BNo%20new%20MSAs%2C%20however%2C%20there's%20no%20good%20story%20for%20the%20existing%20MSAs%20which%20got%20created%20in%20the%20past.%20This%20leads%20to%20customer%20confusion%20and%20loss%20of%20data.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20recently%20had%20a%20scenario%20where%20the%20customer%20got%20locked%20out%20of%20their%20device%20due%20to%20bitlocker%2C%20and%20didn't%20realize%20they%20needed%20to%20check%20their%20MSA%20for%20the%20recovery%20key%20because%20they%20understandably%20thought%20they%20would%20have%20only%20a%20single%20%22Microsoft%22%20account%20with%20a%20given%20UPN%20and%20checking%20Azure%20AD%20for%20the%20recovery%20key%20was%20the%20only%20place%20to%20look.%20They%20ended%20up%20reformatting%20the%20device%2C%20losing%20data%2C%20only%20to%20learn%20after%20the%20fact%20that%20the%20recovery%20key%20was%20available%20in%20their%20MSA.%20This%20was%20preventable%2C%20if%20only%20we%20had%20a%20good%20option%20to%20get%20customers%20to%20rename%20their%20MSAs%20with%20a%20UPN%20in%20our%20domain.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20understand%20that%20Microsoft%20no%20longer%20has%20the%20%22eviction%22%20option%20which%20it%20provided%20~8%20years%20ago%20for%20this%20scenario%2C%20due%20to%20legal%20reasons.%20However%2C%20I%20can%20imagine%20other%20engineering%20approaches%20which%20would%20be%20similar%20but%20not%20run%20afoul%20of%20the%20legal%20issues.%20Why%20not%20allow%20an%20organization%20to%20trigger%20a%20one-time%20notice%20at%20next%20sign%20in%20which%20informs%20owners%20of%20MSAs%20with%20a%20UPN%20in%20their%20domain%20that%20there%20are%20significant%20risks%20due%20to%20confusion%20and%20they%20should%20strongly%20consider%20renaming%20their%20account%2C%20along%20with%20an%20easy%20process%20to%20do%20that%3F%20In%20that%20solution%2C%20the%20owner%20of%20the%20MSA%20has%20a%20choice%2C%20but%20they%20are%20presented%20with%20a%20strong%20recommendation%20which%20is%20clearly%20from%20a%20trusted%20source%20embedded%20in%20the%20sign%20in%20process.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBrian%20Arkills%3CBR%20%2F%3EUniversity%20of%20Washington%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2770153%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2770153%22%20slang%3D%22en-US%22%3E%3CBLOCKQUOTE%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F326808%22%20target%3D%22_blank%22%3E%40barkills%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3E%3CSPAN%3Ehad%20a%20good%20option%20to%20get%20customers%20to%20rename%20their%20MSAs%20with%20a%20UPN%20in%20our%20domain%3C%2FSPAN%3E%3C%2FP%3E%3C%2FBLOCKQUOTE%3E%3CP%3EYeah%2C%20this%20kind%20of%20process%20is%20what%20I%20was%20seeing%20-%20only%20with%20mine%20it%20was%20often%20customers%20mistakenly%20buying%20multiple%20extra%20copies%20of%20MS%20Office%20because%20they%20didn't%20realize%20they%20were%20already%20paid%20for%20under%20the%20%22Work%22%20account%20instead%20of%20%22Personal%22.%3CBR%20%2F%3E%3CBR%20%2F%3EIt%20isn't%20something%20offered%20from%20MS's%20side%2C%20but%20I%20did%20this%20to%20find%20the%20current%20people%20with%20Microsoft%20Accounts%20so%20that%20I%20could%20make%20tickets%20for%20HelpDesk%20to%20*cough*%20assist%20them%20in%20moving%20to%20a%20non-company%20email%20address%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fsysmansquad.com%2F2020%2F11%2F23%2Ffind-microsoft-accounts%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EFind%20Microsoft%20Accounts%20on%20Company%20Domains%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2782614%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2782614%22%20slang%3D%22en-US%22%3E%3CP%3EWhen%20will%20Microsoft%20Authenticator%20be%20available%20in%20the%20Microsoft%20Store%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2798231%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2798231%22%20slang%3D%22en-US%22%3E%3CP%3EI%20made%20my%20Live%20account%20passwordless%20(no%20problems%20there)%20but%20now%20I'm%20unable%20to%20use%20RDP%20to%20remote%20onto%20a%20test%20machine%20setup%20against%20that%20same%20account.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2837441%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2837441%22%20slang%3D%22en-US%22%3E%3CP%3EIt's%20great%20to%20be%20passwordless%20however%20how%20long%20before%20I%20can%20use%20my%20Microsoft%20Authenticator%20to%20log%20me%20into%20any%20machines%20I%20may%20have%20connected%20to%20my%20Microsoft%20Account%20given%20I%20don't%20have%20a%20'password'%20now.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2845698%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2845698%22%20slang%3D%22en-US%22%3E%3CP%3EMy%20test%20box%20and%20home%20machine%20are%20both%20only%20setup%20with%20MSA%20login%2C%20so%20no%20option%20of%20Domain%2FM3656%20login.%26nbsp%3B%20RDP%20only%20works%20as%20I've%20setup%20a%20new%20local%20account%20with%20a%20password%2C%20but%20I'd%20rather%20still%20RDP%20using%20my%20MSA%2C%20as%20that%20is%20where%20my%20data%2Fprofile%20is%20stored.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2755287%22%20slang%3D%22en-US%22%3ERe%3A%20Introducing%20password%20removal%20for%20Microsoft%20Accounts%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2755287%22%20slang%3D%22en-US%22%3E%3CP%3EHow%20would%20this%20work%20for%20(for%20example)%20RDP%20that's%20reliant%20on%20a%20password%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Sep 15 2021 08:20 AM
Updated by: