Configure app passwords for Microsoft Entra multifactor authentication - Microsoft Entra ID (2024)

  • Article

Some older, non-browser apps like Office 2010 or earlier and Apple Mail before iOS 11 don't understand pauses or breaks in the authentication process. A Microsoft Entra multifactor authentication (Microsoft Entra multifactor authentication) user who attempts to sign in to one of these older, non-browser apps, can't successfully authenticate. To use these applications in a secure way with Microsoft Entra multifactor authentication enforced for user accounts, you can use app passwords. These app passwords replaced your traditional password to allow an app to bypass multifactor authentication and work correctly.

Modern authentication is supported for the Microsoft Office 2013 clients and later. Office 2013 clients, including Outlook, support modern authentication protocols and can work with two-step verification. After Microsoft Entra multifactor authentication is enforced, app passwords aren't required for the client.

This article shows you how to use app passwords for legacy applications that don't support multifactor authentication prompts.

Note

App passwords don't work for accounts that are required to use modern authentication.

Overview and considerations

When a user account is enforced for Microsoft Entra multifactor authentication, the regular sign-in prompt is interrupted by a request for additional verification. Some older applications don't understand this break in the sign-in process, so authentication fails. To maintain user account security and leave Microsoft Entra multifactor authentication enforced, app passwords can be used instead of the user's regular username and password. When an app password used during sign-in, there's no additional verification prompt, so authentication is successful.

App passwords are automatically generated, not specified by the user. This automatically generated password makes it harder for an attacker to guess, so is more secure. Users don't have to keep track of the passwords or enter them every time as app passwords are only entered once per application.

When you use app passwords, the following considerations apply:

  • There's a limit of 40 app passwords per user.
  • Applications that cache passwords and use them in on-premises scenarios can fail because the app password isn't known outside the work or school account. An example of this scenario is Exchange emails that are on-premises, but the archived mail is in the cloud. In this scenario, the same password doesn't work.
  • After Microsoft Entra multifactor authentication is enforced on a user's account, app passwords can be used with most non-browser clients like Outlook and Microsoft Skype for Business. However, administrative actions can't be performed by using app passwords through non-browser applications, such as Windows PowerShell. The actions can't be performed even when the user has an administrative account.
    • To run PowerShell scripts, create a service account with a strong password and don't enforced the account for two-step verification.
  • If you suspect that a user account is compromised and revoke / reset the account password, app passwords should also be updated. App passwords aren't automatically revoked when a user account password is revoked / reset. The user should delete existing app passwords and create new ones.
    • For more information, see Create and delete app passwords from the Additional security verification page.

Warning

App passwords don't work in hybrid environments where clients communicate with both on-premises and cloud auto-discover endpoints. Domain passwords are required to authenticate on-premises. App passwords are required to authenticate with the cloud.

App password names

App password names should reflect the device on which they're used. If you have a laptop that has non-browser applications like Outlook, Word, and Excel, create one app password named Laptop for these apps. Create another app password named Desktop for the same applications that run on your desktop computer.

It's recommended to create one app password per device, rather than one app password per application.

Federated or single sign-on app passwords

Microsoft Entra ID supports federation, or single sign-on (SSO), with on-premises Active Directory Domain Services (AD DS). If your organization is federated with Microsoft Entra ID and you're using Microsoft Entra multifactor authentication, the following app password considerations apply:

Note

The following points apply only to federated (SSO) customers.

  • App passwords are verified by Microsoft Entra ID, and therefore, bypass federation. Federation is actively used only when setting up app passwords.
  • The Identity Provider (IdP) is not contacted for federated (SSO) users, unlike the passive flow. The app passwords are stored in the work or school account. If a user leaves the company, the user's information flows to the work or school account by using DirSync in real time. The disable / deletion of the account can take up to three hours to synchronize, which can delay the disable / deletion of the app password in Microsoft Entra ID.
  • On-premises client Access Control settings aren't honored by the app passwords feature.
  • No on-premises authentication logging or auditing capability is available with the app passwords feature.

Some advanced architectures require a combination of credentials for multifactor authentication with clients. These credentials can include a work or school account username and passwords, and app passwords. The requirements depend on how the authentication is performed. For clients that authenticate against an on-premises infrastructure, a work or school account username and password a required. For clients that authenticate against Microsoft Entra ID, an app password is required.

For example, suppose you have the following architecture:

  • Your on-premises instance of Active Directory is federated with Microsoft Entra ID.
  • You use Exchange online.
  • You use Skype for Business on-premises.
  • You use Microsoft Entra multifactor authentication.

In this scenario, you use the following credentials:

  • To sign in to Skype for Business, use your work or school account username and password.
  • To access the address book from an Outlook client that connects to Exchange online, use an app password.

Allow users to create app passwords

Tip

Steps in this article might vary slightly based on the portal you start from.

By default, users can't create app passwords. The app passwords feature must be enabled before users can use them. To give users the ability to create app passwords, admin needs to complete the following steps:

  1. Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.

  2. Browse to Conditional Access > Named locations.

  3. Click on "Configure MFA trusted IPs" in the bar across the top of the Conditional Access | Named Locations window.

  4. On the Multifactor authentication page, select the Allow users to create app passwords to sign in to non-browser apps option.

    Configure app passwords for Microsoft Entra multifactor authentication - Microsoft Entra ID (1)

Note

When you disable the ability for users to create app passwords, existing app passwords continue to work. However, users can't manage or delete those existing app passwords once you disable this ability.

When you disable the ability to create app passwords, it's also recommended to create a Conditional Access policy to disable the use of legacy authentication. This approach prevents existing app passwords from working, and forces the use of modern authentication methods.

Create an app password

When users complete their initial registration for Microsoft Entra multifactor authentication, there's an option to create app passwords at the end of the registration process.

Users can also create app passwords after registration. For more information and detailed steps for your users, see the following resource:

  • Create app passwords from the Security info page

Next steps

  • For more information on how to allow users to quickly register for Microsoft Entra multifactor authentication, see Combined security information registration overview.
  • For more information about enabled and enforced user states for Microsoft Entra multifactor authentication, see Enable per-user Microsoft Entra multifactor authentication to secure sign-in events

I'm an expert in Microsoft Entra multifactor authentication and related security protocols. My expertise is grounded in a thorough understanding of authentication processes, legacy applications, app passwords, and considerations associated with modern authentication. I have hands-on experience dealing with multifactor authentication implementations and troubleshooting scenarios.

In the provided article dated 10/23/2023, several key concepts are discussed:

  1. Legacy Applications and Authentication Breaks:

    • Older, non-browser apps like Office 2010 or earlier and pre-iOS 11 Apple Mail may not comprehend pauses in the authentication process.
    • Users of these apps, when subject to Microsoft Entra multifactor authentication, may face authentication failure.
  2. App Passwords for Legacy Applications:

    • To secure the use of legacy applications with Microsoft Entra multifactor authentication, app passwords are introduced.
    • These app passwords replace traditional passwords for legacy apps, allowing them to bypass multifactor authentication.
  3. Modern Authentication Support:

    • Microsoft Office 2013 clients and later, including Outlook, support modern authentication protocols and two-step verification.
    • With modern authentication support, app passwords are not required for the client.
  4. Considerations for App Passwords:

    • Users are limited to 40 app passwords per user.
    • Applications relying on cached passwords in on-premises scenarios may face issues.
    • Administrative actions can't be performed via non-browser applications, like Windows PowerShell, using app passwords.
  5. Security Measures and Updates:

    • App passwords are automatically generated for enhanced security.
    • In case of a compromised user account, both the account password and app passwords should be updated.
  6. Hybrid Environments:

    • App passwords may not work in hybrid environments where clients communicate with both on-premises and cloud auto-discover endpoints.
    • Domain passwords are required for on-premises authentication, while app passwords are needed for cloud authentication.
  7. Federated or Single Sign-On App Passwords:

    • Considerations for organizations using federated (SSO) setups with Microsoft Entra ID.
  8. Advanced Architectures and Credential Combinations:

    • Multifactor authentication in complex scenarios may involve a combination of work/school account credentials and app passwords.
  9. User-Generated App Passwords:

    • Users need administrative permission to create app passwords.
    • Admins can enable users to create app passwords via the Microsoft Entra admin center.
  10. Next Steps:

    • Additional information on enabling users for Microsoft Entra multifactor authentication and managing user states.

In summary, this article provides comprehensive guidance on utilizing app passwords for legacy applications, understanding authentication intricacies, and securing user accounts in multifactor authentication environments.

Configure app passwords for Microsoft Entra multifactor authentication - Microsoft Entra ID (2024)

FAQs

How do I add an app password to Microsoft authenticator? ›

How to create a new app password
  1. Go to the Security basics page and sign in to your Microsoft account.
  2. Select More security options.
  3. Under App passwords, select Create a new app password. ...
  4. Enter this app password where you would enter your normal Microsoft account password in the application.

What is Microsoft Entra ID in the authenticator app? ›

Microsoft Entra ID lets you choose which authentication methods can be used during the sign-in process. Users then register for the methods they'd like to use. The Microsoft Authenticator authentication method policy manages both the traditional push MFA method and the passwordless authentication method.

How to configure the Microsoft Entra Multifactor authentication registration policy? ›

Policy configuration
  1. Sign in to the Microsoft Entra admin center as at least a Security Administrator.
  2. Browse to Protection > Identity Protection > MFA registration policy. Under Assignments > Users. Under Include, select All users or Select individuals and groups if limiting your rollout. ...
  3. Enforce Policy - On.
  4. Save.
Oct 23, 2023

Which choice correctly describes Microsoft Entra ID? ›

Microsoft Entra ID is Microsoft's cloud-based identity and access management solution that connects people to their apps, devices, and data.

How to set an app password? ›

How to password protect apps on Android. While there are no built-in or native ways to password protect apps on Android, you can: Use “Screen Pinning” to lock an open app so users can't navigate away from it. Add apps to your “Secure Folder” on a Samsung device.

How to enable app passwords in Office 365? ›

To create app passwords using the Office 365 portal
  1. Sign in to your work or school account, go to the My Account page, and select Security info.
  2. Select Add method, choose App password from the list, and then select Add.
  3. Enter a name for the app password, and then select Next.

Where can I find my Entra ID? ›

Sign in to the Microsoft Entra admin center as at least a Global Reader. Browse to Identity > Overview > Properties. Scroll down to the Tenant ID section and you can find your tenant ID in the box.

How to login to Microsoft Entra ID? ›

Access Microsoft Entra ID
  1. Go to portal.azure.com and sign in with your work or student account.
  2. In the left navigation pane in the Azure portal, click Microsoft Entra ID. The Microsoft Entra ID admin center is displayed.
Oct 20, 2023

How does Microsoft Entra ID work? ›

App developers can use Microsoft Entra ID as a standards-based authentication provider that helps them add single sign-on (SSO) to apps that works with a user's existing credentials. Developers can also use Microsoft Entra APIs to build personalized experiences using organizational data.

How do I enable MFA for all users in Entra? ›

Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator. Browse to Protection > Conditional Access, select + New policy, and then select Create new policy. Enter a name for the policy, such as MFA Pilot. Under Assignments, select the current value under Users or workload identities.

What is the URL for Microsoft MFA setup? ›

Go to the MFA setup for Office 365 using this link - https://aka.ms/mfasetup and sign in using your work email address and your network password.

How to configure Microsoft Entra ID? ›

Enable bulk enrollment
  1. Sign in to the Microsoft Entra admin center.
  2. Select Microsoft Entra ID > Devices > Device Settings.
  3. Under Users may join devices to Microsoft Entra ID, select All. Note. If it is required that only specific users can join devices to Microsoft Entra ID, select Selected. ...
  4. Select Save.
Jan 16, 2024

Is Entra replacing Azure? ›

They're one and the same. Microsoft Entra ID is the new name for Azure AD. The names Azure Active Directory, Azure AD, and AAD are replaced with Microsoft Entra ID.

What are the authentication methods for using Entra ID? ›

Here are the 7 most commonly employed authentication methods in conjunction with Microsoft Entra ID:
  • Passwordless Authentication. ...
  • - Passwordless Security Key Sign-In: ...
  • - Passwordless Sign-In with Microsoft Authenticator: ...
  • LDAP Authentication: ...
  • Header-Based Authentication: ...
  • OAuth and OIDC (Open ID Connect):
Oct 5, 2023

How do I find my Authenticator app password? ›

If you need to recover Microsoft Authenticator, these steps can help:
  1. Go to the recovery webpage and enter your username/email for the account.
  2. Select “I forgot my password” and follow through to reset it.

Where does Microsoft Authenticator store passwords? ›

The Microsoft Authenticator app backs up your account credentials and related app settings, such as the order of your accounts, to the cloud.

Why can't i add an account to Microsoft Authenticator app? ›

Unable to add the account

Please verify that the activation code is correct and push notifications are enabled on your device for this app. Steps to Replicate: Install Microsoft Authenticator on Android 10. Add account using the Scan QR code option.

Top Articles
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5784

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.