Is Microsoft Authenticator Safe | Transmit Security (2024)

  • Platform
    • Is Microsoft Authenticator Safe | Transmit Security (2)

      Platform

      Our modern identity services are exposed through developer-friendly APIs, SDKs and Low-Code services to deliver the scale and performance required for any and all customer use cases.

      Learn more ->

      Identity OrchestrationTM

      Consolidate your identity stack, centralize decisioning and automate customer journeys to mitigate risk.

      Detection and Response

      Monitor and analyze hundreds of signals to detect risk, trust, fraud, bots and behavior — at all times.

      Identity Management

      Simplify management with a single identity store, unified user profiles, single-sign-on and role-based access control.

      Identity Verification

      Verify customer identities with automated ID and selfie analysis.

      Authentication Services

      Authenticate customers with passkeys, passwordless, email magic links and other MFA methods.

      Data Validation

      Instantly validate the identity data that customers provide.

  • About
  • Resources
    • Is Microsoft Authenticator Safe | Transmit Security (4)

      Featured Blog Post:

      Safeguarding Business Logic in an Era of Democratized Scams

      In a recent podcast that turned viral on TikTok, ChatGPT user Gage explained how he used the AI tool to generate hundreds of fake McDonald’s reviews, which he then...

      Learn more

      Media

      Transmit Security is making headlines. Read the latest in the news.

      Identity Hub

      Start here to get the CIAM basics. This glossary-style blog slices through the noise to give you clarity.

      Blog

      Get best practices, industry insights, thought leadership and the latest on CIAM innovations.

      System Status

      Check our system status.

      Events & Webinars

      Join us in person at conferences or stream webinars on hot CIAM topics.

      Support

      Existing customer? Find the help you need or contact our experts.

      Content Hub

      Take a deeper dive into the world of CIAM. Explore analyst reports, white papers, survey data and customer stories.

  • |
  • Developers
  • Platform
    • Platform
    • Identity OrchestrationTM
    • Identity Management
    • Authentication Services
    • Detection and Response
    • Identity Verification
    • Data Validation
  • About
    • About
    • Contact Us
    • Media
    • Leadership
    • Careers
    • Become a Partner
    • Corporate Social Responsibility
  • Resources
  • Developers

Request a Demo

By clicking the button, you agree to the Terms and Conditions

Click Here to Read Transmit Security Privacy Policy

Request a Demo

Back to blogs

Get the Transmit Security Blog Straight To Your Email

By clicking the button, you agree to the Terms and Conditions

Click Here to Read Transmit Security Privacy Policy

Subscribe

Table of Contents

by Alex Brown

Microsoft Authenticator: A False Sense of Security?

As a naturally curious security professional, I am constantly trying out new security services. I decided to enable the Microsoft Authenticator on my personal Microsoft account. Microsoft describes their Authenticator as “More secure. Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint.”

Almost all digital transformation projects include applications that authenticate users and protect sensitive data, as well as integrating services across multiple channels. Passwords are not secure, as recent data leaks and hacks have shown. Authenticator Apps arose as a result of the need for more secure methods using multi-factor authentication. Google authenticator and Microsoft authenticator are among the top authenticator apps used.

I downloaded the Microsoft Authenticator app and added my personal Microsoft account to it. The app asked for my Microsoft password and email verification code. Note that both of these are vulnerable to a simple phishing attack. I completed the registration process and logged into my account several times using the Authenticator app to verify that it worked. It did. I could log into my account without a password.

Is Microsoft Authenticator Safe | Transmit Security (6)

Can two users log into Microsoft Authenticator at the same time?

My assumption, after enabling the app, was that no one else could log into my account without me approving it first through the Authenticator app. It goes without saying that no one should be able to register another Authenticator app on my behalf without me approving it first with the Authenticator app that I already have.

So I asked a friend to try to add my personal Microsoft account to his Microsoft Authenticator app. After he entered my email address I got a push notification on my mobile device. I opened the push notification on my device and selected “Deny” to deny him from continuing. But my friend was faster and selected “use password instead” on his phone moments before I selected “Deny”. My friend was then able to enter my password and email verification code and successfully register his Microsoft Authenticator using my account. Microsoft completely ignored me pushing the Deny button and didn’t provide any feedback that a new Authenticator app was registered on my behalf. Microsoft Authenticator would not prevent a criminal from accessing an account once they have obtained a username and password.

After this experiment we were both able to log into my account, each with our own phones. But what happens if one of us chooses Allow and the other chooses Deny? Apparently first to click wins. If the attacker tries to log in and clicks Approve first, the victim can click Deny but it won’t matter – the attacker will get in and once again – no indication is sent to the victim that someone got in.

DoesMicrosoft Authenticator have an extra security layer?

Where was the extra layer of security that Microsoft Authenticator claimed? While the Microsoft Authenticator app was easy enough to use (as any Authenticator App), is it simply providing a false sense of security?

Using biometrics and push notifications for security purposes should incorporate many additional layers of security resulting in a dynamic, risk-based approach to authentication and authorization. The best systems carefully assess and correlate a host of indicators and variables from the device and the session in real time to validate the user and revalidate if necessary. In the examples above there were plenty of red flags that should have generated alerts and blocked the imposter before access was provided to the device. If you’re serious about device and system security, continuous adaptive risk should be a foundation to your organization’s IT security infrastructure.

An update on ‘Is Microsoft Authenticator Safe?’

Update: I received a few comments on whether 2FA was enabled or not in my tests above. This is not the point I was trying to make here. Even when 2FA is enabled, attackers can still choose to use Email or SMS as a second factor instead of the Microsoft Authentication App. Both Email and SMS are much weaker in terms of security. I’ll follow up next week with a post explaining how SMS and Email 2FA can be bypassed. My expectation is that once I enable an Authenticator App, attackers should not have an easy way of using SMS or Email instead to login or register another Authenticator App.

  • Is Microsoft Authenticator Safe | Transmit Security (7)

    Alex Brown

    A self-professed technology geek, content writer Alex Brown is the kind of person who actually reads the manual that comes with his smartphone from cover to cover. His experience evangelizing for the latest and greatest tech solutions gives him an energized perspective on the latest trends in the authentication industry. Alex most recently led the content team at Boston-based tech company Form.com.

    View all posts

Get the Transmit Security Blog Straight To Your Email

By clicking the button, you agree to the Terms and Conditions

Click Here to Read Transmit Security Privacy Policy

Subscribe

Latest blog posts

Safeguarding Business Logic in an Era of Democratized Scams

Read now

Read now

Enhancing the Login Experience with Context-Aware Security

Read now

How Risk-based Authentication Prevents Fraud and Friction

Read now

Is Microsoft Authenticator Safe | Transmit Security (2024)

FAQs

Can I trust Microsoft Authenticator? ›

A: Microsoft Authenticator acts as a secure repository for your account credentials to help you authenticate and access various applications conveniently. Authenticator may list inactive accounts that are created by other applications that use Authenticator for single sign-on support.

Is Microsoft Authenticator encrypted? ›

Back up and recover your accounts

Easily move personal accounts to a new device with encrypted cloud backup in Microsoft Authenticator.

What are the security issues with Authenticator apps? ›

One challenge for some authenticator apps is the lack of encryption for stored secrets. If an attacker were able to access the device and the app's storage isn't encrypted, they could potentially extract the secret keys.

Can Microsoft Authenticator track my phone activity? ›

The Microsoft authenticator does not track you and it does not log location data. It will list your logins to MCC-protected resources as a method for you to recognize unauthorized access attempts. The only push notifications it will ever send you are approval requests for logins to MCC systems.

Is Microsoft Authenticator safer than password? ›

Authenticator apps are convenient, secure and free, making them a better option for MFA. You may be able to use a password manager as your MFA method.

Is using an authenticator app safe? ›

Authenticator apps are secure because they keep the code local to your device and the codes are not sent unencrypted over the internet. This means they can't be intercepted through common cyber attack methods. Since the codes reset every thirty to sixty seconds, it's difficult for cybercriminals to steal them.

What Authenticator is the safest? ›

We would recommend Google Authenticator to anyone interested in a strong, no-frills free authenticator app that is available for both iOS and Android. The Microsoft Authenticator app backs up users account credentials and related account settings to the cloud.

Should I get Microsoft Authenticator? ›

I can swiftly and securely confirm my identity when checking in to different online services thanks to the app's user-friendly interface. In conclusion, Microsoft Authenticator is an excellent choice for anyone seeking for a two-factor authentication solution.

What is the most secure 2FA? ›

The most effective two-factor authentication (2FA) methods are app-based and hardware-based. App-Based (e.g., Google Authenticator, Authy): They're more secure than SMS-based 2FA since they're less vulnerable to SIM-swapping attacks.

Can an authenticator be hacked? ›

Can an authenticator be hacked? A time-based passcode generated by an authenticator app is harder to hack than an SMS text message, but that doesn't mean an authenticator app can't be hacked — especially if it generates codes that allow you to log into your accounts.

How not to use Microsoft Authenticator? ›

Under MFA settings, select Additional cloud-based MFA settings. Under service settings, select Microsoft Authenticator app. Change the setting to Disabled.

Should I download an authenticator app? ›

Authenticator generates secure codes even offline, this will allow you to authenticate securely even when your device is in airplane mode. You can import your accounts easily and securely from Google Authenticator, Password Managers and Files.

What can Microsoft Authenticator access? ›

You can use the Authenticator app as a way to sign in if you forget your password. You can use the app to back up and restore all your other account credentials. You can also use the Microsoft Authenticator to sign in to your non-Microsoft accounts.

Does Microsoft Authenticator know my location? ›

The Microsoft Authenticator App does have the ability to check the device location. Location data is used to determine the device location at the time of authentication.

Does Microsoft Authenticator store passwords? ›

The Microsoft Authenticator app backs up your account credentials and related app settings, such as the order of your accounts, to the cloud. You can then use the app to recover your information on a new device, potentially avoiding getting locked out or having to recreate accounts.

What can my company see with Microsoft Authenticator? ›

Your organization can always see:
  • Device owner.
  • Device name.
  • Device serial number.
  • Device model, such as Google Pixel.
  • Device manufacturer, such as Microsoft.
  • Operating system and version, such as iOS 12.0.1.
  • Device IMEI.
Apr 25, 2024

How to secure Microsoft Authenticator? ›

  1. Sign in using two-step verification or security info.
  2. Create app passwords in Security info (preview)
  3. Set up a phone call as your verification method.
  4. Set up a security key as your verification method.
  5. Set up an email address as your verification method.
  6. Set up security questions as your verification method.

Is the Microsoft Authenticator app necessary? ›

Typically, depending on your organization's settings, you might be able to use an authentication app as one of your security info methods. You aren't required to use the Microsoft Authenticator app, and you can choose a different app during the set-up process.

Top Articles
Latest Posts
Article information

Author: Geoffrey Lueilwitz

Last Updated:

Views: 6202

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Geoffrey Lueilwitz

Birthday: 1997-03-23

Address: 74183 Thomas Course, Port Micheal, OK 55446-1529

Phone: +13408645881558

Job: Global Representative

Hobby: Sailing, Vehicle restoration, Rowing, Ghost hunting, Scrapbooking, Rugby, Board sports

Introduction: My name is Geoffrey Lueilwitz, I am a zealous, encouraging, sparkling, enchanting, graceful, faithful, nice person who loves writing and wants to share my knowledge and understanding with you.