![]() ![]() The associated MS Docs article is here, Passwordless sign-in with Microsoft Authenticator – Azure Active Directory – Microsoft Entra | Microsoft Docs. Within settings you’ll want to enable Usage Data (the screenshot shows it disabled, but you need to enable it). You can do this by opening the hamburger menu in the upper left, and select Settings. Per Microsoft, you’ll also need to enable a usage data setting within the Settings of the Authenticator App. Enabling the previewįirst you’ll want to make sure you have the latest version of the MS Authenticator App from the Apple App Store, which you can check here, Microsoft Authenticator on the App Store (). With this update, not only can you go passwordless for multiple accounts in the same Azure AD tenant, but across multiple tenants as well. Even with multiple Azure AD accounts in the same tenant, only one could go passwordless. To date, you could enroll one Azure AD account and one personal Microsoft Account (MSA) for passwordless in the Authenticator App. Microsoft indicates Android support is later in CY22.įor anyone who lives in a world of multiple Azure AD accounts and the Authenticator App, you can finally rejoice over not having to make the difficult decision over which account is the one you enable for passwordless… or potentially not having to carry multiple devices. Public Preview started for iOS on 7/14/22.
0 Comments
Leave a Reply. |