Introduction
- How combined security information registration works today
- How to manage authentication methods in Microsoft Entra
- Step-by-step guidance to migrate from legacy MFA and SSPR policies to the new Authentication Methods policy
1.Combined Security Info Registration – A Unified Experience
Methods available in combined registration
- If Microsoft Authenticator is enabled for passwordless sign-in in the Authentication Methods policy, users must also enable passwordless sign-in within the Authenticator app on their device.
- The Alternate phone method can only be registered from the Security info (manage mode) page, and it requires Voice calls to be enabled in the Authentication Methods policy.
- The Office phone method has two behaviors:
- In Interrupt mode, it requires that the user’s Business phone attribute is set in their Entra ID profile.
- In Manage mode, users can manually add their Office phone from the Security info page without requiring the Business phone attribute.
- App passwords are available only to users enforced for per-user MFA. They are not available for users who are enabled for MFA via Conditional Access policies.
Combined Registration
Manage Mode: Accessible from the user’s profile, this mode allows users to manage their security information at any time (Users can add methods, delete or change existing methods, change the default method).
- Whether registration is prompted during sign-in
- Which authentication methods are shown
- MFA enforced via Entra ID Protection or per-user MFA: Prompted at sign-in to register both MFA and SSPR methods (if enabled for SSPR).
- MFA enforced via Conditional Access or other policies: Prompted when accessing resources requiring MFA.
- SSPR registration enforced: Prompted at sign-in to register SSPR methods.
- SSPR refresh enforced: Prompted to review and confirm or update existing security info at configured intervals.
- Users see the minimum number of required methods, shown in order from most to least secure.
- If both MFA and SSPR registration are required and SSPR requires two methods, users:
- Must register one MFA method first (e.g., Microsoft Authenticator).
- Can register a second method from either MFA or SSPR options (e.g., phone, email, security questions).
Note: Combined registration sessions are valid for only 15 minutes. If actions exceed this window, the session expires and the user must sign in again to continue.
2.Managing Authentication Methods in Microsoft Entra
Key Capabilities of the Authentication Methods Policy
- Enables methods like Microsoft Authenticator, FIDO2, Windows Hello for Business, voice calls, SMS, and more.
- Supports scoping to all users or specific groups (not individual users).
- Allows fine-grained configuration, such as enabling:
- Only mobile or office phones for voice calls
- Additional context in Microsoft Authenticator (e.g., app name, sign-in location)
Method | Primary Authentication | Secondary Authentication |
---|---|---|
Windows Hello for Business | Yes | *MFA |
Microsoft Authenticator push | No | MFA and SSPR |
Microsoft Authenticator passwordless | Yes | **No |
Microsoft Authenticator passkey | Yes | MFA |
Authenticator Lite | No | MFA |
Passkey (FIDO2) | Yes | MFA |
Certificate-based authentication (CBA) | Yes | MFA |
Hardware OATH tokens (preview) | No | MFA and SSPR |
Software OATH tokens | No | MFA and SSPR |
External authentication methods (preview) | No | MFA |
Temporary Access Pass (TAP) | Yes | MFA |
Text | Yes | MFA and SSPR |
Voice call | No | MFA and SSPR |
QR code (preview) | Yes | No |
Password | Yes | No |
How Policies Interact
- Settings are not synced between policies (legacy MFA, legacy SSPR, and Authentication Methods), so each policy acts independently.
- A method must be disabled in all policies to fully block it.
- Example: If a user in the HR group tries to register Microsoft Authenticator:
- Entra checks the Authentication Methods policy.
- If not allowed, it checks the legacy MFA policy for app-based options.
- If still not allowed, it checks the legacy SSPR policy.
Authentication Methods Policy Known Limitations
- Targeting individual users is no longer supported; move them to group-based targeting.
- Policy changes may fail to save if:
- Too many groups are included
- The policy size exceeds the 20 KB limit
- You're running large registration campaigns
How to Configure Authentication Methods Policy
3.Migrating from Legacy MFA & SSPR Policies
Understanding Legacy Policies
To access legacy MFA settings:
To Access SSPR Settings
These legacy policies apply tenant-wide, without support for targeting specific user groups or offering fine-grained control(Only Self-Service Password Reset (SSPR) can be scoped to All users or specific groups—not the individual password reset methods themselves.).
🔔 Example: The mobile phone setting in SSPR allows both SMS and voice calls, without an option to limit one.
Microsoft Entra respects all enabled authentication methods—across both legacy and new policies. A method remains available unless disabled in all locations. This can cause unintended overlap:
- Example: If voice calls are disabled in Authentication Methods but allowed in legacy SSPR, users may still use them.
- Similarly, enabling Mobile phone in legacy SSPR activates both SMS and voice, even if only SMS is intended.
Migration Options
Migration from legacy policies can be done in two ways:
1. Automated Migration Guide
Available in Entra ID > Authentication methods > Policies > Manage migration>Begin automated guide- Automatically audits and maps your current MFA/SSPR settings
- Recommends enabling matching methods in the new policy
- Allows further configuration before confirming the switch
- Once confirmed, legacy policies are grayed out and ignored

⚠️ Security Questions are still managed via the legacy SSPR policy. Until migration support is added, keep them enabled there if required.
2. Manual Migration
Recommended if you need full control or wish to proceed graduallySteps:
- Audit current settings in legacy MFA and SSPR policies
- Document method mappings and availability
- Configure the equivalent methods in the new Authentication Methods policy
- Gradually phase out legacy configurations
Migration is fully reversible while in progress. However, once set to Migration Complete, reverting will require providing feedback to Microsoft.
Final Recommendation
- Begin your migration early to avoid last-minute disruptions. The Authentication Methods policy not only simplifies administration but also strengthens your organization's security posture with support for modern, phishing-resistant authentication methods.
- Changes made in a home tenant (e.g., removing SMS as a method) do not automatically apply to resource tenants(During B2B Collaborations). To avoid confusion and ensure authentication methods are properly managed per tenant: In the Microsoft Entra admin center, click your account name in the top-right corner and select Switch directory to access and update the correct tenant’s settings.
Conclusion
As Microsoft moves toward modern, secure identity management, transitioning from legacy MFA and SSPR policies to the Authentication Methods policy is no longer optional—it’s essential. This unified approach not only simplifies administration but also enhances user experience and security across sign-in and password reset scenarios.
By planning your migration early, validating existing configurations, and leveraging tools like the Migration Guide in the Entra portal, your organization can ensure a smooth, controlled transition. Embrace the shift now to stay ahead of evolving authentication standards and better protect your digital estate.
0 Comments