This method is similar to Call my authentication phone, but instead the user’s office phone is called. The user can either respond to the text or type the code into the authentication interface.Īdvantage: Call does not need to be answered immediately.ĭisadvantage: Requires cell reception and may incur text messaging costs. If they were not trying to log in, they can press a different key to report a fraudulent login attempt.Īdvantage: Instant verification from anywhere.ĭisadvantage: Requires cell reception and may incur mobile costs.Ī code is texted to the user’s mobile phone when they try to log in. The user will be prompted to press the # key on their phone to allow the login to continue. With this method, Microsoft will place an automated call to the user’s mobile phone when they try to log in. Office 365 MFA supports the following methods:Įach of these methods has advantages and disadvantages compared to the others. If users generally log in from the same devices, the “Keep me signed in” checkbox means that, most of the time, they won’t need to re-enter their password when interacting with Office 365. However, MFA usually only adds a few seconds to the login process. Users may be concerned that this will be less convenient for them. In Office 365, a user with MFA enabled will be required to go through the MFA login process any time they are prompted to enter a password. Because Office 365 lets you enable MFA at the individual user level, you are able to decide which approach is best for you. You may want to roll out MFA to all your users, or you may decide you only want to enforce it for users with administrative rights or with access to sensitive documents. Office 365 includes support for Multi-Factor Authentication to allow organizations to enhance their security.īefore rolling out MFA, you will want to decide which users you want to roll it out to. This helps protect against cases when a user’s password is compromised. Multi-Factor Authentication (MFA) is a method of enhancing the security of user accounts by requiring them to provide a second proof of identity in addition to their password.
0 Comments
Leave a Reply. |