So my company decided to migrate office suite and email etc to Microsoft365. Whatever. But for 2FA login they decided to disable the option to choose “any authenticator” and force Microsoft Authenticator on the (private) phones of both employees and volunteers. Is there any valid reason why they would do this, like it’s demonstrably safer? Or is this a battle I can pick to shield myself a little from MS?

  • @[email protected]
    link
    fedilink
    2
    edit-2
    6 months ago

    Ok. Did a quick read. And I think I mixed my words a little.

    Yes, Active Directory supports TOTP fine.

    But my understanding is rollouts can disable TOTP, and instead force the use of the proprietary scheme requiring the MS Authenticator app (which also supports TOTP) that uses push notifications to the device.

    As is the case with my employer. They didn’t enable TOTP, and I am unable to use the provided MFA QR code with 1Password.

    • @asim0v
      link
      16 months ago

      When you start the MFA registration process for a Microsoft account and select the Authenticator as the method there is a link at the bottom of the page about using a different app. Sure it will only generate a rotating code instead of the “easier” method of just entering a 2 digit number when prompted on the phone, but entering 6 numbers isn’t that much more difficult than 2.