Azure AD authentication methods API overview
Namespace: microsoft.graph
Authentication methods are the ways that users authenticate in Azure Active Directory (AD). Authentication methods in Azure AD include password and phone (for example, SMS and voice calls), which are manageable in Microsoft Graph beta endpoint today, among many others such as FIDO2 security keys and the Microsoft Authenticator app. Authentication methods are used in primary, second-factor, and step-up authentication, and also in the self-service password reset (SSPR) process.
The authentication method APIs are used to manage a user's authentication methods. For example:
- You can retrieve details of a user's FIDO2 Security Key, and delete it if the user has lost the key.
- You can retrieve details of a user's Microsoft Authenticator registration, and delete it if the user has lost the phone.
What authentication methods can be managed in Microsoft Graph?
| Authentication method | Description | Examples |
|---|---|---|
| fido2AuthenticationMethod | A FIDO2 Security Key can be used by a user to sign-in to Azure AD. | Delete a lost FIDO2 Security Key. |
| microsoftAuthenticatorAuthenticationMethod | Microsoft Authenticator can be used by a user to sign-in or perform multi-factor authentication to Azure AD | Delete a Microsoft Authenticator authentication method. |
| temporaryAccessPassAuthenticationMethod | A time-limited passcode that serves as a strong credential and allows onboarding of passwordless credentials. | |
| windowsHelloForBusinessAuthenticationMethod | Windows Hello for Business is a passwordless sign-in method on Windows devices. | See devices where a user has enabled Windows Hello for Business sign-in. Delete a Windows Hello for Business credential. |
The following authentication methods are not yet supported in Microsoft Graph v1.0.
| Authentication method | Description | Examples |
|---|---|---|
| Password | A password is currently the default primary authentication method in Azure AD. | Reset a user's password. |
| phoneAuthenticationMethod (not yet supported) | A phone can be used by a user to authenticate using SMS or voice calls (as allowed by policy). | See a user's authentication phone numbers. Add, update, or remove a phone number to a user. Enable or disable a primary mobile phone for SMS sign-in. |
| An email address can be user by a user as part of the Self-Service Password Reset (SSPR) process. | See a user's authentication email address. Add, update, or remove an email address to a user. | |
| Hardware token | Allow users to perform multifactor authentication using a physical device that provides a one-time code. | Get a hardware token assigned to a user. |
| Software token | Allow users to perform multifactor authentication using an application that supports the OAUTH specification and provides a one-time code. | Get and delete a software token assigned to a user. |
| Security questions and answers | Allow users to validate their identity when performing a self-service password reset. | Delete a security question a user registered. |
| Default method | Represents the method the user has selected as default for performing multi-factor authentication. | Change a user's default MFA method. NOTE: Managing the details of the default method is currently supported only through the MSOL Get-MsolUser and Set-MsolUser cmdlets, using the StrongAuthenticationMethods property. |
| Require re-register MFA | Represents a configuration that requires that when user signs in next time, they're requested to set up a new MFA authentication method. | Allow the user to set up new MFA methods, for example, if they changed their authentication device. NOTE: This feature is currently supported only through the MSOL Set-MsolUser cmdlet, using the StrongAuthenticationMethods property. |
Next steps
- Review the authentication method types and their various methods.
- Try the API in Graph Explorer.
Saran dan Komentar
Kirim dan lihat umpan balik untuk