Multi Factor Authentication
-
Update Multi Factor Authentication Phone Number
There are times you may need to update your MFA phone number. The below guide will show you how. Log in to Office.com Click your name from the Top Right Corner of the Page Click “View Account” On the left side of the page click “Security Info” Click Change next to the phone number that you need to update Update the phone number a preferences, then click Next You’ll receive a text or call that will provide a security code to you, enter the code and click Next When done successfully, you will see a similar message as below
-
Signing into Office 365 account and receiving TPM module error 80090016
Issue: You receive an error similar to the screenshot below. Solution: 1. Click the start button and search for "access work or school" 2. Click on "access work or school" Windows 11 looks like this: Windows 10 looks like this: 3. Click on your account, this will display the Disconnect option Click the disconnect button to disconnect your account from the computer you working on. You may be prompted to agree to be disconnected. Please click Yes. 4. Restart your computer and login again.
-
Microsoft 365: Add or Re-Add Authenticator App for MFA
Authenticator is the recomended method for Multi Factor Authentication (MFA.) You may need to add or re-add this as an option for any number of reasons including: initial setup changed phone administration requirement troubleshooting Visit office.com and click sign in top right of the page Use email address as the as the sign in and use your same password you sign in to get into your computer - NOTE: if your email address doesn't work try using different accounts you've used for other sign ins. Contact IT if you have further questions. Once here, click your name on the top right, it will bring down a sub menu and click on "View Account" After clicking "view account" it will open a new tab/window and you will need to click "Update Info" Here it will bring you to the "Security info" tab, here you need to click "+ Add sign-in method" a popup will appear -> click "Choose Method" -> choose "Authenticator app" Go through the prompts and follow the instructions step 6 is different so please read step 6. Here is where it is a little different, it states you need to add a "Work or School" account, DO NOT do that, you should press the plus button "+" on top right of the Mobile App and select the "Other" option. After selecting other it should prompt to scan a QR code. Scan it and follow the rest of the steps. You are done and have added an authenticator app option to your account.
-
MFA: YubiKey OTP Self Registration
A user can self register a YubiKey with their Microsoft Entra ID (formally Azure AD) Account. This is the recommended method for registering a YubiKey as an OATH-TOTP token. Before you begin The user account must be in Microsoft Entra ID. Have a compatible YubiKey. Install Yubico Authenticator on your mobile device and/or workstation. Since the YubiKey does not contain a battery it cannot track time and will require software to generate OATH-TOTP codes. Yubico provides Yubico Authenticator for all major platforms (Windows, MacOS, Android, and iOS) to display the one time passcodes generated on the YubiKey. Register a YubiKey Open a browser window and navigate to https://myprofile.microsoft.com. Sign in to your account. Select Security Info in the left navigation or Update Info in the Security Info tile. Select Add Method. Select Authenticator app. Select I want to use a different authenticator app. Select Next. You will now see a QR code displayed on the screen. Insert your YubiKey and open Yubico Authenticator. Select Add or click on the three vertical dots in the top right corner. If the QR Code is visible, it will automatically fill in the fields required. Select Add. Double-click the Microsoft entry to copy the code to your clipboard. If successful, the message displays Code copied to clipboard. Note: if you selected Require Touch in the previous step you must touch your YubiKey to copy the code. Back in your internet browser window paste the code in the box and click Next. Select Done. You have now successfully registered your YubiKey to your account!
-
Microsoft 365: Setup YubiKey as a Security Key
HPG Permits the use of YubiKey devices as a method of Mutli-Factor authentication. This guide will show you how to setup YubiKey devices as hardware keys for MFA in Microsoft 365. If you need instructions for NetSuite or another app, search the help desk solutions for available guides. Go to Microsoft365.com and login. Click on your Name (top right corner) and then click on View account Click UPDATE INFO under the Security Info tile Click Add sign-in method Drop down the options and select Security Key and then continue Click next Click USB device Click Next after reading the below message You will see the following message Select Security key when given the option to choose where to save the passkey. Click Okay to proceed Click OK to continue setup Plug in the YubiKey. Windows will automatically detect the security key Create a unique PIN for the security token. Remember what this is as you will need it in the future. Click OK after confirming your PIN Touch the contact sensor on the YubiKey. Hold contact until directed otherwise. Your YubiKey should now be registered and almost ready to use. Clik OK Enter a unique name for the YubiKey so that you can identify it from the list of your added authentication methods. Click Next Click Done
-
MFA: Setup an OATH TOTP Hardware Token
Require Hardware: iPhone or Android Smartphone with NFC (used for enrollment only and will not be needed post enrollment) TOKEN2 C301-i or TOKEN2 Molto2 The OATH TOTP Hardware Token provides a hardware-based method of MFA OTP using a mobile token featuring a basic LCD display that will show the 6 digit One Time Passcode. Intro: This article will guide you through adding an OATH TOTP Hardware Token to a user's Entra ID. Instructions: Download the OATH Hardware Token Setup.csv file and open it Go to https://www.token2.com/site/page/totp-toolset (keep this open and do not refresh page after generating the new seed until all steps are complete) Click the random button to generate a new seed Copy the base32 Seed key that is generated Paste the base32 Seed key into the 'security key' field in the OATH_token.csv file Type the Serial Number, from the back of the Token2 hardware token, into the 'serial number' field in the OATH_Token.csv file Copy the User Principal Name of the user the token will be assigned to, and paste it into the 'upn' field in the OATH_Token.csv file Your CSV file should now look like the below image: Save the CSV file Go to Entra ID and search for 'Oath Tokens' and click to open the OATH tokens page Click Upload on the Entra ID Oath tokens page, and upload the OATH_Tokens.csv file. You will receive a notification it was successfully uploaded. note: It may take 30 seconds for the token(s) to show once upload is completed. Keep refreshing until you see the tokens On your smart phone, Download and install the 'Token2 NFC Burner' Open TOKEN2 NFC Burner on your smartphone Go to the Profile Configuration and change the settings to match the below image: In Token2 NFC Burner, go back to Burn Seeds, and tap clear In Token2 NFC Burner, click the 'scan QR' button' and scan the QR code generated from step 2 Press the power button on the OATH token Hold your phone's NFC reader onto the Token2 Hardware Token, and then tap Connect in NFC Burner if it does not auto connect. (Token disply must be on) Press BURN SEED, you should see a notification that the BURN was successful. The key is now paired and ready to activate. Go back to Entra ID OAUTH tokens page, and locate the new token. Click Activate and enter the OTP displayed on the Token2 Hardware key. Entra ID should state the token was successfully activated. The Hardware Token is now available for use by the assigned user. Offboarding and reassignment: Employees need to return the hardware token when their relationship ends with the company. The hardware token, should be unassigned at the time the employee is no longer employed by HPG Brands. The Token may be re-assigned by following the instructions within this guide after it has been removed from the OAUTH Tokens list in Entra ID.