Share via

One Entra ID user is asked by Entra to add a phone number for authentication despite the method being disabled in our tenant

Tilman Schmidt 270 Reputation points
2026-04-22T14:56:31.2766667+00:00

We have disabled the "SMS" and "Voice call" authentication methods in our Entra ID tenant and require all users to use Microsoft Authenticator as their second authentication factor.

Now one of our users reports, after having his authentication methods reset via "Require re-register multifactor authentication", that after registering his Microsoft Authenticator instance he was asked by Entra ID to add his phone number as a second method and confirm his identity by a phone call or SMS code. The dialog he received was this:

User's image

Translation:

"Method 2 of 2
Add own phone number
Confirm your identity through a call or a text code on your mobile phone.
Country code
Phone number
Choose how it should be confirmed
(*) Send code by SMS
..."

I tried to reproduce the effect with my own account but couldn't.

What could be the reason for Entra ID to force my user to register the phone number method even though I disabled it tenant-wide? How can I fix it?

Microsoft Security | Microsoft Entra | Microsoft Entra ID

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-22T14:56:58.17+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    This behavior is caused by how the different authentication method policies work together and by the fact that phone methods can still be enabled for the user through another policy, even if SMS and Voice are disabled in the new Authentication methods policy.

    Key points from the documentation:

    1. Microsoft Entra ID evaluates all authentication method policies independently. If a user is enabled for a method in any policy, the user can register and use that method. To fully block a method, it must be disabled in all policies. The documentation states:

      “Settings aren't synchronized between the policies… a user who is enabled for an authentication method in any policy can register and use that method. To prevent users from using a method, it must be disabled in all policies.”

      For phone-based methods this includes:
      • The new Authentication methods policy (SMS, Voice calls)
      • Legacy MFA policy (SMS, Phone call, Mobile phone, Office phone)
      • Legacy SSPR policy (Mobile phone, Office phone)
    2. The legacy SSPR/MFA settings can implicitly enable phone methods even if SMS/Voice are disabled in the new policy. For example, if Mobile phone is enabled for SSPR, users can still use both SMS and voice for password reset and may be prompted to register a phone number during combined registration.
    3. Combined registration supports “Phone” and “Alternate phone” as methods and allows users to set phone as a default MFA method (phone call or text message). If phone is available to the user via any policy, the combined registration wizard can require it as a second method.
    4. SMS sign-in has its own control under the SMS method. The note in the migration guidance explains that SMS can be enabled for sign-in and that this is separate from other uses of phone numbers.

    Because of these interactions, the affected user is likely still targeted for phone methods by one of the legacy policies (MFA or SSPR), or by SMS sign-in settings, even though SMS and Voice are disabled in the new Authentication methods policy. That is why the combined registration experience forced a phone number as “method 2 of 2” for that user but not for others whose effective policy set is different.

    To fix and prevent this:

    1. Review the Authentication methods policy:
      • Confirm that SMS and Voice calls are disabled for all users (or that the user is not in any included group).
      • For SMS, verify the Use for sign-in option is disabled for the user’s scope if you do not want SMS sign-in.
    2. Review legacy MFA policy:
      • Ensure SMS, Phone call, Mobile phone, and Office phone are disabled for the user’s scope.
    3. Review legacy SSPR policy:
      • Ensure Mobile phone and Office phone are disabled for the user’s scope if you do not want any phone-based methods.
      • Remember that enabling Mobile phone in SSPR implicitly allows both SMS and voice for password reset and can surface phone registration in the combined experience.
    4. After aligning all three policy surfaces so that the user is not enabled for any phone method, use Require re-register multifactor authentication again for the affected user so that the registration flow is rebuilt based only on Microsoft Authenticator.

    If any of these legacy settings remain enabled for that user (or for a group the user belongs to), Entra ID will continue to treat phone as an allowed method and may require it during registration.


    References:

    1 person found this answer helpful.

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.