A cloud-based identity and access management service for securing user authentication and resource access
This behavior is caused by how the different authentication method policies work together and by the fact that phone methods can still be enabled for the user through another policy, even if SMS and Voice are disabled in the new Authentication methods policy.
Key points from the documentation:
- Microsoft Entra ID evaluates all authentication method policies independently. If a user is enabled for a method in any policy, the user can register and use that method. To fully block a method, it must be disabled in all policies. The documentation states:
For phone-based methods this includes:“Settings aren't synchronized between the policies… a user who is enabled for an authentication method in any policy can register and use that method. To prevent users from using a method, it must be disabled in all policies.”
- The new Authentication methods policy (SMS, Voice calls)
- Legacy MFA policy (SMS, Phone call, Mobile phone, Office phone)
- Legacy SSPR policy (Mobile phone, Office phone)
- The legacy SSPR/MFA settings can implicitly enable phone methods even if SMS/Voice are disabled in the new policy. For example, if Mobile phone is enabled for SSPR, users can still use both SMS and voice for password reset and may be prompted to register a phone number during combined registration.
- Combined registration supports “Phone” and “Alternate phone” as methods and allows users to set phone as a default MFA method (phone call or text message). If phone is available to the user via any policy, the combined registration wizard can require it as a second method.
- SMS sign-in has its own control under the SMS method. The note in the migration guidance explains that SMS can be enabled for sign-in and that this is separate from other uses of phone numbers.
Because of these interactions, the affected user is likely still targeted for phone methods by one of the legacy policies (MFA or SSPR), or by SMS sign-in settings, even though SMS and Voice are disabled in the new Authentication methods policy. That is why the combined registration experience forced a phone number as “method 2 of 2” for that user but not for others whose effective policy set is different.
To fix and prevent this:
- Review the Authentication methods policy:
- Confirm that SMS and Voice calls are disabled for all users (or that the user is not in any included group).
- For SMS, verify the Use for sign-in option is disabled for the user’s scope if you do not want SMS sign-in.
- Review legacy MFA policy:
- Ensure SMS, Phone call, Mobile phone, and Office phone are disabled for the user’s scope.
- Review legacy SSPR policy:
- Ensure Mobile phone and Office phone are disabled for the user’s scope if you do not want any phone-based methods.
- Remember that enabling Mobile phone in SSPR implicitly allows both SMS and voice for password reset and can surface phone registration in the combined experience.
- After aligning all three policy surfaces so that the user is not enabled for any phone method, use Require re-register multifactor authentication again for the affected user so that the registration flow is rebuilt based only on Microsoft Authenticator.
If any of these legacy settings remain enabled for that user (or for a group the user belongs to), Entra ID will continue to treat phone as an allowed method and may require it during registration.
References:
- Manage authentication methods for Microsoft Entra ID
- How to migrate MFA and SSPR policy settings to the Authentication methods policy for Microsoft Entra ID
- Combined security information registration for Microsoft Entra overview
- Manage user authentication methods for Microsoft Entra multifactor authentication
- Authentication methods in Microsoft Entra ID - Voice call
- Configure and enable users for SMS-based authentication using Microsoft Entra ID