Apps that do not support two-step verification can cause problems after enabling multi-factor authentication (MFA). These apps, also called non-browser apps, can no longer be used after multi-factor authentication is enabled.

To continue to use these apps securely, an App Password can be used for authentication. An App Password is a secure, randomly generated password that can be used instead of the regular password for an app.

Create App Password

Go to the Microsoft MFA Setup web page and sign in.
https://aka.ms/mfasetup

Select “Security info” > “Add method”

Select “App Password”
If the option is not available for selection, see Troubleshooting

Enter unique name for the password. Later it can be easily identified on which device the password is used.
The app password should only be used on one device so that it can be easily revoked if necessary.

The App Password is now created. The password can no longer be displayed after closing the window. It is recommended to copy this password via the clipboard.

Now you can sign in to the corresponding app with the username and password you just generated. No multi-factor authentication will appear.

Revoke app password

If the password is no longer needed, it can be revoked.

Go to the Microsoft MFA Setup web page and sign in.
https://aka.ms/mfasetup

Select “Security info” > “Delete”

Sponsored Links

Troubleshooting

“App Password” not displayed in dropdown

“App Password” is not displayed in the drop-down menu.

Check two settings in the “Per-user MFA” of the Azure Active Directory.

Go To “Azure Active Directory” > “Users” > “Per-user MFA” > “service settings”
Select “Allow users to create app passwords to sign in to non-browser apps”

Go To “Azure Active Directory” > “Users” > “Per-user MFA” > “users”

Select “Enforced” on the specific user

The “App Password” method is now showing.


Follow me on LinkedIn and get informed about my latest posts.

Sponsored Links