• Home
  • Microsoft Azure
  • Microsoft 365
  • Barista
  • Legal Notice
  • Privacy Policy
  • English
    • Deutsch
  • Home
  • Microsoft Azure
  • Microsoft 365
  • Barista
  • Legal Notice
  • Privacy Policy
  • English
    • Deutsch
cloudcoffee.ch

Freshly brewed with Microsoft Azure and Microsoft 365

Microsoft 365,  Microsoft Azure

Temporary Access Pass in Microsoft Entra: what it is and how to use it

5. March 2024 /

Last Updated on 21. December 2024

A Temporary Access Pass (TAP) is a time-limited passcode that can be configured for single or multiple use. The Temporary Access Pass (TAP) allows the user to securely sign in to the Microsoft Cloud within a defined time period to set up additional authentication methods. These secure authentication methods include passwordless methods such as FIDO2 security keys or the Microsoft Authenticator App. The limited time period for access authorisations makes the Temporary Access Pass (TAP) an indispensable tool for security guidelines and compliance requirements.

This blog post explains how to activate, configure, and use the Temporary Access Pass (TAP).

Table of contents hide
1 Prerequisites and Licensing
2 Enable Temporary Access Pass policy
3 Create Temporary Access Pass
4 Use Temporary Access Pass
4.1 Registering authentication methods
5 Good to know
5.1 Registering a security key (FIDO2)

Prerequisites and Licensing

The following licence is required for the Temporary Access Pass (TAP) feature in Microsoft Entra ID:

  • Microsoft Entra ID P1 or higher

The licence is part of Microsoft 365 Business Premium and many more.

Enabling and configuration of the Temporary Access Pass (TAP) requires the role of Authentication Policy Administrator.

Several roles are suitable for creating a passcode for the Temporary Access Pass: Global Administrator, Privileged Authentication Administrator or Authentication Administrator. A detailed description of the possibilities of each role can be found in the following chapter: Create Temporary Access Pass

Enable Temporary Access Pass policy

Before users can sign-in with a Temporary Access Pass, the Temporary Access Pass policy must be enabled and it must be defined which users or groups can use a Temporary Access Pass to sign-in. This configuration is done in the Microsoft Entra admin center (https://entra.microsoft.com).

Enable Temporary Access Pass in Protection > Authentication methods > Policies.

Authentication methods

Enable Temporary Access Pass and select users or groups who are authorised to use this sign-in method.

Enable Temporary Access Pass

Optionally, adjust the default settings of the Temporary Access Pass under Configure.

SettingDefaultValuesComments
Minimum lifetime1 hour10 – 43.200 minutes (30 days)Minimum number of minutes for which the Temporary Access Pass is valid
Maximum lifetime8 hours10 – 43.200 minutes (30 days)Maximum number of minutes for which the Temporary Access Pass is valid
Default lifetime1 hour10 – 43.200 minutes (30 days)
One-time useFalseTrue / FaseIf the policy is set to No, the Temporary Access Pass can be used either once or multiple times during its validity period.
If the policy is set to Yes, the Temporary Access Pass can only be used once during its validity period.
Length Passcode8 characters8-48 characters

Hint
Set the One-time value to No so that each time a Temporary Access Pass is created, it can be individually defined whether it can be used once or several times during the validity period and thus better fulfil the security guidelines and compliance requirements.

Configure Temporary Access Pass

Create Temporary Access Pass

After the policy has been enabled, it is possible to create a Temporary Access Pass for an authorized user in Microsoft Entra ID. Depending on the role, different administrators can perform these actions. The following roles can perform the following actions with regard to a Temporary Access Pass:

  • Global Administrator can create, view and delete a Temporary Access Pass for any user except itself.
  • Privileged Authentication Administrator can create, view and delete a Temporary Access Pass for administrators and members with the exception of themselves.
  • Authentication Administrators can create, view and delete a Temporary Access Pass for members with the exception of themselves.
  • Global Reader can view the details of the Temporary Access Pass for users, but without being able to read the passcode itself.

A user with an authorised role creates a Temporary Access Pass in the Microsoft Entra admin center (https://entra.microsoft.com)

Select user in Identity > Users > All users

Microsoft Entra ID All users

Authentication methods > Add authentication method > Temporary Access Pass
The delayed start time, activation duration and single or multiple use can be customised to your own requirements.
To finish, click on Add.

Add Authentication method Temporary Access Pass TAP

The details of the Temporary Access Pass are now shown. The passcode is shown only once and cannot be read again after leaving the window. So please make a note.

Temporary Access Pass show passcode

The user can now sign-in with the created passcode.

Show all enabled authentication methods

Use Temporary Access Pass

Usually, a user registers authentication methods during the first signin. The Temporary Access Pass is therefore perfect for setting up or updating multifactor-, passwordless-, or phishing-resistant authentications without having to perform additional security verificatoins.

Registering authentication methods

The registration of authentication methods is done at https://aka.ms/mysecurityinfo. Users can also update existing authentication methods here.

If a user account has activated a Temporary Access Pass, the user automatically uses this authentication method when sign-in.

Sign In with Temporary Access Pass TAP

After successfull sign-in, the user can now register or update passwordless authentication methods such as FIDO2 security keys or Microsoft Authenticator App.
Users who update their authentication methods due to lost credentials or devices should ensure that the old authentication methods are removed here.

Security info

Good to know

Registering a security key (FIDO2)

If a one-time Temporary Access Pass is used to register a security key (FIDO2), the user must complete the registration within 10 minutes of signing in with the one-time Passcode. This restriction does not apply to a Temporary Access Pass created for multiple uses.

Fresh content, explained with practical relevance. Stay up to date via LinkedIn and Bluesky.

LinkedIn BlueSky

No marketing. No noise. Just content.
If this post was helpful, a coffee brings back the rich aroma behind the writing.

Buy Me a Coffee
  1. Hardening your Identities: Microsoft Authenticator device-bound passkey
  2. Windows Hello for Business: Enhanced Security with Multi-Factor Unlock
  3. Passwordless Sign In with Microsoft Entra ID (Azure AD) and YubiKey (FIDO2)
  4. Microsoft Entra Privileged Identity Management (PIM) and FIDO2: Increasing the security of privileged roles
DirectoryEfficiencyEnforceFIDO2Identity and Access Management (IAM)Microsoft Authenticator AppMicrosoft EntraMicrosoft Tenant HardeningMulti-Factor AuthenticationPasswordless Sign InZero Trust Network Access (ZTNA)
Sponsored Links

Barista

Oliver Mueller My name is Oliver Müller and I have been working with passion and dedication in the IT industry since 1998. The diversity of Microsoft products has fascinated me from the beginning and motivated me to expand my knowledge in this area. As a Microsoft Azure Solutions Architect Expert, Microsoft MVP and MCT, my focus is primarily on the areas of Infrastructure-as-a-Service (IaaS) and Identity and Access Management (IAM).

Regardless of the complexity of the challenges that present themselves to me, I always find the optimal solutions. I often find inspiration over a cup of coffee. My solutions are not only effective but also innovative and future-oriented.

Azure Administrator Associate Azure Solutions Architect Expert
Microsoft MVP Microsoft Certified Trainer
LinkedIn BlueSky Buy Me a Coffee

Recent Posts

  • Protect Security Info Registration with Microsoft Entra Conditional Access and Microsoft Entra ID Protection

    2. September 2025

  • Microsoft Entra Connect: Migration to Application Based Authentication (ABA)

    5. August 2025

  • Microsoft Defender Attack Simulation Training: Boosting Real-World Security Awareness

    2. July 2025

  • Microsoft Entra ID: Admin Consent Workflow for Secure Application Permissions

    2. June 2025

  • Securing Microsoft 365 Apps with Microsoft Entra Global Secure Access

    6. May 2025

Updated Posts

  • Microsoft Entra ID Protection: Protect Identities, Detect Risks and Mitigate Threats

    26. September 2025

  • Enhance Token Security with Microsoft Entra and Microsoft Intune

    8. September 2025

  • Microsoft Entra ID: QR Code Sign-In

    30. August 2025

  • Microsoft Entra ID: Admin Consent Workflow for Secure Application Permissions

    20. August 2025

  • Backup and Restore Microsoft Authenticator App

    31. July 2025

Sponsored Links

Backup Browser Extensions Command Line Conditional Access Directory Directory Extensions Disaster Recovery Efficiency Enforce FIDO2 Guest High Availability Identity and Access Management (IAM) Microsoft Authenticator App Microsoft Defender Microsoft Entra Microsoft Entra Connect Microsoft Intune Microsoft Tenant Hardening Migration Multi-Factor Authentication Naming Passthrough Authentication (PTA) Password Hash Synchronization (PHS) Passwordless Sign In Performance Optimization PowerShell Troubleshooting Tutorials Virtual Machines Zero Trust Network Access (ZTNA)

© 2021-2025 cloudkaffee.ch
This site uses cookies to improve the user experience. By continuing to use them, you agree to this.