• Home
  • Microsoft Azure
  • Microsoft 365
  • Barista
  • Legal Notice
  • Privacy Policy
  • English
    • Deutsch
  • Home
  • Microsoft Azure
  • Microsoft 365
  • Barista
  • Legal Notice
  • Privacy Policy
  • English
    • Deutsch
cloudcoffee.ch

Freshly brewed with Microsoft Azure and Microsoft 365

Microsoft 365,  Microsoft Azure

Temporary Access Pass in Microsoft Entra: Configuration and Usage

5. March 2024 /

Last Updated on 19. April 2026

A Temporary Access Pass (TAP) is a time-limited passcode that can be configured for single or multiple use. The Temporary Access Pass (TAP) allows the user to securely sign in to the Microsoft Cloud within a defined time period to set up additional authentication methods. These secure authentication methods include passwordless methods such as FIDO2 security keys or the Microsoft Authenticator App. The limited time period for access authorisations makes the Temporary Access Pass (TAP) an indispensable tool for security guidelines and compliance requirements.

This blog post explains how to activate, configure, and use the Temporary Access Pass (TAP).

Table of contents hide
1 Prerequisites and Licensing
1.1 Licenses
1.2 Roles
2 Enable Temporary Access Pass as an Authentication Method
3 Create Temporary Access Pass
4 Use Temporary Access Pass
4.1 Registering authentication methods
5 Good to know
5.1 Registering a security key (FIDO2)

Prerequisites and Licensing

Licenses

The following licence is required for the Temporary Access Pass (TAP) feature in Microsoft Entra ID:

  • Microsoft Entra ID P1 or higher

The licence is part of Microsoft 365 Business Premium and many more.

Roles

The following roles are defined for configuration, operation, and maintenance based on the principle of least privilege:

RolePermission
Authentication Policy Administratorcan configure the Temporary Access Pass policy, including lifetime, but cannot create, view, or delete access passes for users
Privileged Authentication Administratorcan create, view, and delete a Temporary Access Pass for administrators and members, except for themselves
Authentication Administratorcan create, view, and delete a Temporary Access Pass for members, except for themselves

Enable Temporary Access Pass as an Authentication Method

Before users can sign in using a Temporary Access Pass, the authentication method Temporary Access Pass must be enabled. During this configuration, you define which users or groups are allowed to use this method.

Navigate to the Microsoft Entra Admin Center (https://entra.microsoft.com) > Entra ID > Authentication methods > Policies > Temporary Access Pass.

Microsoft Entra admin center showing Authentication Methods policies with Temporary Access Pass enabled for all users

Enable Temporary Access Pass and select users or groups who are authorised to use this sign-in method.

Microsoft Entra Temporary Access Pass settings showing enable toggle and target configuration for all users

Optionally, adjust the default settings of the Temporary Access Pass under Configure.

SettingDefaultValuesComments
Minimum lifetime1 hour10 – 43.200 minutes (30 days)Minimum number of minutes for which the Temporary Access Pass is valid
Maximum lifetime 8 hours10 – 43.200 minutes (30 days)Maximum number of minutes for which the Temporary Access Pass is valid
Default lifetime1 hour10 – 43.200 minutes (30 days)
One-time useFalseTrue / FaseIf the policy is set to No, the Temporary Access Pass can be used either once or multiple times during its validity period.
If the policy is set to Yes, the Temporary Access Pass can only be used once during its validity period.
Length Passcode8 characters8-48 characters

Hint
Set the One-time value to No so that each time a Temporary Access Pass is created, it can be individually defined whether it can be used once or several times during the validity period and thus better fulfil the security guidelines and compliance requirements.

Microsoft Entra Temporary Access Pass configuration showing lifetime settings and passcode length options

Create Temporary Access Pass

After the policy has been enabled, it is possible to create a Temporary Access Pass for an authorized user in Microsoft Entra ID.

Select the users in the Microsoft Entra admin center (https://entra.microsoft.com) under Entra ID > Users > All users.

Microsoft Entra admin center showing user selection in All users list before creating a Temporary Access Pass

Authentication methods > Add authentication method > Temporary Access Pass
The delayed start time, activation duration and single or multiple use can be customised to your own requirements.
To finish, click on Add.

Microsoft Entra admin center showing creation of a Temporary Access Pass for a user with configuration options

The details of the Temporary Access Pass are now displayed.
The passcode is shown only once and cannot be retrieved again after closing the window.
It should therefore be written down.

Microsoft Entra Temporary Access Pass details showing generated passcode and validity period for a user

The user can now sign-in with the created passcode.

Microsoft Entra user authentication methods showing active Temporary Access Pass with expiration time

Use Temporary Access Pass

Usually, a user registers authentication methods during the first signin. The Temporary Access Pass is therefore perfect for setting up or updating multifactor-, passwordless-, or phishing-resistant authentications without having to perform additional security verificatoins.

Registering authentication methods

The registration of authentication methods is done at https://aka.ms/mysecurityinfo. Users can also update existing authentication methods here.

If a user account has activated a Temporary Access Pass, the user automatically uses this authentication method when sign-in.

Sign In with Temporary Access Pass TAP

After successfull sign-in, the user can now register or update passwordless authentication methods such as FIDO2 security keys or Microsoft Authenticator App.
Users who update their authentication methods due to lost credentials or devices should ensure that the old authentication methods are removed here.

Security info

Good to know

Registering a security key (FIDO2)

If a one-time Temporary Access Pass is used to register a security key (FIDO2), the user must complete the registration within 10 minutes of signing in with the one-time Passcode. This restriction does not apply to a Temporary Access Pass created for multiple uses.

Fresh content, explained with practical relevance. Stay up to date via LinkedIn and Bluesky.

LinkedIn BlueSky

No marketing. No noise. Just content.
If this post was helpful, a coffee brings back the rich aroma behind the writing.

Buy Me a Coffee
  1. Securing Identities: Microsoft Authenticator Passkey in Microsoft Entra
  2. Windows Hello for Business: Enhanced Security with Multi-Factor Unlock
  3. Enforce Multi-Factor Authentication (MFA)
  4. Secure Emergency Access: Create and Manage Microsoft Entra Emergency Accounts with YubiKey (FIDO2)
DirectoryEfficiencyEnforceFIDO2Identity and Access Management (IAM)Microsoft Authenticator AppMicrosoft EntraMicrosoft Tenant HardeningMulti-Factor AuthenticationPasswordless Sign InZero Trust Network Access (ZTNA)

Barista

Oliver Mueller My name is Oliver Müller and I have been working with passion and dedication in the IT industry since 1998. The diversity of Microsoft products has fascinated me from the beginning and motivated me to expand my knowledge in this area. As a Microsoft Azure Solutions Architect Expert, Microsoft MVP and MCT, my focus is primarily on the areas of Infrastructure-as-a-Service (IaaS) and Identity and Access Management (IAM).

Regardless of the complexity of the challenges that present themselves to me, I always find the optimal solutions. I often find inspiration over a cup of coffee. My solutions are not only effective but also innovative and future-oriented.

Azure Administrator Associate Azure Solutions Architect Expert
Microsoft MVP Microsoft Certified Trainer
LinkedIn BlueSky Buy Me a Coffee

If this guide was helpful, support the blog ☕

Buy Me a Coffee

Recent Posts

  • Microsoft Entra Global Secure Access Troubleshooting Guide

    4. May 2026

  • Microsoft Entra Backup and Recovery: Prerequisites, Backup, and Restore in Detail

    2. April 2026

  • Microsoft Entra Private Access: Secure Access for External Users to Internal Resources

    7. March 2026

  • Microsoft Entra Private Access BYOD: Access Internal Resources with Entra Registered Devices

    13. February 2026

  • Intelligent Local Access in Microsoft Entra Global Secure Access

    6. February 2026

Updated Posts

  • Microsoft Entra: Roll Over Kerberos Decryption Key

    17. April 2026

  • Securing Identities: Microsoft Authenticator Passkey in Microsoft Entra

    21. March 2026

  • Microsoft Entra Private Access: Secure Access to Internal Resources and Cloud Services without VPN

    14. February 2026

  • Securing Microsoft 365 Apps with Microsoft Entra Global Secure Access

    24. January 2026

  • Microsoft Entra ID Protection: Protect Identities, Detect Risks and Mitigate Threats

    6. December 2025

Backup Browser Extensions Command Line Conditional Access Directory Directory Extensions Disaster Recovery Efficiency Enforce FIDO2 Global Secure Access (GSA) Guest High Availability Identity and Access Management (IAM) Microsoft Authenticator App Microsoft Defender Microsoft Entra Microsoft Entra Connect Microsoft Intune Microsoft Tenant Hardening Migration Multi-Factor Authentication Naming Passthrough Authentication (PTA) Password Hash Synchronization (PHS) Passwordless Sign In Performance Optimization PowerShell Troubleshooting Tutorials Virtual Machines Zero Trust Network Access (ZTNA)

© 2021-2026 cloudkaffee.ch
This site uses cookies to improve the user experience. By continuing to use them, you agree to this.