Office 365 and Azure AD support several options for multi-factor authentication, including SMS message, Microsoft Authenticator app, and OATH hardware tokens. In In this article, we will provide detailed information about how to set up OATH hardware tokens with Azure MFA and how to use OATH hardware tokens them in Office 365 MFA login.
Table of Contents | ||
---|---|---|
|
Pre-Programmed Token vs Programmable Token
There are 2 types of OATH hardware tokens, pre-programmed and programmable tokens.
Pre-Programmed Tokens
Pre-programmed tokens are the tokens programmed at the factory by the manufacturer, and they can be used out of the box. Deepnet Security provides several pre-programmed OATH hardware tokens such as SafeID/Classic, SafeID/Mini, etc.
...
Click here to see the complete list of SafeID pre-programmed tokens.
Programmable Tokens
Programmable tokens are designed to be programmed by customers and users. Deepnet Security also provides several programmed programmable OATH hardware tokens such as SafeID/Diamond and SafeID/QR
...
Set up OATH pre-programmed hardware tokens with Azure MFA
...
Expand | ||||
---|---|---|---|---|
|
...
- Use Azure AD Portal
- Use SafeID Token Service
Azure AD Portal
...
|
...
|
Set up OATH programmable hardware tokens
...
- Assign tokens to users
- Upload tokens to Azure AD
- Activate Tokens
In step 1, you will need to edit the secret file of the hardware tokens with a text editor and assign all of your tokens to your users by adding the user's UPN against the token's serial number, one by one
In step 2, you will need to upload the secret file of the hardware tokens on to Azure AD
In step 3, you will need to activate tokens by providing a verification code from the token, one by one.
Click here for detailed instructions on how to set up pre-programmed hardware tokens with Azure AD
SafeID Token Service
...
with Azure MFA
Expand | ||||||
---|---|---|---|---|---|---|
|