Setting Up Microsoft Authenticator Integration in your Client's M365 Tenant

Introduction

Microsoft's Authenticator app is a great tool to use when verifying someone's identity through the MSP Process platform - it's more secure than just sending an SMS message, it can leverage additional biometric security mechanisms like Apple's FaceID, and it's convenient - your end-users likely already have the Microsoft Authenticator app on their phone.

In order for the MSP Process platform to send a push notification to your end-users, there are configuration steps that must be taken within that end-user's M365 tenant. This KB article will guide you through those steps.

 

Prerequisites

  • Your end-user's M365 tenant must have an Entra P1 license (or higher) assigned to it
  • You must have a set of credentials for your customer's M365 tenant that have Cloud Application Administrator permissions.

Configuring an M365 Tenant

The following steps must be done for each M365 tenant.

  1. Login to the MSP Process UI (https://app.mspprocess.com)
  2. Navigate to Integrations -> Security Integrations
  3. Click the Add New Integration button
  4. Click on Microsoft Authenticator

  5. In the Microsoft window that appears, sign-in to your customer's M365 tenant
  6. Follow the prompts to provide MSP Process with the required permissions; when that's completed, you'll be brought to the following page:
  7. Click the Tap to finish onboarding button
  8. You'll be brought back to the MSP Process UI

At this point, you've setup MSP Process to use Microsoft Authenticator to verify the end-users in that M365 tenant with their Microsoft Authenticator app. You'll now see Microsoft Authenticator available as an option within your PSA:

ConnectWise/Halo PSA:

Autotask: