Setting Up Microsoft Authenticator Integration in your Client's M365 Tenant
Introduction
Microsoft's Authenticator app is a great tool to use when verifying someone's identity through the MSP Process platform - it's more secure than just sending an SMS message, it can leverage additional biometric security mechanisms like Apple's FaceID, and it's convenient - your end-users likely already have the Microsoft Authenticator app on their phone.
In order for the MSP Process platform to send a push notification to your end-users, there are configuration steps that must be taken within that end-user's M365 tenant. This KB article will guide you through those steps.
Prerequisites
- Your end-user's M365 tenant must have an Entra P1 license (or higher) assigned to it
- You must have a set of credentials for your customer's M365 tenant that have Cloud Application Administrator permissions.
Configuring an M365 Tenant
The following steps must be done for each M365 tenant.
- Login to the MSP Process UI (https://app.mspprocess.com)
- Navigate to Integrations -> Security Integrations
- Click the Add New Integration button
- Click on Microsoft Authenticator
- In the Microsoft window that appears, sign-in to your customer's M365 tenant
- Follow the prompts to provide MSP Process with the required permissions
- ; when that's completed, you'll be brought to the following page:
- Click the Tap to finish onboarding button
- You'll be brought back to the MSP Process UI
At this point, you've setup MSP Process to use Microsoft Authenticator to verify the end-users in that M365 tenant with their Microsoft Authenticator app. You'll now see Microsoft Authenticator available as an option within your PSA:
ConnectWise/Halo PSA:
Autotask: