Mfa Token Office 365

0 views
Skip to first unread message

Stephani Kapnick

unread,
Aug 5, 2024, 3:22:53 AM8/5/24
to brinefflamec
Thisis the primary method current tools are using to identify active tokens, and I utilise a Microsoft 365 account (product name correct at the time of posting) with my Windows login.. so what gives?

It is worth nothing that the RPC stubs generated differ depending on the version of Windows, for example in Windows 10 we find that field counts change on input structures, so keep this in mind if you receive the dreaded (0x800706F7) - The stub received bad data. error.


RSA is a multi-factor authentication (MFA) technology that is used to protect network services. The RSA authentication mechanism consists of an assigned hardware or software "token" that generates a dynamic authentication number code at fixed intervals. Users provide the unique number code when logging into a protected service from any network outside the State network.


Please answer the five security questions (answers are not case sensitive). Select "Submit Your Request." Security questions allow you to unlock your account without assistance and provide future verification of user authentication.


First-time software token users are required to install the Microsoft Outlook App on mobile devices and add your email account (refer to Steps 1 and 2). Users who have already installed the Microsoft Outlook App should proceed to Step 3.


Note: Once the app is installed and your email account has been added, you will occasionally be prompted to re-enter your credentials and RSA token code to access email via the app. Refer to steps 3 and 4.


Note: Once the app is installed and your email account has been added, you will occasionally be prompted to re-enter your credentials and RSA token code to access email via the app. Refer to steps 3 and 4.


If you forget or need to change your PIN, log into the Self-Service Console using your email address and password, then click "Troubleshoot," select "I forgot my PIN." At the next screen, enter your new PIN and confirm.


For a software token (e.g., the RSA app), your token code is the eight-digit number generated after entering your PIN on the RSA app. On your software token, the token refreshes every sixty seconds. If you have difficulty logging in after providing the token, ensure the correct PIN was entered.


Your hardware token generates a random, six-digit number every sixty seconds. Your token code in this case is your PIN followed the generated number (the six random digits) from the hardware token, with no spaces between them.


Instead, users can have the token from their old phone redistributed to their new phone. Call the NYS Helpdesk at 844-891-1786, and after proper verification, the NYS Helpdesk or appropriate Zone Tech can redistribute the token to the user's new phone.


Go to , and do not log in. Click on "Troubleshoot RSA Token." Enter your email address and answer the identifying questions. Upon submission of correct answers, your RSA account will no longer be locked.


After entering too many incorrect passcodes, you may be required to enter a next token code. If using a software token, wait and then enter the next available token code shown. If using a hardware token, wait and then enter the next available token code shown (random 6 digits). Do not enter your PIN + the token code.


We are having an issue on a few of our clients using office 365 on terminal servers. Random users are having to log back in to reactivate office when they start for the day. I know it is due to their Tokens expiring but am not sure what is causing it.


We have gone through 5 support tickets with Microsoft that all basically end with them thinking there is no problem as users can just log in to reactivate but our clients are getting a bit frustrated. Does anyone know or could you point me towards an article as to what addresses the tokens are using to authenticate so we can check to see if maybe they are being blocked somehow?


The terminal servers in question are all installed on server space we rent in a datacenter, due to an unrelated issue we have found that their network is configured a little strangely. Since it is only the servers in the rented space that are having problems it seems like this may be the cause of the issue but I am not sure of what exactly is doing it. Is there a way to test our connection to the Microsoft servers that handle the token activations?


Just a single server, users log into the server and the profiles are stored just like they are logging into the server directly so user settings are stored in their profile. Not sure if I am explaining that correctly for what you are asking but it is a pretty simple setup with nothing like a user profile disk.


it is just the standard log in screen as though they have not logged into office before. Microsoft support said it is a token expiry issue but will not do root cause analysis, since the solution is that the user just logs in again they consider the issue resolved even though it is an on going problem.

Thanks again,

Wendell

activate.PNG800650 85.1 KB


Using this method, your add-in can obtain an access token scoped to your server back-end API. The add-in uses this as a bearer token in the Authorization header to authenticate a call back to your API. Optionally, you can also have your server-side code.


To use SSO with an Outlook add-in, you must enable Modern Authentication for the Microsoft 365 tenancy. For information about how to do this, see Enable or disable modern authentication for Outlook in Exchange Online.


To use SSO, your Outlook add-in will need to have a server-side web API that is registered with Azure Active Directory (AAD) v2.0. For more information, see Register an Office Add-in that uses SSO with the Azure AD v2.0 endpoint.


XML manifest: Add a WebApplicationInfo element at the end of the VersionOverridesV1_1 VersionOverrides element. Then, add its required child elements. For detailed information about the markup, see Configure the add-in.


Unified manifest for Microsoft 365 (preview): Add a "webApplicationInfo" property to the root ... object in the manifest. Give this object a child "id" property set to the application ID of the add-in's web app as it was generated in the Azure portal when you registered the add-in. (See the section Register your add-in earlier in this article.) Also give it a child "resource" property that is set to the same Application ID URI that you set when you registered the add-in. This URI should have the form api:///. The following is an example.


In most scenarios, there would be little point to obtaining the access token, if your add-in does not pass it on to a server-side and use it there. For details on what your server-side could and should do, see Add server-side code.


When using the SSO token as an identity in an Outlook add-in, we recommend that you also use the Exchange identity token as an alternate identity. Users of your add-in may use multiple clients, and some may not support providing an SSO token. By using the Exchange identity token as an alternate, you can avoid having to prompt these users for credentials multiple times. For more information, see Scenario: Implement single sign-on to your service in an Outlook add-in.


There are additional steps to take if your add-in uses event-based activation or integrated spam reporting (preview). For more information, see Use single sign-on (SSO) or cross-origin resource sharing (CORS) in your event-based or spam-reporting Outlook add-in.


Access tokens are a type of security token designed for authorization, granting access to specific resources on behalf on an authenticated user. Information in access tokens determine whether a user has the right to access a particular resource, similar to keys unlocking specific doors in a building. These individual pieces of information that make up tokens are called claims. Therefore, they are sensitive credentials and pose a security risk if not handled correctly. Access tokens differ from ID tokens which serve as proof of authentication.


Access tokens enable clients to securely call protected web APIs. Although client applications can receive and use access tokens, they should be treated as opaque strings. The client application should not attempt to validate access tokens. The resource server should validate the access token before accepting it as proof of authorization. The contents of the token are intended only for the API, which means that access tokens must be treated as opaque strings. For validation and debugging purposes only, developers can decode JWTs using a site like jwt.ms. Tokens that a Microsoft API receives might not always be a JWT that can be decoded.


Clients should use the token response data that's returned with the access token for details on what's inside it. When the client requests an access token, the Microsoft identity platform also returns some metadata about the access token for the consumption of the application. This information includes the expiry time of the access token and the scopes for which it's valid. This data allows the application to do intelligent caching of access tokens without having to parse the access token itself. This article explains essential information about access tokens, including formats, ownership, lifetimes and how APIs can validate and use the claims inside an access token.


All documentation on this page, except where noted, applies only to tokens issued for registered APIs. It doesn't apply to tokens issued for Microsoft-owned APIs, nor can those tokens be used to validate how the Microsoft identity platform issues tokens for a registered API.


There are two versions of access tokens available in the Microsoft identity platform: v1.0 and v2.0. These versions determine the claims that are in the token and make sure that a web API can control the contents of the token.


Set the version for applications by providing the appropriate value to the accessTokenAcceptedVersion setting in the app manifest. The values of null and 1 result in v1.0 tokens, and the value of 2 results in v2.0 tokens.

3a8082e126
Reply all
Reply to author
Forward
0 new messages