maciejrebisz.com

IT

How to use OATH hardware tokens with AzureAD for MFA – Mobile-First Cloud-First

maximios June 25, 2022

We are constantly trying to get more security on login other then username and password, so Multi Factor Authentication (MFA) is a good solution, MFA combined with Azure AD conditional Access it a even better way. MFA is relatively easy to implement in a organisation where the end user has a company owned mobile phone or the end user is willing to use there own mobile phone, but there are industries where this is not possible so we need another solution
In October 2018 Microsoft announced the availability of OATH hardware token support in Azure MFA.

In my opinion it is a great alternative for Microsoft Authenticator app when the end user do not have a mobile device for a reason, but there is a overhead of administrative task like keeping control over what user have witch hardware token, but that just require a process and then you are ready to go.
I have testes :

  • Token2
  • Yubico (Requires an accessory app.)

In this case I do not like the Yubico key do to the requirement of a app – in this blog post I will show and tell of the process with the Token2 key – but because OATH is a standard, you’re not locked to a single vendor.
When you have purchase the OATH hardware keys from your vendor, there is some work you need to do:

  1. Send a mail to Token2 at [email protected] with the serial numbers for you hardware tokens
  2. You are getting a .csv back with the secret key, serial number, time interval, manufacturer, and model for each token.
  3. Then you have to replace [email protected] with your end users UPN
  4. Upload the .csv file to the AzureMFA
  5. Activate the hardware tokens in Azure MFA
  6. Deliver the right hardware token to the right end user

Then you are ready to go.

Requirement: Azure AD P1 or P2

Hardware OATH token

How to get the hardware token .csv file into Azure MFA:

Start your favorite portal for Azure AD : https://aad.portal.azure.com

  1. Click Azure Active Directory
  2. Click MFA

  1. Click OATH tokens
  2. Click Upload

Point to your .csv file you got from Token2 or any other vendor you have

After a success upload of the .csv file you can see a status – also if somethings have failed

Then you just need to activate the hardware token by clicking Activate

You will be prompted for a verification code that you get from the hardware token

After activation your tokens you can see the activation status in the portal

That is all you need to do – now you can deliverer the right hardware token to the right end user!

How does the end user experience look like:

When you get the sign in page for Azure AD the end user just enters there username as normal

After they entered the password – they will get the MFA challenge in this case a 5 digit code from the hardware token.

Some times the end user get a message that Azure AD need more information

Then they just need to verify there hardware token.

Happy deployment!

Read more:
Hardware OATH tokens in Azure MFA in the cloud are now available

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ How to deploy O365 with SCCM Technical Preview – Mobile-First Cloud-First › New compliance settings for Windows 10 when using Conditional Access – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes