How Microsoft Entra Face Check Fixes Recovery Gap in Phishing-Resistant Authentication

Key Takeaways

  • Microsoft has made phishing-resistant account recovery generally available in Microsoft Entra ID
  • Recovery now uses government ID validation and Face Check identity verification
  • Users can recover accounts and register a new passkey without temporary passwords or OTP fallbacks
  • The recovery process helps preserve phishing-resistant authentication end-to-end

In this post, we are discussing How Microsoft Entra Face Check Fixes Recovery Gap in Phishing-Resistant Authentication. Microsoft recently announced the general availability of new account recovery capabilities in Microsoft Entra ID, designed to support phishing-resistant authentication. The update helps organisations recover user accounts without falling back to weak authentication methods like one-time passcodes or temporary passwords.

Table of Contents

How Microsoft Entra Face Check Fixes Recovery Gap in Phishing-Resistant Authentication

The update addresses a security concern where phishing-resistant authentication often “dies” during account recovery because organisations fall back to weaker methods like OTPs, temporary passwords, or manual helpdesk verification when users lose access to their devices. With the new recovery experience, users verify their identity using government-issued ID validation and Face Check before registering a new passkey or phishing-resistant authentication method.

What’s Changing in Account Recovery

Microsoft is changing how account recovery works in Microsoft Entra ID. Earlier, users who lost their phone or authentication device often had to recover their account using OTPs, temporary passwords, or helpdesk support. These methods were easier for attackers to target.

With the new update, users must first verify their identity using a government-issued ID and Face Check. After verification, they can directly register a new passkey or phishing-resistant authentication method without using weak options. This helps organisations keep the recovery process more secure and maintain phishing-resistant protection even during account recovery.

Patch My PC
  • The screenshot below shows Passkey (FIDO2) settings in the Microsoft Entra admin center showing phishing-resistant authentication configuration options.
Old RecoveryNew Microsoft Entra Recovery Model
OTPs and temporary passwordsGovernment ID verification + Face Check
Manual helpdesk verificationIdentity‑based automated recovery
Weak fallback authenticationPhishing‑resistant recovery flow
Password reset before secure authenticationInline passkey registration after verification
How Microsoft Entra Face Check Fixes Recovery Gap in Phishing-Resistant Authentication -Table.1
Microsoft Entra ID Introduces Phishing-Resistant Account Recovery -Fig.1
Microsoft Entra ID Introduces Phishing-Resistant Account Recovery -Fig.1

Face Check – Based Identity Verification for Secure Account Recovery

Microsoft Entra Verified ID uses Face Check for secure account recovery and identity verification. Users verify their identity by presenting a verified ID and completing a Face Check selfie comparison before accessing helpdesk support or recovering their account. The process is designed to improve trust in recovery workflows and reduce reliance on weak authentication methods like OTPs or manual verification.

See More: MS Entra Face Check Strengthens Identity Verification for Onboarding Access Requests and Account Recovery

How Microsoft Entra Face Check Fixes Recovery Gap in Phishing-Resistant Authentication- Fig.2
How Microsoft Entra Face Check Fixes Recovery Gap in Phishing-Resistant Authentication- Fig.2

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the latest step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, join the WhatsApp Community  and the WhatsApp channel to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Anoop C Nair is a Workplace Technology solution architect with 25+ years of experience. Microsoft Certified Trainer. Microsoft MVP from 2015 onwards for consecutive 11+ years! He is a blogger, Speaker, and Founder of HTMD Community and HTMD Conference. His main focus is on Device Management technologies like Intune, Windows, and Cloud PC. He writes about technologies like Intune, SCCM, Windows, Cloud PC, Entra, and Microsoft Security.

Leave a Comment