Microsoft Authenticator App Installation Process for Android

Introduction

 

http://www.stcloudstate.edu/its/_files/images/rightnow/office365/mfa/microauthlogo.jpg

 

If you haven't yet gone through the beginning set up of Multi-Factor Authentication (MFA) on your Office365 account or you are unfamiliar with MFA practices in general and would like to know more, Please visit the parent page: Setting up Multi-Factor Authentication with Office365

 

Instructions

 

1. On your Android smartphone, navigate to the Google Play Store App.

2. In the search bar, type Microsoft Authenticator. Then click the first option shown below.

http://www.stcloudstate.edu/its/_files/images/rightnow/office365/mfa/andr2.png

3. Click Install.

 Note: You may need to enter your Google password if prompted.

 

***To finish up the setup process, refer to Mobile App step 2a on the Setting Up Multi-Factor Authentication with Office365 article. 

Known Issues

If your phone puts the Microsoft Authenticator app into Battery save mode, (that means it won’t be running in the background) the app may not prompt you for an ‘approve’ or ‘deny’ access. You may need to have the app open to receive the prompts or open the app and click on the code. (This is applicable on both iPhone and Android)

 

 

 

Details

Article ID: 118272
Created
Tue 10/13/20 4:07 PM
Modified
Fri 1/27/23 3:15 PM

Related Articles (7)

How to stay ahead of potential Phishing and what to do if caught
How to install the MFA Authenticator for iPhone
Enable passwordless authentication when using the Microsoft Authenticatior app for MFA
Multi-factor authentication enrollment instructions for users who are prompted to enroll into multi-factor authentication to access their Office 365 account.
How to make changes to your Office 365 MFA verification methods.

Related Services / Offerings (2)

Report an IT security issue or event such as phishing, virus, scams, suspected hacking of account, etc. For confidential matters, please submit a ticket for "Request IT Security Assistance for Confidential Matters".
Request IT security assistance for confidential matters including but not limited to investigations, litigation, hold requests, compliance (HIPAA, PCI, etc.), requests for confidential information