How Do I Set Up Microsoft Authenticator on a Phone or Tablet?
How do I Set Up Windows Security Key?
How Do I Set Up Passwordless Login for Microsoft Authenticator?
Manage Your Microsoft Account Settings
How Do I Log in Using Microsoft Authenticator's Passwordless Feature?
How Do I Log in if Passwordless Sign-in Doesn’t Work?
What Sign-In Methods are available in Microsoft Authenticator?
How Do I Get a Security Key, and What Should I Know Before Choosing One?
Find Additional Support in Microsoft's Authenticator FAQs
All faculty, staff and students have the ability to use Microsoft Authenticator as their two-factor authentication (2fa) method.
*Please note: The Microsoft Authenticator app must be installed on a device such as a smartphone or tablet. It cannot be installed on a computer.
TECH TIP: Download Microsoft Authenticator for Android | Download Microsoft Authenticator for iOS
TECH TIP: Registering associates your device’s operating system type (iOS or Android), version and phone number with your Microsoft 365 account.
TECH TIP: By using a private browser, you can test the Microsoft Authenticator App without having to sign out.
*Please note: The above instructions are the preferred method for installing Microsoft Authenticator. You may also use either option below to set up Microsoft Authenticator.
*Please note: These instructions are for setting up Microsoft Authenticator using only your phone or tablet. If you are using a computer to help set up the app on your phone or tablet, please follow the instructions titled "Set Up Your Phone or Tablet with Help from Your Computer".
TECH TIP: If you see an error while pairing your device that says, “We’re sorry, we ran into a problem. Please choose Next and try again,” make sure the Microsoft Authenticator app is installed before clicking the pairing link. To fix this, close the prompt, install the Authenticator app, then return and add it as one of your authentication methods.
*Please note: While most security key setup processes are similar, there may be slight variations depending on the brand
TECH TIP: UNCW-issued YubiKeys are available in two variants: USB-A and USB-C. Please refer to your specific security key’s vendor documentation for any additional guidance.
TECH TIP: Pick a PIN you can remember and recall easily in the future.
*Please note: Passwordless authentication lets you sign in without typing a password. Instead, it uses other two-factor methods such as biometrics, device-based authentication or hardware keys. Microsoft verifies your identity by combining something you have, like a registered device, with something you are or know, like a fingerprint, FaceID or PIN. This creates a secure login experience without ever entering a password.
TECH TIP: If you do not see "Set Up Passwordless sign-in requests," check the "Ways to sign in or verify" section at the top. If "Passwordless sign-in requests" appears there, then you need to proceed to step 8.
TECH TIP: Alternatively, choose "security key" if you have registered a YubiKey with your UNCW Microsoft Authenticator account.
*Please note: The error message will vary depending on the issue encountered when using passwordless sign-in, such as “Request denied” or “Sorry, we’re having trouble signing you in”. Regardless of the message, you should have the option to sign in another way and follow the same steps.
TECH TIP: UNCW is currently migrating away from Duo as our primary multifactor authentication method. We recommend using Microsoft Authenticator whenever possible.
TECH TIP: The Text SMS method offers the least security and is not recommended.
*Please note: A security key is a small physical device used to securely sign in to applications and services. Security keys are widely regarded as the strongest form of two-factor authentication today because they address the most common real-world attack techniques.
*Please note: If you choose to bring your own security key, ensure it meets the following criteria.
IDO2 / WebAuthn support: This is mandatory for use in our environment
Certified by the FIDO Alliance: Look for official FIDO certification from the manufacturer
User presence verification: Touch, button press, PIN, or biometric confirmation
Hardware-backed key storage: Keys must be generated and stored on the device itself
PIN support: Adds protection if the key is lost or stolen
Multi-device compatibility: USB-A, USB-C, NFC, or Lightning (depending on your devices)
Firmware security: Vendor provides signed firmware and security updates
Durability: Water-resistant and tamper-resistant designs are preferred
Vendor reputation: Established vendors with long-term support histories
If you need further assistance, please submit a service request or CHAT with TAC.