Skip to content

Commit e8bd360

Browse files
authored
Merge pull request #12503 from kenwith/fix/auth-transfer-expand-554715
[CA Quality] Expand authentication transfer article (WI 554715)
2 parents ab89bed + b7f0190 commit e8bd360

1 file changed

Lines changed: 125 additions & 13 deletions

File tree

Lines changed: 125 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,152 @@
11
---
22
title: Authentication transfer as a condition to secure mobile users
3-
description: Learn how authentication transfer can connect users to apps across desktop and mobile devices.
3+
description: Learn how authentication transfer connects users to apps across desktop and mobile devices, including supported apps, end-user experience, limitations, and troubleshooting.
4+
ai-usage: ai-assisted
45
ms.topic: concept-article
5-
ms.date: 03/24/2026
6+
ms.date: 04/22/2026
67
ms.reviewer: anjusingh, ludwignick
78
---
89
# Conditional Access: Authentication transfer (preview)
910

10-
## Overview
11+
Authentication transfer is an authentication flow that simplifies cross-device sign-in from PC to mobile for Microsoft apps. Users can use a QR code in an authenticated Microsoft app on their PC to sign in to the same app on a mobile device without reentering credentials. Authentication transfer increases user engagement by connecting users on multiple platforms.
1112

12-
Authentication transfer is a new authentication flow that simplifies cross-device sign-in from PC to mobile for Microsoft apps. Authentication transfer lets you transfer authentication from one device to another, like desktop to mobile. Authentication transfer increases user engagement by connecting users on multiple platforms. Users can use a QR code in an authenticated app on their PC to sign in to a mobile app.
13+
> [!NOTE]
14+
> Authentication transfer is currently in preview. For more information about previews, see [Universal License Terms For Online Services](https://www.microsoft.com/licensing/terms/product/ForOnlineServices/all).
1315
14-
:::image type="content" source="media/concept-authentication-transfer/authentication-transfer-in-policy-example.png" alt-text="Screenshot of an example Conditional Access policy that uses authentication with a block control." lightbox="media/concept-authentication-transfer/authentication-transfer-in-policy-example.png":::
16+
:::image type="content" source="media/concept-authentication-transfer/authentication-transfer-in-policy-example.png" alt-text="Screenshot that shows an example Conditional Access policy that uses authentication transfer with a block control." lightbox="media/concept-authentication-transfer/authentication-transfer-in-policy-example.png":::
17+
18+
## Prerequisites
19+
20+
- A Microsoft Entra ID P1 license is required for each user subject to Conditional Access policies that manage authentication transfer. For more information about licensing, see [Plan a Conditional Access deployment](plan-conditional-access.md).
21+
- To create or modify Conditional Access policies that manage authentication transfer, sign in as at least a [Conditional Access Administrator](../role-based-access-control/permissions-reference.md#conditional-access-administrator).
22+
- Authentication transfer is enabled by default for all users. No initial configuration is required for users to use the feature.
23+
24+
## How authentication transfer works
25+
26+
Authentication transfer lets you transfer authentication claims from one device to another, such as from a desktop PC to a mobile device. The following steps describe the flow:
27+
28+
1. A user signs in to a supported Microsoft app on their PC and completes any required authentication, including multifactor authentication (MFA).
29+
1. The app displays a QR code that the user can scan with their mobile device.
30+
1. The user scans the QR code using a supported Microsoft app on their mobile device.
31+
1. Microsoft Entra ID evaluates all applicable Conditional Access policies for the target mobile app.
32+
1. If the policies are satisfied, the authentication claims transfer to the mobile device and the user is signed in automatically.
33+
1. If the policies aren't satisfied, the transfer fails and the user is prompted to sign in manually on the mobile device.
34+
35+
Authentication transfer only transfers authentication claims. Device-related claims, like device compliance state, don't transfer to the target device. The mobile device must independently satisfy any device-based Conditional Access requirements.
36+
37+
When a user performs authentication transfer, the session is considered [protocol tracked](concept-authentication-flows.md#protocol-tracking). Protocol tracking means that the session state persists through subsequent token refreshes. Subsequent sign-in attempts within the same session might be subject to authentication flows policy enforcement, even if they don't use authentication transfer.
38+
39+
## Supported apps
40+
41+
Authentication transfer is available for Microsoft apps that support the cross-device QR code flow. For example, users might see a QR code in the desktop version of Outlook that, when scanned on their mobile device, transfers their authenticated state to the mobile version of Outlook. Support varies by app and version. Check the relevant Microsoft app documentation to confirm whether it supports authentication transfer.
42+
43+
> [!IMPORTANT]
44+
> Authentication transfer isn't supported for non-Microsoft apps.
45+
46+
## End-user experience
47+
48+
The authentication transfer experience is designed to reduce friction for users who work across multiple devices.
49+
50+
**On the desktop (source device):**
51+
52+
- The user is signed in to a supported Microsoft app on their PC.
53+
- A QR code appears within the app, offering to transfer the session to a mobile device.
54+
55+
**On the mobile device (target device):**
56+
57+
- The user opens a supported Microsoft app and scans the QR code.
58+
- If all Conditional Access policies are satisfied, the user is signed in automatically without reentering credentials or completing MFA again.
59+
- If any Conditional Access policy isn't satisfied for the mobile device, the user is prompted to sign in manually. The user might need to complete MFA or meet other requirements on the mobile device.
1560

1661
## Authentication transfer and Conditional Access
1762

18-
During authentication transfer, all Microsoft Entra Conditional Access policies get evaluated. Authentication transfer only transfers authentication claims; it doesn't transfer device-related claims.
63+
During authentication transfer, all Microsoft Entra Conditional Access policies are evaluated. Understanding how policies interact with authentication transfer helps you secure your organization while maintaining user productivity.
64+
65+
**Authentication claims transfer, device claims don't:**
66+
67+
- Authentication transfer only transfers authentication claims. It doesn't transfer device-related claims like compliance state or managed status.
68+
- If a Conditional Access policy requires device compliance or a managed device, the mobile device must meet those requirements independently.
69+
70+
**MFA isn't required again if already completed:**
71+
72+
- If users complete MFA on their PC, they don't need to perform MFA again on their mobile device during authentication transfer.
73+
74+
**Conditional Access policies are evaluated before transfer:**
75+
76+
- Conditional Access policies are evaluated before authentication transfer completes. If a policy isn't met for the mobile device, the user is prompted to sign in manually.
1977

20-
- With authentication transfer, if users perform multifactor authentication (MFA) on their PC, they don't need to perform MFA on their mobile device.
21-
- With authentication transfer, Conditional Access policies are evaluated before transferring the authentication. If a policy isn't met for the mobile device, the user is prompted to sign in manually.
22-
- Authentication transfer bypasses non-Microsoft mobile device management (MDM) solutions when transferring authentication to mobile devices.
23-
- With authentication transfer, users must reauthenticate on their PC even if they sign in with protected session tokens, like the Primary Refresh Token. They don't need to reauthenticate on mobile apps.
78+
**Non-Microsoft MDM bypass:**
79+
80+
- Authentication transfer bypasses non-Microsoft mobile device management (MDM) solutions when transferring authentication to mobile devices. This bypass means that organizations relying on non-Microsoft MDM solutions to enforce access controls might have a security gap during authentication transfer. If your organization uses a non-Microsoft MDM solution, consider [blocking authentication transfer](policy-block-authentication-flows.md#authentication-transfer-policies) for affected users or apps.
81+
82+
**Primary Refresh Token (PRT) reauthentication:**
83+
84+
- Users must reauthenticate on their PC to initiate authentication transfer, even if they have protected session tokens like the Primary Refresh Token. After reauthentication on the PC, users don't need to reauthenticate on the mobile app.
85+
86+
## Known limitations
87+
88+
Review the following limitations before you enable or manage authentication transfer in your organization:
89+
90+
- **Device claims don't transfer.** Only authentication claims transfer to the mobile device. Device compliance, managed state, and other device-related claims must be satisfied independently on the mobile device.
91+
- **Non-Microsoft MDM bypass.** Authentication transfer bypasses non-Microsoft MDM solutions. Organizations that depend on non-Microsoft MDM for mobile access control should evaluate the security implications. For more information, see the [Zero Trust guidance on blocking authentication transfer](../../fundamentals/zero-trust-protect-identities.md#authentication-transfer-is-blocked).
92+
- **Microsoft apps only.** Authentication transfer is only available for Microsoft apps. Non-Microsoft apps don't support this flow.
93+
- **Protocol tracking.** After a user performs authentication transfer, the session is [protocol tracked](concept-authentication-flows.md#protocol-tracking). Other sign-in attempts within the same session might be subject to authentication flows policies, even if they use a different authentication flow.
94+
- **PRT reauthentication required.** Users must reauthenticate on their PC to start authentication transfer, even with an existing Primary Refresh Token session.
95+
96+
## Security considerations
97+
98+
Microsoft recommends that organizations evaluate whether authentication transfer is necessary for their users. The [Zero Trust guidance for protecting identities](../../fundamentals/zero-trust-protect-identities.md#authentication-transfer-is-blocked) recommends blocking authentication transfer as a security best practice.
99+
100+
Blocking authentication transfer helps protect against token theft and replay attacks by preventing the use of device tokens to silently authenticate on other devices. When authentication transfer is enabled, a threat actor who gains access to one device could potentially access resources on nonapproved devices, bypassing standard authentication and device compliance checks.
101+
102+
Consider the following recommendations:
103+
104+
- **Block authentication transfer** unless you have a documented business need for cross-device sign-in. Use a Conditional Access policy to [block authentication transfer](policy-block-authentication-flows.md#authentication-transfer-policies).
105+
- **Use report-only mode** first to understand how authentication transfer is used in your organization before enforcing a block.
106+
- **Exclude emergency access accounts** from any policy that blocks authentication transfer.
24107

25108
## Authentication transfer in sign-in logs
26109

27-
Admins can check the sign-in logs to see if their users are using authentication transfer to sign in. Authentication transfer usage appears under **Authentication Details** in the Microsoft Entra sign-in logs. Admins see events back to back, with the first event showing a QR code as the authentication method.
110+
Admins can check the [Microsoft Entra sign-in logs](../monitoring-health/concept-sign-ins.md) to see if users are using authentication transfer to sign in. Authentication transfer events appear back to back, with the first event showing a QR code as the authentication method.
111+
112+
To check the protocol tracking state of a sign-in, select the sign-in event and find the **Original transfer method** property in the **Basic info** portion of the **Activity details: sign-ins** pane. For a session in which authentication transfer was performed, the **Original transfer method** is set to **Authentication transfer**.
28113

29114
## Manage authentication transfer for specific users and apps
30115

31-
Authentication transfer is enabled by default for all users. Admins manage authentication transfer using Conditional Access policies and the condition [authentication flows](concept-authentication-flows.md). This condition restricts authentication transfer use to specific users, apps, or turns off the functionality.
116+
Authentication transfer is enabled by default for all users. Admins manage authentication transfer using Conditional Access policies and the [authentication flows](concept-authentication-flows.md) condition. This condition restricts authentication transfer to specific users, apps, or disables the functionality entirely.
32117

33118
Authentication transfer checks all applicable Conditional Access policies before signing the user into a mobile app. If the required conditions aren't met, the user is prompted to sign in on the mobile app.
34119

35120
To create a policy that uses the authentication transfer condition, see [Block authentication transfer with Conditional Access policy](policy-block-authentication-flows.md#authentication-transfer-policies).
36121

122+
## Troubleshooting
123+
124+
Use the following steps to troubleshoot issues with authentication transfer.
125+
126+
**Authentication transfer fails for a user:**
127+
128+
1. Check the [sign-in logs](../monitoring-health/concept-sign-ins.md) for authentication transfer events. Look for the QR code authentication method entry.
129+
1. Select the sign-in event and navigate to the **Conditional Access** tab to identify which policies were evaluated and whether any blocked the transfer.
130+
1. Verify that the target mobile device meets all Conditional Access requirements, including device compliance and location policies.
131+
132+
**Unexpected blocks after using authentication transfer:**
133+
134+
1. Check if the sign-in is blocked by a [protocol tracking](concept-authentication-flows.md#protocol-tracking) state from a previous authentication transfer or device code flow session.
135+
1. In the sign-in logs, select the blocked sign-in and check the **Original transfer method** property in the **Basic info** section. If it shows **Authentication transfer** or **Device code flow**, the session was protocol tracked.
136+
1. If your authentication flows policy applies to all applications, you might see the error code `AADSTS530036`. This error indicates the refresh token is invalid due to authentication flow checks by Conditional Access.
137+
138+
**Users can't initiate authentication transfer:**
139+
140+
- If a Conditional Access policy manages authentication transfer for the user, verify the user has a Microsoft Entra ID P1 license assigned.
141+
- Verify no Conditional Access policy blocks authentication transfer for the user's group or target app.
142+
- Confirm the user is using a supported Microsoft app on both the source and target devices.
143+
144+
For more information about troubleshooting authentication flows, see [Troubleshooting unexpected blocks](concept-authentication-flows.md#troubleshooting-unexpected-blocks).
145+
37146
## Related content
38147

39148
- [Block authentication transfer with Conditional Access policy](policy-block-authentication-flows.md#authentication-transfer-policies)
40-
- Learn more about [Conditional Access conditions](concept-conditional-access-conditions.md).
149+
- [Conditional Access: Authentication flows](concept-authentication-flows.md)
150+
- [Conditional Access: Conditions](concept-conditional-access-conditions.md)
151+
- [Plan a Conditional Access deployment](plan-conditional-access.md)
152+
- [Zero Trust guidance: Protect identities](../../fundamentals/zero-trust-protect-identities.md#authentication-transfer-is-blocked)

0 commit comments

Comments
 (0)