Office 365 OTP should not be accepted if not supported
The Office 365 Multifactor Authentication barcode is accepted by 1Password but as expected the codes don't work. Other apps like Authy or Google Authenticator seem to be able to determine that they can't generate Office 365's OTPs and thus reject the barcode.
You should either add support for Office 365 or actively reject barcodes which the app isn't sure about.
Comments
-
This content has been removed.
-
Hi @cobaltjacket,
The issue is with the two-step authentication one time password, not with your usual username/password credentials. :)
Thanks!
0 -
This content has been removed.
-
Office 365 for Home is just a standard Microsoft Account. Office 365 for Business is a different account with a custom Multifactor Authentication app. The Office 365 website redirects you to a different login page depending on the type of account.
You actually need to pay a $1 subscription fee to activate TFA on a business account.
0 -
So 1P works with OTP for Office 365 Home but not Office 365 for Business?
0 -
Yes. Even though both are paid services, Office 365 Home just redirects you to the regular Microsoft Account page. Office 365 Business is an Azure Active Directory account. It actually supports using either an app generated code, an SMS code, a telephone call or a push notification which you can just tap. You may be able to add support for just the app generated code.
Editing the security settings on a business account to even enable TFA takes you to the dedicated Azure Active Directory website to manage the account.
0 -
I see. I will clarify the bug report then. Thanks!
0 -
@kathampy I'm currently looking into this problem. Could you possibly share with me the secret (or some variation of the secret) that 1Password captures from the Office 365 for Business site? If the secret is a URL I'd recommend replacing any identifying information with dummy info and the actual secret code with different letters and numbers (but the same length). If you'd prefer to email me the secret you can do so at mrrooni@agilebits.com. Thanks!
0 -
@MrRooni
CODE: 123 456 789
URL: https://abc12defgh34.phonefactor.net/pad/123456789I've randomized the letters but the lengths are the same. This is the information provided to manually configure the app instead of the barcode.
0 -
I'd like to clarify that the Code and the numbers in the URL were not the same, even though I replaced them both with 123456789.
0 -
@kathampy, if you take the code out of that URL and use it in place of the entire phonefactor:// URL in the one-time password field, does it generate a valid one-time password then? Your one-time password field would look like so:
0 -
Using just the Code value doesn't work.
0 -
Thanks for checking @kathampy. I did some more digging and it appears that Office 365 for business uses a one-time password generator that currently has no software development kit for Mac/iOS, so we may be out of luck for now. Are you currently using their app to perform the second factor verification? https://itunes.apple.com/us/app/multi-factor-authentication/id475844606?mt=8
0 -
Yes I'm using their app.
0 -
Okay. Thanks for letting us know about this issue, and for taking the time to further troubleshoot it with us. If we have further questions we'll be in touch!
0 -
+1 For this. I got very confused when 1p accepted the QR code but was generating bogus passwords. It'd be nice to have a message that says that these aren't accepted.
0 -
Thanks for the upvote, Nimish. I just checked and it appears that Microsoft has not yet made their SDK available for iOS. I've created another ticket in our bug tracker to ignore
phonefactor://
TOTP URLs.Let me know if there's anything else I can help with.
0 -
MrRooni,
Is this still the case that there are no SDK? If so I can ask internally about this as I know a lot of MS people use 1Password. However, the reason it might not exist is if you have used the Azure Authenticator app there are multiple ways it works.
1.) OTP code (changes every 60 seconds)
2.) Approval code (Azure app sends you a notification and you must click APPROVE)
3.) Internally MS (Notification sends & Must enter a additional PIN number, iOS you can use Touch ID rather than entering in PIN)Fraud is another big thing from the App you can submit a Fraud attempt on your account which will basically lock the account for security reasons along with notify admins/security teams, etc.
0 -
Greetings @vashachiroku,
Now I hold my hands up and confess I'm no @MrRooni but I think this hasn't changed. I suspect MrRooni won't be around much over the next day or so we'll wait and see if he confirms if this is the case.
0 -
Good morning @vashachiroku. Last I checked there was still no option for us here. If something does become available we will certainly evaluate it. Happy new year!
0 -
Run in the same issue today. But if you select generating OTP without Push and then scan the QR Code it generates a proper OTP thru 1P it only doesn't work if you want the push notification which you can tap with the approve or deny buttons in the app.
0 -
Interesting! Thanks for letting us know, @Stefan Schweizer.
Ben
0