MFA reset automation is the process of programmatically resetting or re-registering a user's multi-factor authentication methods when they are locked out of their account, using the Microsoft Graph API's authentication methods endpoints. Automated MFA resets reduce the average resolution time from 25–40 minutes to under 60 seconds and can eliminate up to 90% of MFA-related helpdesk tickets.
MFA lockout tickets have quietly become one of the fastest-growing categories in IT support. Three years ago, they barely registered in most organizations' top 10. Today, they are consistently in the top 5 — and climbing. The reasons are structural: more BYOD devices, frequent authenticator app updates that break registrations, and users switching phones without transferring their MFA methods. Every time a user loses access to their second factor, they are completely locked out.
Unlike a password reset, an MFA lockout cannot be solved with self-service. The user cannot verify their identity through MFA to reset their MFA — that is the whole problem. Every one of these tickets requires human intervention, and the average resolution time is 20–35 minutes because of the identity verification step.
The surge in MFA lockout tickets is driven by four trends that are not going away:
Gartner estimates that MFA-related tickets now account for 20–30% of identity and access management workload in organizations with full MFA enforcement. For a 2,000-user company, that can mean 150–250 MFA tickets per month.
Here is what happens today when an MFA lockout ticket comes in:
Total: 25–40 minutes of analyst time per ticket, plus 35–120 minutes of user downtime. At 200 MFA tickets per month and $35/hour analyst cost, that is $2,900–$4,600/month — $35,000–$55,000/year just for MFA resets.
The reason MFA resets are harder to automate than password resets is identity verification. When you reset a password, the risk is moderate — the user gets a temporary password and must change it. When you reset MFA methods, you are removing the primary security control on the account. If an attacker convinces your helpdesk to reset MFA on a target account, they now control that account completely.
Social engineering attacks targeting IT helpdesks for MFA resets are increasing rapidly. The 2023 MGM Resorts breach started with a helpdesk social engineering call. Any MFA reset process — manual or automated — must include robust identity verification that an attacker cannot easily bypass.
Common verification methods and their trade-offs:
Microsoft Graph API provides endpoints for reading and managing a user's authentication methods. These are the key operations for MFA reset automation:
// List a user's registered authentication methods
GET https://graph.microsoft.com/v1.0/users/{userId}/authentication/methods
// Delete a specific authentication method (e.g., phone)
DELETE https://graph.microsoft.com/v1.0/users/{userId}/authentication/phoneMethods/{id}
// Delete an authenticator app registration
DELETE https://graph.microsoft.com/v1.0/users/{userId}/authentication/microsoftAuthenticatorMethods/{id}
// Create a Temporary Access Pass
POST https://graph.microsoft.com/v1.0/users/{userId}/authentication/temporaryAccessPassMethods
{
"lifetimeInMinutes": 60,
"isUsableOnce": true
}The required permission is UserAuthenticationMethod.ReadWrite.All, which is a high-privilege permission. Your app registration should be tightly scoped, and access to trigger MFA resets should be restricted to specific service accounts or automation identities.
This is the safest starting point. The automation detects an MFA lockout ticket, identifies the user, and sends a Teams message or email to their manager asking for confirmation. Once the manager approves, the system resets the MFA methods and generates a Temporary Access Pass, which is sent to the user through a secure channel. The analyst is removed from the loop, but a human (the manager) still provides identity verification.
This approach cuts resolution time from 30 minutes to under 5 minutes (mostly waiting for manager response) and removes all analyst time from the process.
For organizations comfortable with more automation, a risk-based approach can handle low-risk MFA resets automatically while escalating high-risk ones:
Temporary Access Pass is the key enabler for safe MFA reset automation. It is time-limited (you set the duration), can be restricted to single use, and is fully audited in Entra ID sign-in logs. It eliminates the need to keep an analyst on the call while the user re-enrolls.
Teams that implement MFA reset automation typically see these results within the first 90 days:
Support Team implements the risk-based approach with built-in identity verification workflows. It reads MFA lockout tickets from ServiceNow, assesses risk based on the user's sign-in context, and either auto-resolves with a Temporary Access Pass or routes through manager approval — all with a full audit trail. No scripting, no Graph API permissions to manage, and no manual token rotation.
Automated MFA resets are safe when identity verification is performed before the reset. Options include manager approval via email or Teams, a secondary verification channel (SMS to a registered backup number), or risk-based assessment using Azure AD sign-in risk signals. The key is that automation handles the execution, not the authorization decision.
A Temporary Access Pass (TAP) is a time-limited passcode issued by Azure AD that allows a user to sign in and register new MFA methods. TAPs are created via the Microsoft Graph API and expire after a configurable period (1–24 hours). They are the recommended method for MFA re-enrollment because they do not require the user to have any existing MFA method available.
The Graph API call to reset authentication methods or issue a Temporary Access Pass takes under 2 seconds. With manager approval in the loop, the end-to-end time is typically 5–15 minutes (limited by the manager's response time). Without approval requirements, the process completes in under 60 seconds.
Support Team resolves MFA lockout tickets from ServiceNow with risk-based identity verification, Temporary Access Pass generation, and full audit logging. Reduce lockout resolution time by 90% while maintaining the security controls your team requires.
See How It Works