{"id":39943,"date":"2026-03-01T10:10:20","date_gmt":"2026-03-01T09:10:20","guid":{"rendered":"https:\/\/borncity.com\/win\/?p=39943"},"modified":"2026-03-02T10:16:04","modified_gmt":"2026-03-02T09:16:04","slug":"mc1179154-microsoft-authenticator-locks-itself-when-jailbreak-root-access-is-used","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2026\/03\/01\/mc1179154-microsoft-authenticator-locks-itself-when-jailbreak-root-access-is-used\/","title":{"rendered":"MC1179154: Microsoft Authenticator locks itself when jailbreak\/root access is used"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/blog\/2026\/02\/27\/mc1179154-microsoft-authenticator-sperrt-sich-bei-jailbreak-root-zugriff\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A quick note for people who use the Microsoft Authenticator app on an iPhone or Android device. Microsoft has announced that, as of February 24, 2026, it will first warn and then block EntraID logins on devices with jailbreak (iOS) or root access (Android) and finally delete the data. This change will be implemented gradually and is expected to be completed by mid-2026.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/fcb383dbe80e48dc898880641eb8bd22\" alt=\"\" width=\"1\" height=\"1\" \/>One user had pointed out the upcoming change in <a href=\"https:\/\/borncity.com\/blog\/2026\/01\/28\/exchange-online-microsoft-verschiebt-smtp-auth-basic-authentication-abschaltung\/#comment-248528\" target=\"_blank\" rel=\"noopener\">this comment<\/a>. However, I had come across the announcement <a href=\"https:\/\/mc.merill.net\/message\/MC1179154\" target=\"_blank\" rel=\"noopener\">MC1179154 &#8211; Microsoft Authenticator app: Upcoming changes to jailbreak and root detection<\/a> in the Microsoft 365 Message Center.<\/p>\n<p><a href=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2026\/02\/image-119.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-321915 size-full\" title=\"MC1179154 - Microsoft Authenticator app: Upcoming changes to jailbreak and root detection\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2026\/02\/image-119.png\" alt=\"MC1179154 - Microsoft Authenticator app: Upcoming changes to jailbreak and root detection\" width=\"640\" height=\"503\" \/><\/a><\/p>\n<p>Microsoft's announcement is quite clear: From the end of February 2026, the Microsoft Authenticator app will recognize jailbroken devices running iOS and Android devices with root access. The Microsoft Authenticator app will block logins with Entra credentials on such devices.<\/p>\n<p>There will be gradual warnings, then a lockout, and finally a deletion of the login data. This security feature is activated automatically and cannot be disabled. Users of devices without jailbreak\/root access are not affected.<\/p>\n<ul>\n<li>General availability will begin worldwide for Android at the end of February 2026 and is expected to be completed in mid-2026.<\/li>\n<li>General availability will begin worldwide for iOS in April 2026 (instead of March) and is also expected to be completed in mid-2026.<\/li>\n<\/ul>\n<p>For both platforms, an extension from April 2026 to mid-2026 has already been planned.\u00a0Users of devices with jailbreak or root access will experience the rollout in three phases. The estimated interval between the three phases is approximately one month.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone \" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2026\/02\/93b5053c2bbedfdc6446212f216d768d28143b6c.png\" alt=\"Warnung bei Jailbreak-Ger\u00e4ten\" width=\"370\" height=\"701\" \/><\/p>\n<p><strong>Phase 1<\/strong> \u2013 <strong>Warning mode:<\/strong> Users simply receive a warning that their device has been jailbroken or rooted and will be blocked in the future (see screenshot above for iOS or screenshot below for Android).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone \" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2026\/02\/64e2a62f447ae5bc37f9cd3b102b5738eedca612.png\" alt=\"Warnung bei gerooteten Ger\u00e4ten\" width=\"347\" height=\"694\" \/><\/p>\n<p><strong>Phase 2 \u2013 Lock mode:<\/strong> Users cannot register Entra login details or log in via Authenticator. This is then communicated to the user in corresponding messages, which are documented via screenshot under MC1179154 <a href=\"https:\/\/mc.merill.net\/message\/MC1179154\" target=\"_blank\" rel=\"noopener\">MC1179154<\/a>.<\/p>\n<p><strong>Phase 3 \u2013 Delete mode:<\/strong> Existing Entra login details are deleted from devices with jailbreak or root access. Here, too, the corresponding messages are documented via screenshot under <a href=\"https:\/\/mc.merill.net\/message\/MC1179154\" target=\"_blank\" rel=\"noopener\">MC1179154<\/a>.<\/p>\n<p>Microsoft recommends that the help desk and users be provided with appropriate information. The tenant administrator can specify on the EntraID administrator page whether the Microsoft Authenticator app with the \"Microsoft push method\" is mandatory for 2FA. If only a time-based one-time password (TOTP) is configured, open-source authenticator apps should also be usable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A quick note for people who use the Microsoft Authenticator app on an iPhone or Android device. Microsoft has announced that, as of February 24, 2026, it will first warn and then block EntraID logins on devices with jailbreak (iOS) &hellip; <a href=\"https:\/\/borncity.com\/win\/2026\/03\/01\/mc1179154-microsoft-authenticator-locks-itself-when-jailbreak-root-access-is-used\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,26,580,1547],"tags":[60,2992,27,69,1544],"class_list":["post-39943","post","type-post","status-publish","format-standard","hentry","category-android","category-ios","category-security","category-software","tag-android","tag-authenticator","tag-ios-2","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=39943"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39943\/revisions"}],"predecessor-version":[{"id":39944,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39943\/revisions\/39944"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=39943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=39943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=39943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}