A Temporary Access Pass (TAP) is a time-limited passcode that lets a user sign in when they can’t use their passkey. It’s the main recovery mechanism when someone loses their device or gets locked out.

Before you can issue TAPs

Your IT admin must have TAP enabled as an authentication method in Entra. If you try to issue one and the option isn’t available, contact your admin team and point them at Enabling Temporary Access Pass for the config steps.

How to issue a TAP

Prerequisites

  • You need at least the Authentication Administrator role in Entra (or a custom role with microsoft.directory/users/authenticationMethods/create permission). This is Microsoft’s documented minimum for issuing a TAP to non-admin users; for privileged users you need Privileged Authentication Administrator. Source: Configure a Temporary Access Pass.
  • If giving helpdesk staff the full Authentication Administrator role feels broader than you want, the custom-role approach above is the least-privilege path - it grants only TAP issuance (and other auth-method management on users) without the rest of Authentication Administrator.
  • You have verified the user’s identity

Step-by-step

  1. Go to Entra portal > Users
  2. Search for and select the user
  3. Click Authentication methods in the left menu
  4. Click + Add authentication method
  5. Select Temporary Access Pass
  6. Configure the settings:
    • Start time: defaults to now (use this unless the user needs it later)
    • Lifetime (hours): how long the TAP is valid
    • One-time use: whether the TAP can be used once or multiple times within its lifetime
  7. Click Add
  8. Copy the TAP immediately - it’s shown only once

Add authentication method dialog with Temporary Access Pass selected, showing start time, lifetime in hours, and one-time use toggle

Generated TAP code displayed after creation, visible only once before it must be copied and delivered to the user

View in Entra portal

Delivering the TAP to the user

Secure delivery is critical. If an attacker intercepts the TAP, they can sign in and register their own passkey.

Recommended delivery methods (in order of preference):

  1. Read it over the phone during the verified call (best for remote users)
  2. In person - show the screen or hand them a printout (best for on-site users)
  3. Encrypted message via a pre-established secure channel

Never send a TAP via:

  • Unverified email (the user’s account is compromised if they lost their device)
  • SMS to an unverified phone number
  • Slack/Teams message to a session you can’t confirm is legitimate

TAP settings guidance

Lifetime (duration)

Scenario Recommended lifetime
Device loss recovery 1 hour
New employee onboarding (first passkey setup) 8 hours
Scheduled device replacement 2 hours
Troubleshooting (user will try multiple times) 2 hours

Keep it as short as practical. A longer TAP is a longer window of vulnerability.

One-time use vs multi-use

One-time use (recommended for most scenarios):

  • TAP works for a single sign-in, then expires regardless of remaining lifetime
  • Best for device loss recovery where the user just needs to sign in once to register a new passkey
  • Limits damage if the TAP is intercepted

Multi-use:

  • TAP can be used for multiple sign-ins within its lifetime
  • Useful for onboarding when the user needs to sign in to multiple services to complete setup
  • Use with caution - each additional use is an additional risk window

Organization-wide TAP policy

Your IT admin can set default TAP parameters at the policy level:

  • Minimum lifetime: prevents helpdesk from issuing TAPs that are too short to be useful
  • Maximum lifetime: prevents excessively long TAPs
  • Default one-time use: organization’s default setting

These guardrails help maintain consistency even when different helpdesk staff issue TAPs.

What the user does with the TAP

  1. Go to https://mysignins.microsoft.com/security-info
  2. At the sign-in page, enter their email address
  3. When prompted for authentication, enter the TAP
  4. Once signed in, immediately register a new passkey
  5. Test the new passkey by signing out and back in
  6. The TAP expires (if one-time use) or can be left to expire naturally

Revoking a TAP

If you issued a TAP and need to revoke it (user didn’t need it, or you suspect compromise):

  1. Go to Entra portal > Users > [user] > Authentication methods
  2. Find the Temporary Access Pass in the list
  3. Click Delete

The TAP becomes immediately unusable.

Logging and auditing

Every TAP issuance is logged in the Entra audit log. For security reviews, you can report on:

  • Who issued the TAP (helpdesk agent)
  • Who the TAP was issued for (user)
  • When it was issued and when it was used
  • Whether it was one-time or multi-use

If your organization requires approval workflows for TAP issuance, consider building a process around this - even a simple Teams/Slack approval from a team lead before issuing to high-risk accounts.

Dig deeper

Where to go next

Report issue