Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
January 26, 2021January 26, 2021

Enabling Self Service Password Reset (SSPR) for your Modern Workplace users

On modern workplaces we use authentication techniques provided by Windows Hello for Business, like biometric and PIN. Due to this, user don’t login with their password all the time. Nowadays Microsoft even recommends to not set any password expiration policies because passwords which expire make users select predictable passwords, composed of sequential words and numbers which are closely related to each other. So, by forcing users to create complex passwords and by making sure that common passwords cannot be used anymore and by using multi-factor authentication techniques we can keep the account more secure.

If users work primarily on their Windows 10 modern workplace and sign-in using their biometric details or PIN, they might forget their password though since it’s never asked. Companies especially see this happening after holidays, where end users returning from their holiday have forgotten their password.

By enabling Self Service Password Reset (SSPR) in your Azure Active Directory you can delegate the task of resetting a password back to the user. This can save you a lot of support calls. The functionality relies on the fact that users have a 2nd authentication factor configured and needs to be setup first by the user before it can be used. SSPR is a functionality which requires at least Azure Active Directory Premium P1 licensing for all users using its functionality.

This blogpost will go through the necessary steps giving you an overview on how to enable it, configure it and use it from both an user and administrator perspective.

Enabling Self Service Password Reset

SSPR can be enabled from the Azure Active Directory admin portal, the settings related to SSPR can be found under the Password Reset section. After enabling the feature for All or a selected set of users (based on Azure AD group). While testing the setup it might be a good idea to enable the functionality for a specific set of users first.

Azure Active Directory admin center 
All services > Insight24 3.V. > Password reset 
Password reset I Properties 
O 
— All 
—pplicstions 
Privllegee Identit._ 
Z•otectio 
Irgightu - Active 
p rcblems 
Authenticstion methods 
Regisæticn 
Notifietions 
Customiztion 
intægryticn 
Audit logs 
Lege & insights 
+ Support 
re guest 
Self 
pus" o rd 
O appt} to end in cæyniztiom Admirg for 
to to Click to —m mare 
* iciE_
Enable Self Service Password Reset

Configuring Self Service Password Reset

You can configure SSPR first without it being enabled, this is handy because you can execute the configuration first, below are the settings you can make:

Authentication Methods

On the authentication methods page you can define the number of alternate methods of identification a user must have to reset their password. This should either be one or two alternate methods.

You can also specify which methods are available for the user, to use when using the SSPR functionality. These methods must be registered first of course, the best way to that that is to use the Security Info section on their My Sign-ins page. You can redirect users using the shorturl: https://aka.ms/setupsecurityinfo

The following methods are available:

  • Mobile App Notification
  • Mobile App code (verification code)
  • Email
  • Mobile Phone
  • Office Phone
  • Security Questions

With Mobile app notification and Mobile app code you must have setup the Mobile app first, this can be done by redirecting your users to either the MFA setup page or by using the Security Info registration page. There are some restrictions when using the Mobile app though.

When you configure the number of alternate methods of identification to “1”, you can only use verification code from the Mobile app and not the Notification option, the option to select Mobile app notification will be greyed out. When this setting is set to “2”, both options can be used. You also cannot select the Authenticator app and only one additional method, in that case you must at least have two additional methods selected. The reason for this restriction has to do with the fact that the old SSPR registration experience, available via https://aka.ms/ssprsetup didn’t provide the option to register for MFA, this is now solved by the new preferred way to setup SSRP (and MFA) by using the Security Info registration page.

Number of meth±s 
must to use or token 
Methods 
v' spp notificstion 
O Gn app at or st 
info yc_lr by fzlQing steps st 
Authentiä&- app visit 
v' spp 
O Gn app at or info st 
info registryt& f7 by folQing steps st 
nfodcc_ usirg Authentiä&- app visit 
Mobile phon 
Offce phone 
questions 
O appt} to end in 'N*niztiom Admirg for 
to to —d_ Click to —m 
AdministæW- *iciæ.
Allowed authentication methods and requirements

If security questions are selected, new options appear in the configuration page, you must specify the amount of questions the user must answer in order to register, and the amount of questions which must be correctly answered in order to be allowed to reset their password.

To specify the security question, the Administrator can either choose to use Predefined questions, or to create new ones. The predefined questions which can be selected are:

  • In what city did you meet your first spouse/partner?
  • In what city did your parents meet?
  • In what city does your nearest sibling live?
  • In what city was your father born?
  • In what city was your first job?
  • In what city was your mother born?
  • What city were you in on New Year’s 2000?
  • What is the last name of your favorite teacher in high school?
  • What is the name of a college you applied to but didn’t attend?
  • What is the name of the place in which you held your first wedding reception?
  • What is your father’s middle name?
  • What is your favorite food?
  • What is your maternal grandmother’s first and last name?
  • What is your mother’s middle name?
  • What is your oldest sibling’s birthday month and year? (e.g. November 1985)
  • What is your oldest sibling’s middle name?
  • What is your paternal grandfather’s first and last name?
  • What is your youngest sibling’s middle name?
  • What school did you attend for sixth grade?
  • What was the first and last name of your childhood best friend?
  • What was the first and last name of your first significant other?
  • What was the last name of your favorite grade school teacher?
  • What was the make and model of your first car or motorcycle?
  • What was the name of the first school you attended?
  • What was the name of the hospital in which you were born?
  • What was the name of the street of your first childhood home?
  • What was the name of your childhood hero?
  • What was the name of your favorite stuffed animal?
  • What was the name of your first pet?
  • What was your childhood nickname?
  • What was your favorite sport in high school?
  • What was your first job?
  • What were the last four digits of your childhood telephone number?
  • When you were young, what did you want to be when you grew up?
  • Who is the most famous person you have ever met?

You can also specify some question questions, like “What’s the name of your favorite user group?”

Select security questions 
X Delete 
In Whyt city first spou*/psr-tner? 
In Whyt city did 
In Whyt city wu your f.ther bam? 
In Whyt city wu your first job? 
What is the list of t"cher- in 
at ßur food? 
at ßur mother's middle 
high 
What's the nyme 
of gmup?
Selected security questions by an admin

Registration

Under registration you can configure if users are required to register their authentication methods when signing in. This setting only applies to end users. Administrators are always enabled for self-service password reset and are required to use two authentication methods to reset their password.

If registration is required, unregistered users are prompted to register their own authentication information when they sign in for the first time. If registration is not required, you’ll have to provide your users with a link to the Security Info registration page set to “No,” or configure some of the settings on the Authentication methods page of the user properties in Azure AD.

Jan Bakker, wrote an interesting article on how to provision some of the authentication methods coming from other systems which you provide to Power Automate which populate the authentication methods using the Graph API.

Check: Prepopulate phone methods for MFA and SSPR using Graph API

You can also specify the interval in days when users are required to re-confirm their authentication information. If this is set to 0 users never have to re-confirm, the maximum value is 730 days.

Notifications

On the notifications page you can specify whether users are notified after their password is reset using the SSPR functionality. The user receives an email on their primary and alternate email address. You can also specify if other admins (global administrators) receive a notification in case one of the administrators changes its password using SSPR.

Customization

On the customization page, you can specify a custom helpdesk email or URL for end users to see. There are quite some scenario’s where SSPR will not work and you might want to provide your end users with information about how to reach out to IT support when needed.

On-Premises Integration

If you are using Azure AD Connect to synchronize your on-premises identities coming from Active Directory to Azure AD you can configure the On-premises integration option.

In order for this to work, you must make sure that password writeback is enabled in the Azure AD connect configuration.

Enable Azure Active Directory password writeback | Microsoft Docs
Azure AD connect Password writeback configuration

You must also make sure that the on-premises account used for Azure AD connect, has enough rights on the user objects to perform the password reset/unlock of the account. If you used “defaults” during the configuration of Azure AD Connect the MSOL_<random number> account already has the necessary rights. If you decided to use a pre-created account you must verify if this account has the necessary rights. See: Configure account permissions for Azure AD Connect on how to configure the AD account with just enough rights to perform password resets on behalf of the user.

Reporting on SSPR usage

Once SSPR is setup and in use, you can use the Usage & insights page to view some statistics about the registration and usage within your organization. 

Registration usage 
Last refreshed: 1/22/2021 114928 AM a 
Users registered for Multi-Factor 
Authentication 
152 
of211 
of ',nzur organization isn't 
registered. 
See who's not registered. 
Last refreshed: 1/22/2021, AM O 
Registrations by authentication method 
Users registered for self-service 
password reset 
167 
of211 
of ',nzur organization isn't 
registered. 
See who's not registered. 
Users enabled for self-service 
password reset 
211 
of211 
All users are ensiled! 
Users who can reset their own 
passwords 
167 
of211 
of ',nzur organization can't 
reset their own æsswords. 
See cer,'t reset their own 
pass no rd. 
oof. 
Date 
Last 30 days 
Last 30 days 
9 
18 If
Reporting on registration and usage

On the Registration page you can see some figures about:

  • Users registered for Multi-factor authentication
  • Users registered for SSPR
  • Users enabled for SSPR
  • Users who can reset their own password

The page also provides some hyperlinks to more concrete information, like who the users are not registered for MFA. From that page you can also download the list of users.

On the Usage page you can see a report on the usage of SSPR within your organization. You can specify a maximum timeframe of 30 days, and the report will show you the authentication methods used. Also here you can use a hyperlink to end up on a page with more concrete information.

Setup SSPR as an end user

When an end user who has no authentication methods defined, or hasn’t registered for SSPR yet logs on, he/she will be provided with a “More information required” notice. When the user clicks Next they are redirected to the Security info registration page, where they can either provide or validate their authentication methods.

  • User is requested to provide more information
  • User needs to verify whether the current information is up to date
  • User needs to setup 2 authentication methods to register. Microsoft authenticator is the preferred first option
  • You can change the method by clicking on the “I want to set up a different method” links, which allows you to select another method
  • Once selected, you must setup your Microsoft Authenticator app
  • Scan the QR Code
  • And verify
  • 2nd method by default is phone
  • Provide the 6 digit code sent to your phone by SMS
  • Here you can also modify your method to Email or Security Questions
  • Provide answers to the security questions
  • SMS is verified
  • Configuration is done
  • You can add other methods later from the Security info page

How can user change its password?

The user can change its password in several ways. The methods are:

  • By using the Forgot my password link on the sign-in page
  • By clicking on the reset password link on the Windows 10 login screen
  • By browsing to the Self Service Password Reset page using either https://aka.ms/sspr or https://passwordreset.microsoftonline.com/

Forgot my password on the sign-in page

If a user signs-in to Azure AD, the user can use the “Forgot my password” link on the Enter password page when signing in to the web.

  • User has forgotten password and clicks, Forgot my password
  • User needs to verify that he/she is human
  • User is provided with option for verification method
  • User provides code received using SMS
  • User provides code from the configured authenticator app
  • User can now change password
  • Password has been reset
  • User receives email on primary and alternate email addresses about password change

What about Admins?

Admin accounts are enabled for SSPR by default, also they have to use 2 authentication methods to be able to reset their password. So, the policy for administrators can be different from the one defined for your end users. Administrators cannot use the security questions as an authentication factor.

The policy applies when 30 days have elapsed in a trial subscription, a custom domain has been configured for the Azure AD tenant and when Azure AD connect is in use to sync identities from on on-premises Active Directory.

The following administrative roles are considered admin accounts:

  • Helpdesk administrator
  • Service support administrator
  • Billing administrator
  • Partner Tier1 Support
  • Partner Tier2 Support
  • Exchange administrator
  • Skype for Business administrator
  • User administrator
  • Directory writers
  • Global administrator or company administrator
  • SharePoint administrator
  • Compliance administrator
  • Application administrator
  • Security administrator
  • Privileged role administrator
  • Intune administrator
  • Application proxy service administrator
  • Dynamics 365 administrator
  • Power BI service administrator
  • Authentication administrator
  • Privileged Authentication administrator

You can disable the use of SSPR for administrator accounts using the Set-MsolCompanySettings PowerShell cmdlet. The -SelfServePasswordResetEnabled $False parameter disables SSPR for administrators.

If an admin resets its password, other admins will be notified as well.

Microsoft on behalf of Contoso <msonlineservicesteam@microsofto 
nline.com> 
Fri 1/22/2021 8:09 PM 
To: Allan Deyoung 
Cc: Isaiah Langer, Lidia Holloway; MOD Administrator: Nestor Wilke; provisioninguser4@M365x102715.OnMicrosoft.com others 
Password reset notification 
The password on the following account in your organization has recently been reset. 
MeganB@M365x102715.OnMicrosoft.com 
• First Name: Megan 
Last Name: Bowen 
If you believe that this account's password has been reset by a malicious user, please 
consider resetting this account's password manually or enabling multi-factor 
authentication in order to protect from further attacks. 
Sincerely, 
Contoso 
Reply 
Reply all 
This do rot to this 
Forward
Notification of admin password reset, other admins are notified too..

Clicking on the reset password link on the Windows 10 login screen

You can enable a “Reset password” link at the password login screen of a Windows 10 device. Microsoft explains how to enable this functionality via a custom OMA-URI configuration policy setting the ./Vendor/MSFT/Policy/Config/Authentication/AllowAadPasswordReset with a value of 1. More about setting up this functionality in this article: Enable Azure Active Directory self-service password reset at the Windows sign-in screen

  • Reset password appears on the password login screen
  • User verifies account, can also fill in another account
  • SMS verification is used
  • Verification of the received code via SMS
  • Notification on authenticator app must be approved
  • password can be changed

Conclusion

Enabling Self Service Password Reset (SSPR) is a welcome addition for your Microsoft Modern Workplace. It’s easy to setup, customizable to your needs and even not too complex to setup if you synchronize your identities using Azure AD Connect. My suggestion would be to enable this in your tenant and explain your users how to leverage its functionality.

For the rollout, Microsoft provides all kind of material which can help you bring the message to your end users, you can find that here: Self-service password reset rollout materials

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← Self Service Purchasing for Power Platform, Visio and Project, should you keep it enabled or disable the functionality?

6 thoughts on “Enabling Self Service Password Reset (SSPR) for your Modern Workplace users”

  1. Pingback: Enabling Self Service Password Reset (SSPR) for your Modern Workplace users – blog by @kennethvs
  2. Pingback: Modern Workplace Management key takeaways from the Microsoft Ignite March 2021 announcements | Modern Workplace Blog
  3. Pingback: Modern Workplace Management key takeaways from the Microsoft Ignite March 2021 announcements - Tech Daily Chronicle
  4. Pingback: Have you already started your journey towards Passwordless authentication on your Modern Workplace? | Modern Workplace Blog
  5. Pingback: Preventing account breaches leveraging SIM swapping techniques by nudging your users to start using the Microsoft authenticator app | Modern Workplace Blog
  6. noemail says:
    May 30, 2024 at 7:50 pm

    never stated what roles or permissions are required to setup SSPR in azure. Is Global Administrator required or is there a granular permissions subset that can accomplish the task of setup and or troubleshooting?

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT