Arrange the Root user sign in bleep, enter the password of your basis account. First, close and restart altogether Office applications, or restart your apparatus.
I lost my mobile phone and now I can’t sign in.
Designed for more information, see the Manage your two-factor verification method settings article. Along with MFA turned on, the root abuser of your account is required en route for submit one form of authentication, which is the account password, and a different form of authentication, such as a one-time password OTP from an MFA device. Follow the directions in the email to proceed with the authentication process. Your device is not enabled. Thank you for your feedback!
About two-step verification
Convey feedback about This product This bleep. You may also leave feedback absolutely on GitHub. Sign in to your account normally and choose the Authorize in another way link on the Two-factor verification page. If you are protected by a firewall in your organization, then you might need en route for contact your administrator to obtain the required software. It sounds like it might be helpful to connect you to one of our Office aid agents. Exit focus mode. This at ease is also only intended for abuse with your work or school balance, the account provided to you as a result of your organization for example, alain contoso.
I lost my mobile device or it was stolen
Analysis Comments. Is this page helpful? Ascertain at your own pace. The authenticator app can generate random security codes for sign-in, without requiring any booth signal or Internet connection.
Turn two-step verification on or off
Delay for up to 30 seconds designed for the app to generate a agree with OTP. Want more AWS Security how-to content, news, and feature announcements? Bounce to main content. However, the alike features are provided.