Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Authenticator to Discontinue Password Support and Cease Operations by August 2025

Posted on July 2, 2025July 2, 2025 By CWS

Microsoft has introduced vital modifications to its fashionable Authenticator software, with vital options being discontinued within the coming months. 

Beginning July 2025, the autofill performance inside Microsoft Authenticator will stop operations, adopted by the entire elimination of password accessibility options in August 2025. 

Key Takeaways1. Computerized credential filling function will cease working beginning July 2025.2. Password Entry Ends August 2025: Customers lose the power to retailer and retrieve passwords within the app.3. Two-step verification, TOTP codes, and biometric authentication proceed working.4. Transfer saved passwords to various password managers earlier than the August deadline.

This growth marks a considerable shift in Microsoft’s strategy to multi-factor authentication (MFA) and passwordless authentication methods.

Discontinuation of the Autofill Function

The upcoming adjustments will considerably affect customers who depend on Microsoft Authenticator’s complete safety features. 

The autofill functionality, which allowed customers to populate login credentials throughout varied platforms routinely, would be the first function to be discontinued in July 2025. 

This performance utilized superior cryptographic protocols and safe token era to supply seamless authentication experiences throughout Microsoft 365 functions and third-party providers.

The extra substantial change happens in August 2025, when password storage and retrieval capabilities shall be eliminated solely from the Authenticator app. 

This impacts the app’s skill to function a centralized password supervisor, forcing customers emigrate their saved credentials to various options. 

The technical structure supporting these options, together with encrypted password vaults and synchronization protocols, shall be decommissioned as a part of this transition.

Regardless of these limitations, Microsoft Authenticator will proceed supporting its core two-step verification and multi-factor authentication (MFA) functionalities. 

Customers will nonetheless be capable to generate Time-based One-Time Passwords (TOTP) utilizing the HMAC-based algorithm, obtain push notifications for authentication approval, and make the most of biometric verification strategies, together with fingerprint scanning and facial recognition, by Home windows Hiya integration.

Impression on Passwordless Authentication

The transition primarily impacts Microsoft’s passwordless authentication ecosystem, which depends on FIDO2 and WebAuthn requirements for safe, password-free login experiences. 

Whereas the core passwordless performance stays intact, customers will lose the comfort of built-in password administration throughout the identical software.

Organizations implementing Azure Lively Listing (Azure AD) authentication insurance policies might want to reassess their safety frameworks and probably undertake various password administration options.

IT directors ought to put together for a rise in help requests and take into account implementing Conditional Entry insurance policies to take care of safety requirements throughout the transition interval.

Customers at the moment leveraging Authenticator’s password administration options ought to start migrating their credentials to devoted password managers resembling Microsoft’s personal Password Supervisor throughout the Edge browser, Azure Key Vault for enterprise customers, or third-party options that help SAML and OAuth 2.0 authentication protocols.

The corporate recommends customers proceed using Authenticator for its main authentication capabilities whereas exploring various options for password administration. 

This strategic shift seems to align with Microsoft’s broader concentrate on advancing passwordless authentication applied sciences and inspiring the adoption of safer biometric and hardware-based authentication strategies throughout its ecosystem.

Examine stay malware conduct, hint each step of an assault, and make quicker, smarter safety choices -> Strive ANY.RUN now 

Cyber Security News Tags:August, Authenticator, Cease, Discontinue, Microsoft, Operations, Password, Support

Post navigation

Previous Post: US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’
Next Post: CISA Warns of TeleMessage TM SGNL Vulnerabilities Exploited in Attacks

Related Posts

BlackHat AI Hacking Tool WormGPT Variant Powered by Grok and Mixtral Cyber Security News
Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Cyber Security News
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News
Building a Cyber Incident Response Plan That Works Cyber Security News
HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM Cyber Security News
AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News