Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤️ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1179154

Microsoft Authenticator app: Upcoming changes to jailbreak and root detection

Plan for Change

Message ID

MC1179154
View in Admin Center

Services

Microsoft Entra

Summary

Starting February 2026, Microsoft Authenticator will detect jailbroken/rooted devices and block Entra credentials on iOS and Android. The rollout includes warning, blocking, and wiping phases. This security feature is automatic with no opt-out. Users on non-jailbroken/rooted devices remain unaffected. Notify users and helpdesk accordingly.

Details

Updated January 22, 2026: We have updated the timeline. Thank you for your patience.

Introduction

Starting end of February 2026, we will introduce jailbreak and root detection for Entra credentials in the Microsoft Authenticator app on both iOS and Android platforms. This change enhances security by preventing Entra credentials from functioning on jailbroken/rooted devices. All existing Entra credentials on jailbroken or rooted devices will be wiped to protect your organization. This capability is secure by default and does not require any admin configuration or control.

When this will happen 

General Availability (Worldwide iOS) rollout begins in end of February 2026 and is expected to complete in May 2026 (previously April).

General Availability (Worldwide Android) rollout begins in March 2026 (previously February) and is expected to complete in June 2026 (previously April).

How this affects your organization

Who is affected: All users of Microsoft Authenticator on iOS and Android whose Entra credentials are registered on jailbroken or rooted device. This is going to be a continuous check.

What will happen:

  • The feature is secure by default and enabled to all customers. There is no opt-out capability..
  • Users on jailbroken or rooted devices will experience the following phased rollout. An estimated gap between 3 phases is ~ 1 month.
    • Phase 1 – Warning Mode: Users receive a warning that their device is jailbroken or rooted and will be blocked in the future (screenshots 1-4): 
    • user settings

      user settings

      user settings

      user settings

    • Phase 2 – Blocking Mode: Users are blocked from registering Entra credentials or signing in via Authenticator (screenshots 5-8):
    • user settings

      user settings

      user settings

      user settings

    • Phase 3 – Wipe Mode: Existing Entra credentials are wiped from jailbroken or rooted devices (screenshots 9-11):
    • user settings

      user settings

      user settings

  • Users on non-Jailbroken or non-rooted devices will not be affected.

What you can do to prepare

  • Notify users about this upcoming change. Users will see error messages or banners in the Authenticator app during warning or blocking phases. These screens are dismissible but indicate the device status.
  • Communicate to helpdesk staff that Authenticator will become unusable for Entra accounts on jailbroken or rooted devices.
  • Update internal documentation if you reference Authenticator usage.
  • No admin action is required to enable or configure this feature.

Learn more: About Microsoft Authenticator | Microsoft Support

Compliance considerations

No compliance considerations identified, review as appropriate for your organization.

Timeline

📅
Published
Oct 24, 2025
Message published to Message Center
✏️
Updated
Jan 22, 2026
Message content updated
🏁
End Date
Jul 30, 2026
Message timeline ends

Tags

#Updated message#Feature update#User impact#Admin impact

Category

📋Plan for Change

Related Messages

Similar updates

MC1123830●

Microsoft Entra: Action Required – Update Conditional Access Policies for Azure DevOps Sign-ins

Jul 28, 2025
MC1097272●

Microsoft 365 Upcoming Secure by Default Settings Changes

Jun 17, 2025
MC1097225●

Entra ID: Upcoming changes to support passkey profiles in the authentication methods policy (preview)

Jun 17, 2025
MC1024404●

Microsoft Entra: Browser access will be enabled by default for all Android users

Mar 5, 2025
MC1192252

External authentication methods (EAM) – Public preview update

Dec 5, 2025