Microsoft Is Eliminating SMS Codes for Two-Factor Authentication
Users will soon need to set up an alternative, like a passkey.
Emily Long Freelance Writer
Experience
Emily Long is a freelance writer based in Salt Lake City.
After graduating from Duke University, she spent several years reporting on the federal workforce for Government Executive, a publication of Atlantic Media Company, in Washington, D.C. She has nearly a decade of experience as a freelancer covering tech (including issues related to security, privacy, and streaming) as well as personal finance and travel.
In addition to Lifehacker, her work has been featured on Wirecutter, Tom’s Guide, and ZDNET. Emily has also worked as a travel guide around the U.S. and as a content editor. She has a masters in social work and is a licensed therapist in Utah.
May 21, 2026
Add as a preferred source on Google
Credit: PixieMe/Shutterstock
Key Takeaways
Microsoft is eliminating text-based authentication codes for personal accounts. Users will be prompted to set up passkeys instead. Passkeys use your device's built-in authentication, such as a face scan, fingerprint scan, or PIN and are highly secure.Table of Contents
If you have a Microsoft account that uses SMS for two-factor authentication, you may soon have to choose a more secure method for logging in. As reported by Windows Latest, the company is ditching text-based authentication codes for personal accounts, stating that these are "now a leading source of fraud." Users will be prompted to set up a passkey instead.
Microsoft is trying to eliminate passwords
Microsoft has already started moving toward a password-less environment—last year, the company made passkeys the default on new accounts at setup. Now, it is phasing out SMS codes for 2FA and account recovery in favor of passkeys, authenticator apps, and verified backup email addresses.
SMS codes are quick to set up and convenient to use. However, they are also among the least secure forms of multi-factor authentication (MFA), as they are highly susceptible to phishing and SIM swapping attacks. Authenticator apps (which generate temporary codes that change every 30 seconds) may be slightly better, but the best MFA option is one based on WebAuthn credentials, like biometrics and passkeys.
Passkeys use your device's built-in authentication, such as a face scan, fingerprint scan, or PIN. They can also be synced across devices via password management services. Once you've established your passkey, you can authenticate logins anywhere using one of those methods on your trusted device. Passkeys can't be phished or stolen, and they only work on the legitimate domain they're made for (so they won't prompt you to authenticate if you're trying to log into a spoofed site). They also require that your trusted device be physically close to the device you're logging in on, so they can't be used to access your accounts remotely.
What do you think so far?
While there doesn't appear to be a set date for cutting off SMS authentication, Microsoft users should expect to make this transition to an alternative method soon.
The Download Newsletter Never miss a tech story
Jake Peterson
Get the latest tech news, reviews, and advice from Jake and the team.
The Download NewsletterNever miss a tech story. Get the latest tech news, reviews, and advice from Jake and the team.
JaneWalter