MSEndpointMgr

Unlocking Self-Service Account Recovery (SSAR) in Microsoft Entra

Self-Service Account Recovery (SSAR) is finally here for Microsoft Entra ID! Are you planning or running a passwordless tenant and wondering what to do when your users lose access to all their authentication methods? Well, wonder no more – Microsoft has delivered what many of us have been waiting for! (Especially those of us that have had to knick the ol’ SSPR service to go 100% Passkey)


Quick Facts: Self-Service Account Recovery (Click to expand)
  • Feature Name
    • Self-Service Account Recovery (SSAR)
  • Status
    • Public Preview (as of December 2025)
  • License Required
    • Microsoft Entra ID P1 or higher
  • Supported IDV Providers
    • AU10TIX, IDEMIA, TrueCredential (LexisNexis)
  • Dependencies
    • Verified ID, Face Check, TAP policy
  • Recovery URL for users
    • https://aka.ms/mfasetup

So what exactly is SSAR?

Definition: Self-Service Account Recovery (SSAR) is a Microsoft Entra ID feature that enables users to regain access to their accounts through government ID verification and biometric liveness checks when they’ve lost all authentication methods.

Self-Service Account Recovery (SSAR) is Microsoft’s answer to a long-standing problem in identity management: what to do when someone loses everything. Phone stolen? Authenticator wiped? Hardware token gone missing? Your pet ostrich swallowed the FIDO key… In the passwordless world, this used to mean a trip to the welpdesk, where someone would have to somehow verify you are who you say you are – often using nothing more than “security questions” or a gut feeling (and they really had better things to do that day).

SSAR changes the game entirely. Instead of relying on human judgment alone (which attackers love to exploit through social engineering), users can now verify their identity using government-issued ID and biometric liveness checks that is AI assisted. It’s like SSPR, but for the modern passwordless era – and it actually seems pretty secure (Always remember: Hackers are two steps ahead!).

Self-Service Account Recovery (SSAR) explainer cartoon by Michael Mardahl and Nano banana

Why should you care?

  • Self-Service Account Recovery brings SSPR-like functionality to the passwordless world.
  • Your helpdesk will thank you (fewer “My ostrich ate my laptop, phone and fido key” tickets).
  • Social engineering attacks on account recovery are eliminated-ish.
  • Users can recover access on their own if they have proper government ID available.
  • It’s the missing piece for true passwordless adoption IMHO.

If you’re already running Verified ID and Face Check in your tenant (perhaps for some cool on-boarding solution), you’re halfway there. If not… well, keep reading! and I’ll walk you through the entire setup.

Prerequisites

Before we dive into configuring Self-Service Account Recovery, make sure you have the following in place:

  • Microsoft Entra ID P1 license (or higher).
  • An Azure subscription (for the IDV provider billing).
  • Verified ID enabled and configured in your tenant.
  • Face Check add-on enabled with a validated Azure subscription.
  • Authentication Administrator role in Microsoft Entra.
  • Contributor or Billing Administrator role for your Azure subscription.
  • And I think you should also have migrated to the new authentication methods policy controls. 😀

The Solution

I’ll walk you through setting up SSAR with AU10TIX as the identity verification provider. We’ll scope it to a specific group of users first (always a good idea with preview features), and then test the recovery flow.

Step 1: Verify that Verified ID and Face Check are Enabled

Before configuring SSAR, we need to make sure the underlying services are ready.

  1. Sign in to the Microsoft Entra admin center as a Global Administrator.
  2. Navigate to Verified ID in the menu.
  3. Under Overview, verify that you have configured something like the image below. Else you will see the option for Quick Setup, where you click the get started button and follow the wizard till done. And you will see something like this:
    • Verified ID showing the default employee credential
  4. Now just scroll down a bit and activate the Face Check add-on if not already done.
  5. Verify that Face Check shows a validated Azure subscription.

If either of these are not configured, you’ll need to set them up first. Face Check requires linking an Azure subscription for billing purposes (You get like a bunch of free credits, so worry not about your finances at this point).

I am purposefully not going into minute details on how to setup these things, as it is very straightforward to just follow the wizards that are built-in. And go with all the defaults.

Step 2: Create a Security Group for SSAR

I prefer to scope new preview features to a controlled group of users before rolling out to the masses. And for SSAR you are forced to assign to a group anyways… Let’s create an ACL group for this purpose.

  1. In the Microsoft Entra admin center, navigate to Identity > Groups > All groups.
  2. Click New group.
  3. Configure the group as follows:
    • Group type: Security
    • Group name: acl_ssar_enabled (I like the acl abbreviation from my days as an AD admin, but group naming is entirely up to you!)
    • Group description: Users enabled for Self-Service Account Recovery
    • Membership type: Assigned (or Dynamic if you prefer)
  4. Add your test users to the group
    • These should be real users who have completed actual sign-ins, else you will have to do some fake sign-ins before testing. also important to note, you should have a government ID for these users, so don’t be faking it soo much in your tests. Since the service will match on First name and Last name. Meaning that you now have to fire all people that have the same first and last name. I would personally go with the Last-In First-Out rule.
      (For those without sarcasm, I must explain that I am kidding. But the duplicate name thing is a real issue. You can’t have people with the same first and last name in your assignment group. period)
  5. Click Create.

Step 3: Configure Account Recovery

Now for the main event – let’s set up SSAR.

  1. In the Microsoft Entra admin center, navigate to Entra ID > Account recovery (Preview).
    • SSAR Account Revoery button in Entra portal
  2. Under Set up account recovery, click Get started.
    • Account recovery Get started
  3. Under Choose a recovery mode, select Production then click Next.
    • Choose a recovery mode for SSAR
    • Note: Evaluation mode lets users test the identity verification flow but won’t actually recover accounts. Since we want the full experience, we’re going straight to Production – but with a scoped group, so don’t worry bruh!
  4. Under User group selection, click Select groups.
    • Search for and select your acl_ssar_enabled group.
    • User group selection for SSAR included users scope
  5. Click Next when you see the group added to the include list.

Step 4: Subscribe to an Identity Verification Provider

This is where we set our IDV provider through the Microsoft Security Store.

  1. Under Identity verification providers, you’ll see the available options: AU10TIX, IDEMIA, and TrueCredential (LexisNexis).
  2. Select AU10TIX by clicking Get solution in the AU10TIX box.
    • Selecting an identity verification provider for SSAR
      • I am simply using AU10TIX as an example here, I am not directly recommending them. It was just the easiest for me to use them in the demo, as I already use IDEMIA due to them being EU based, like me.
  3. Click Marketplace to open the Microsoft Security Store.
  4. Make sure you are signed-in with an account that has Owner or Contributor rights on your Azure subscription (required for billing).
  5. On the AU10TIX overview page, click Get solution.
    • Microsoft Security Store view of the Au10tix IDV solution
  6. Configure the SaaS subscription:
    • Billing subscription: Select your Azure subscription
    • Resource group: I simply use the same one as I did for the Face Check billing)
    • Resource name: Give it a descriptive name like “au10tix-ssar”
    • Plan: Select your preferred pricing plan (I choose the Free Trial, and disabled auto-renewal)
  7. Click Next, review your order, and click Place order.
  8. When the subscription is ready, click Configure account now.
  9. Complete the activation in the AU10TIX portal by providing the required details.
  10. After seeing Success, return to the Microsoft Entra admin center (It takes some time to provision, and you get a bunch of e-mails you can archive).
  11. PRO TIP: Afterwards you can always return to the security store to view the solutions (and cancel them) via the Management -> My solutions view.
    • Solutions view in the Microsoft Security Store

Step 5: Finalize Account Recovery Setup

  1. Back in the Account Recovery setup wizard, the Identity verification provider should now show AU10TIX as Subscribed.
  2. Click Select next to AU10TIX.
  3. Click Next to proceed to the review page.
  4. Review your configuration:
    • Recovery mode: Production
    • User groups: acl_ssar_enabled
    • Identity verification provider: AU10TIX
  5. Click Done to complete the setup.

You should now see the Account Recovery home page showing your configuration in Production mode with AU10TIX (or your choice) as the subscribed provider. Here is a screenshot from my production tenant where I use IDEMIA:
SSAR fully configured

Testing Account Recovery

Now for the moment of truth – let’s test the recovery flow!

IMPORTANT: The Undocumented Gotcha

Here’s something I discovered the hard way, and it’s not documented anywhere by Microsoft:

You MUST initiate the account recovery process via https://aka.ms/mfasetup – NOT through normal portal logins!

If you try to test recovery through the standard login portals (like portal.azure.com or portal.office.com), you’ll get an unhelpful AADSTS55200: The continuation_token is invalid error immediately after clicking “Recover your account.”

SSAR error message - AADSTS55200: The continuation_token is invalid

I spent hours troubleshooting this, checking Verified ID credentials, Face Check configuration, and IDEMIA/AU10TIX setup – only to discover the issue was simply where I was starting the recovery flow.

It also seems to work when doing it form inside a Microsoft App like Teams on the smartphone, but I was just testing, so did not bother with signing-out of my apps or setting up a separate user and smartphone just for this. I only tested from within the Microsoft Authenticator app by trying to add a new user account via the sign-in feature. But that was also completely broken! which is a shame, because it would be the best place to start IMHO.

The Correct Way to Test

  1. Open an InPrivate/Incognito browser session.
  2. Navigate to https://aka.ms/mfasetup.
  3. Enter the UPN of your test user (must be a member of acl_ssar_enabled).
  4. When prompted for authentication, click Other ways to sign in.
    • SSAR account recovery - sign-in another way
  5. Click Recover your account.
    • SSAR - Recover your account
  6. You’ll be presented with information about the recovery process. Click Next to proceed.
  7. You’ll be redirected to the IDV provider for identity verification:
    • Choose your country and identification method
    • Upload/scan your government-issued ID
    • Complete the liveness check (selfie time!)
  8. After successful verification, a Verified ID credential is issued to your Microsoft Authenticator app.
  9. Complete the Face Check in Microsoft Authenticator.
  10. Upon successful verification, you’ll receive a Temporary Access Pass (TAP).
  11. Use the TAP to sign in and register new authentication methods. Preferably directly in the authenticator app – You can go straight to Passkey setup if you have completely disabled the old SSPR for the user account and enabled Passkeys as the only method allowed!

“He who remembers a thousand passwords carries a thousand burdens. He who uses a passkey carries only his finger.”

– Confucius, probably


User Profile Requirements

For the identity verification to succeed, the user’s First name and Last name in Entra ID must match the details on their government-issued ID. The Display Name is not used in this process.

Make sure your test users have these properties correctly filled in:

  • Navigate to Users > select the user > Properties > Edit properties
  • Verify that First name and Last name match their government ID exactly

Mismatches like “John” vs. “Jonathan” or complex surnames will cause the verification to fail! (At least during preview).


Troubleshooting (Click to expand)
  • AADSTS55200: The continuation_token is invalid
  • User doesn’t see “Recover your account” option
    • Verify the user is a member of your SSAR-enabled group
    • The user needs at least one prior successful authentication before recovery becomes available
  • Identity verification fails at name matching
    • Check that First name and Last name in Entra ID match the government ID exactly
    • Display name is not used – only First name and Last name properties
  • Face Check fails
    • Ensure good lighting conditions
    • Try a different background
    • Make sure the user’s face is clearly visible
  • No TAP issued after verification
    • Verify that TAP is enabled in your Authentication methods policy
    • Ensure the user is in scope for TAP (this is separate from the SSAR group!)
  • Unable to use the TAP after issuance (User blocked by CA)
    • Make sure your Conditional Access, does not contain a policy that blocks the user action “Register security information”. In general I recomend allowing this user action in combination with a custom Authentication Strenght, that specifically requires the use of a Temporary Access Pass (TAP).
  • I don’t see the “Recover account” link when choosing other ways to sign-in.
    • The system will only show this link in certain scenarios, and only when I knows the user you are trying to access, is a member of a group assigned to the SSAR service. So, either:
      • you are too fast (It can take a few minutes to register)
      • you are trying with a user that is not correctly assigned to the service.
      • you did not heed my warning about simply going to aka.ms/mfasetup

Frequently Asked Questions (Click to expand)
What is the difference between SSPR and SSAR?

Self-Service Password Reset (SSPR) allows users to reset passwords when they still have access to at least one authentication method. Self-Service Account Recovery (SSAR) is designed for total lockout scenarios where users have lost access to ALL authentication methods and must verify their identity through government ID and biometrics – this is especially important when using only Passkeys.

Which identity verification providers does SSAR support?

Microsoft Entra SSAR supports three IDV providers through the Microsoft Security Store: AU10TIX, IDEMIA, and TrueCredential (powered by LexisNexis). All three offer government ID verification and biometric liveness checks.

Why do I get AADSTS55200 error when testing SSAR?

The AADSTS55200 “continuation_token is invalid” error occurs when initiating account recovery from standard login portals. You must use https://aka.ms/mfasetup to start the recovery process – this is an undocumented requirement as of December 2025.

Does the user need the Microsoft Authenticator app for SSAR?

Yes, the Verified ID credential issued after identity verification is stored in Microsoft Authenticator. The Face Check verification also occurs within the Authenticator app.

What user attributes must match for SSAR to work?

The user’s First name and Last name properties in Microsoft Entra ID must exactly match the name on their government-issued ID. The Display Name field is not used in the matching process.


Final Words

Just remember: This is a preview feature (as of writing), and I see a bright future for it – So, lets hope Microsoft keeps investing in this service. I ran into some snags which made me write this blog post, and I hope sharing it here saves you some time and frustration! (Or at the very least makes Microsoft fix the issues that I uncovered)

As always, I hope you find inspiration in this article. And I welcome any feedback in the comments or preferably a follow on Linkedin @michael-mardahl.

Follow on LinkedIn

Useful Links to go deeper:

*This post was enhanced with he help of AI, for readability and cool images! #DontHateThePlayerHateTheGame

Michael Mardahl

Michael Mardahl is a seasoned IT pro with over 25 years of experience under his belt. He's a Microsoft Certified Senior Cloud Architect at inciro in Denmark, where he helps customers move from traditional infrastructure to the cloud while keeping security top of mind. When he's not working, Michael's either spending time with his family and friends or passionately blogging about Microsoft cloud technology. His expertise in this area has even earned him the prestigious title of Microsoft Most Valuable Professional (MVP) in the Security category. In short, Michael is the IT equivalent of a rockstar, but don't expect him to act like one - he's way too down-to-earth for that.

Add comment

Sponsors

Categories

MSEndpointMgr.com use cookies to ensure that we give you the best experience on our website.