According to Microsoft’s latest Microsoft Entra ID verification notice, beginning in February 2026, identity authentication for any enterprise will no longer be supported on jailbroken or rooted devices using Microsoft Authenticator.
The feature appears to be enabled by default, though enterprise IT administrators may have limited control over its configuration. Microsoft stated that the move aims to enhance security and prevent scenarios in which compromised devices—through jailbreaking or rooting—could be infected with malware capable of stealing employee authentication tokens.
Microsoft Entra ID, formerly known as Azure Active Directory (AAD), is the company’s enterprise-grade identity management platform. It supports multi-factor authentication (MFA), allowing users to perform secure secondary verification through tools such as Microsoft Authenticator.
Starting in February 2026, Microsoft Authenticator will automatically detect whether a device has been jailbroken or rooted. If such modifications are found, the app will immediately purge all Entra ID credentials linked to that device. This means that users with enterprise-bound Entra ID accounts will need to avoid rooting or jailbreaking their devices, as doing so could render them unable to access their corporate accounts once credentials are wiped.
This policy update applies to Microsoft Authenticator on both iOS and Android and affects only enterprise or organizational accounts using Microsoft Entra ID. Personal Microsoft accounts and third-party logins will remain unaffected.
Related Posts:
- Windows Update’s Driver Purge: Smoother Updates, or Hidden Headaches?
- Facebook’s Major Purge: 10 Million Accounts Removed in New Content Quality Push
- Microsoft Warns: Threat Actors Turn Microsoft Teams into a Weapon for Ransomware, Espionage, and Social Engineering
- Microsoft Authenticator’s Password Manager is Phasing Out: What You Need to Do!
- Microsoft Authenticator to Drop Password Manager Features by August 2025