Overview
Multifactor Authentication (MFA) is required for all faculty, staff, and credit students when signing in to MyAACC or any Microsoft 365 service. This includes Outlook (email), OneDrive, Teams, Office apps, Forms, Bookings, and more. Employees also use Microsoft MFA when connecting through remote access (FortiClient/VPN).
If you have not set up MFA before, please follow the instructions in Setting Up Multi-Factor Authentication before continuing.
Once MFA is set up, use the steps below to sign in to AACC online services.
Instructions
Signing in with Microsoft Authenticator
If Microsoft Authenticator is your default MFA sign in method, you'll receive a prompt (similar to the image below) to approve your sign in request.
Open the Microsoft Authenticator app on your mobile device. Approve your sign in by entering the 2-digit number shown and selecting Yes on your mobile device. You may also need to enter your device PIN/code or complete Face ID.
Once your sign in has been successfully approved, you'll be redirected to the service (ex. MyAACC, office.com, etc).

If you are unable to use the Authenticator app, select “I can’t use my Microsoft Authenticator app right now" under the 2-digit number. As long as a phone number is registered in your MFA settings, you should be able to authenticate with a phone call.
Signing in with Phone (Call or Text)
If your primary MFA method is a phone call or text message, you will receive a call or text to approve the sign-in. Follow the prompts provided to complete authentication.
Troubleshooting
Not receiving the MFA phone call? Try the following:
- Make sure your phone has a strong signal.
- Confirm that your number is correct in your MFA settings.
- Ensure that unknown or spam calls aren’t being blocked. Check your phone's block list to ensure the three numbers Microsoft calls from are not blocked:
- +1 (866) 539 4191
- +1 (855) 330 8653
- +1 (877) 668 6536
Still have questions? Contact the Technical Service Desk or request assistance using one of the service offerings on the Multifactor Authentication service page.