Skip to content

Instantly share code, notes, and snippets.

View CerebralDatabank's full-sized avatar
💭
"Authors MUST NOT implement bugs." — RFC 9225 § 4.1

Gopal Othayoth CerebralDatabank

💭
"Authors MUST NOT implement bugs." — RFC 9225 § 4.1
View GitHub Profile
@chowder
chowder / README.md
Last active January 14, 2026 02:32
Exporting Microsoft Authenticator TOTP secrets

Background

Workplaces may enforce TOTP 2FA to be enabled Office 365 accounts, which require the Microsoft Authenticator app to be installed.

Regular TOTP applications (such as Aegis, Authy, or LastPass) cannot be used as Microsoft uses a proprietary scheme called phonefactor. Furthermore, the application requires Google Services Framework (GSF) to be installed (likely to provide device notifications), and will refuse to work when it is not present on the device.

Forunately, after the registration is complete, the underlying mechanism the app uses to generate TOTP codes is regular otpauth, and its secrets can be exported with a little bit of effort.

Extracting the keys