This article covers troubleshooting for Multi-Factor Authentication (MFA) in Agentforce Sales (formerly Sales Cloud) and Agentforce Service (formerly Service Cloud), including error messages, Salesforce Authenticator setup, and device migration steps. It is organized into 13 troubleshooting categories covering the most common MFA issues. Topics include error messages during login, Salesforce Authenticator app problems, switching devices, registering and disconnecting verification methods, permission assignment issues, SSO behavior, security key and built-in authenticator guidance, domain change impacts, and how to generate temporary verification codes.
Sales and Service — Professional, Enterprise, Unlimited, and Developer
This article is organized into 13 troubleshooting categories. Use the section headings below to navigate to the topic that matches your issue.
These errors typically occur during MFA verification in Sales and Service when users authenticate. If you encounter one of these messages, select the relevant article below for resolution steps.
The following articles address common issues experienced with the Salesforce Authenticator mobile app in Sales and Service. If the Authenticator app is not behaving as expected during login or setup, select the relevant article below for targeted resolution steps.
Additional Resource: Salesforce Authenticator Troubleshooting
The following articles address how to migrate the Salesforce Authenticator app to a new device. This is typically needed when a user replaces their smartphone or gets a new device. Review the relevant article below before beginning a migration to avoid losing access to your Salesforce org.
Note: Deleting the Salesforce Authenticator app during migration without first completing a backup or reconnection will cause MFA login to fail.
The following articles cover how users register MFA verification methods in Sales and Service for the first time or when adding additional methods. Users must register at least one verification method before MFA login is required.
The following articles cover how to disconnect MFA verification methods in Sales and Service. Disconnecting MFA may be necessary if a user accidentally deletes the authenticator app, replaces their smartphone, or switches devices.
Note: Disconnecting a user's MFA verification method is typically performed by a System Administrator. Non-admin users may disconnect their own methods in certain configurations
The following articles address issues related to assigning MFA-related permissions in Sales and Service. Incorrect permission assignments can prevent MFA from functioning correctly or block users from enabling or waiving MFA for specific user profiles.
The following articles address identity verification errors that can occur during MFA login or when adding a new verification method. These issues are often caused by email delivery problems or configuration mismatches in the org.
The following article addresses MFA behavior when users log in via Single Sign-On (SSO). When SSO is used, MFA may be handled by the identity provider rather than Salesforce, which can affect whether users are prompted for MFA verification.
The following article addresses issues with FIDO2-compliant physical security keys used as MFA verification methods in Sales and Service. Security keys must be FIDO2 or WebAuthn-compliant to be used for Salesforce MFA.
The following article covers how to manage built-in device authenticators (such as Face ID, Touch ID, or Windows Hello) when switching to a new device. Built-in authenticators are bound to the device they are registered on and must be re-registered on a new device.
The following article covers important considerations for security keys and built-in authenticators when the My Domain URL is changed in a Salesforce org. Changing the My Domain URL may require users to re-register their security keys or built-in authenticators.
Note: Customers should review this article before making any My Domain URL changes to avoid MFA login disruptions post-change.
The following article covers how a System Administrator can generate a Temporary Verification Code for a user who is unable to log in after MFA has been enabled in their org. This is typically used when a user has lost access to their registered verification method.
Note: Generating a Temporary Verification Code is performed by a System Administrator within the org. If the System Administrator is also locked out, contact Salesforce Support for assistance.
000389576

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.