You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy protocols don’t support multi-factor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
27
21
28
-
29
22
If your environment is ready to block legacy authentication to improve your tenant's protection, you can accomplish this goal with Conditional Access. This article explains how you can configure Conditional Access policies that block legacy authentication for your tenant.
30
23
31
-
32
-
33
24
## Prerequisites
34
25
35
26
This article assumes that you are familiar with:
36
27
37
28
- The [basic concepts](overview.md) of Azure AD Conditional Access
38
29
- The [best practices](best-practices.md) for configuring Conditional Access policies in the Azure portal
39
30
40
-
41
-
42
31
## Scenario description
43
32
44
33
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to protocols that use basic authentication. Typically, these protocols can't enforce any type of second factor authentication. Examples for apps that are based on legacy authentication are:
@@ -53,12 +42,21 @@ How can you prevent apps using legacy authentication from accessing your tenant'
53
42
54
43
Conditional Access policies are enforced after the first-factor authentication has been completed. Therefore, Conditional Access is not intended as a first line defense for scenarios like denial-of-service (DoS) attacks, but can utilize signals from these events (e.g. the sign-in risk level, location of the request, and so on) to determine access.
55
44
45
+
## Implementation
46
+
47
+
This section explains how to configure a Conditional Access policy to block legacy authentication.
56
48
49
+
### Identify legacy authentication use
57
50
51
+
Before you can block legacy authentication in your directory, you need to first understand if your users have apps that use legacy authentication and how it affects your overall directory. Azure AD sign-in logs can be used to understand if you’re using legacy authentication.
58
52
59
-
## Implementation
53
+
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-ins**.
54
+
1. Add the Client App column if it is not shown by clicking on **Columns** > **Client App**.
55
+
1. Filter by **Client App** > **Other Clients** and click **Apply**.
60
56
61
-
This section explains how to configure a Conditional Access policy to block legacy authentication.
57
+
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you additional details. The **Client App** field under the **Basic Info** tab will indicate which legacy authentication protocol was used.
58
+
59
+
These logs will indicate which users are still depending on legacy authentication and which applications are using legacy protocols to make authentication requests. For users that do not appear in these logs and are confirmed to not be using legacy authentication, implement a Conditional Access policy for these users only.
0 commit comments