Skip to content

Commit 10a5aa5

Browse files
authored
Merge pull request #79809 from MicrosoftGuyJFlo/CASupportability735842
[Azure AD] Conditional Access - Supportability 735842
2 parents 01158b6 + 1856033 commit 10a5aa5

File tree

1 file changed

+18
-20
lines changed

1 file changed

+18
-20
lines changed

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 18 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,16 @@
11
---
22
title: How to block legacy authentication to Azure Active Directory (Azure AD) with Conditional Access| Microsoft Docs
33
description: Learn how to improve your security posture by blocking legacy authentication using Azure AD Conditional Access.
4-
services: active-directory
5-
keywords: Conditional Access to apps, Conditional Access with Azure AD, secure access to company resources, Conditional Access policies
6-
documentationcenter: ''
7-
author: MicrosoftGuyJFlo
8-
manager: daveba
9-
editor: ''
104

11-
ms.subservice: conditional-access
12-
ms.assetid: 8c1d978f-e80b-420e-853a-8bbddc4bcdad
5+
services: active-directory
136
ms.service: active-directory
14-
ms.devlang: na
15-
ms.topic: article
16-
ms.tgt_pltfrm: na
17-
ms.workload: identity
18-
ms.date: 03/25/2019
7+
ms.subservice: conditional-access
8+
ms.topic: conceptual
9+
ms.date: 06/17/2019
10+
1911
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: daveba
2014
ms.reviewer: calebb
2115

2216
ms.collection: M365-identity-device-management
@@ -25,20 +19,15 @@ ms.collection: M365-identity-device-management
2519

2620
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy protocols don’t support multi-factor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
2721

28-
2922
If your environment is ready to block legacy authentication to improve your tenant's protection, you can accomplish this goal with Conditional Access. This article explains how you can configure Conditional Access policies that block legacy authentication for your tenant.
3023

31-
32-
3324
## Prerequisites
3425

3526
This article assumes that you are familiar with:
3627

3728
- The [basic concepts](overview.md) of Azure AD Conditional Access
3829
- The [best practices](best-practices.md) for configuring Conditional Access policies in the Azure portal
3930

40-
41-
4231
## Scenario description
4332

4433
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to protocols that use basic authentication. Typically, these protocols can't enforce any type of second factor authentication. Examples for apps that are based on legacy authentication are:
@@ -53,12 +42,21 @@ How can you prevent apps using legacy authentication from accessing your tenant'
5342

5443
Conditional Access policies are enforced after the first-factor authentication has been completed. Therefore, Conditional Access is not intended as a first line defense for scenarios like denial-of-service (DoS) attacks, but can utilize signals from these events (e.g. the sign-in risk level, location of the request, and so on) to determine access.
5544

45+
## Implementation
46+
47+
This section explains how to configure a Conditional Access policy to block legacy authentication.
5648

49+
### Identify legacy authentication use
5750

51+
Before you can block legacy authentication in your directory, you need to first understand if your users have apps that use legacy authentication and how it affects your overall directory. Azure AD sign-in logs can be used to understand if you’re using legacy authentication.
5852

59-
## Implementation
53+
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-ins**.
54+
1. Add the Client App column if it is not shown by clicking on **Columns** > **Client App**.
55+
1. Filter by **Client App** > **Other Clients** and click **Apply**.
6056

61-
This section explains how to configure a Conditional Access policy to block legacy authentication.
57+
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you additional details. The **Client App** field under the **Basic Info** tab will indicate which legacy authentication protocol was used.
58+
59+
These logs will indicate which users are still depending on legacy authentication and which applications are using legacy protocols to make authentication requests. For users that do not appear in these logs and are confirmed to not be using legacy authentication, implement a Conditional Access policy for these users only.
6260

6361
### Block legacy authentication
6462

0 commit comments

Comments
 (0)