Skip to content

Commit eb9aeb2

Browse files
Merge pull request #208721 from MicrosoftGuyJFlo/LegacyAuthFundamentalRedirectAndDelete
[Azure AD] Fundamentals - Legacy auth redirect and delete
2 parents 308be5c + 999fbff commit eb9aeb2

File tree

7 files changed

+32
-121
lines changed

7 files changed

+32
-121
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2043,7 +2043,7 @@
20432043
{
20442044
"source_path_from_root": "/articles/active-directory/conditional-access/conditional-access-for-exo-and-spo.md",
20452045
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
2046-
"redirect_document_id": true
2046+
"redirect_document_id": false
20472047
},
20482048
{
20492049
"source_path_from_root": "/articles/active-directory/conditional-access/baseline-protection.md",
@@ -4258,7 +4258,12 @@
42584258
},
42594259
{
42604260
"source_path_from_root": "/articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
4261-
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
4261+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
4262+
"redirect_document_id": false
4263+
},
4264+
{
4265+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md",
4266+
"redirect_url": "/azure/active-directory/conditional-access/block-legacy-authentication",
42624267
"redirect_document_id": true
42634268
},
42644269
{

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,23 @@
11
---
22
title: Block legacy authentication - Azure Active Directory
33
description: Learn how to improve your security posture by blocking legacy authentication using Azure AD Conditional Access.
4+
5+
services: active-directory
46
ms.service: active-directory
57
ms.subservice: conditional-access
68
ms.topic: how-to
7-
ms.date: 06/21/2022
9+
ms.date: 08/22/2022
10+
811
ms.author: joflore
912
author: MicrosoftGuyJFlo
1013
manager: amycolannino
11-
ms.reviewer: calebb, dawoo, jebeckha, grtaylor
14+
ms.reviewer: calebb, jebeckha, grtaylor
15+
1216
ms.collection: M365-identity-device-management
1317
---
14-
# How to: Block legacy authentication access to Azure AD with Conditional Access
18+
# Block legacy authentication with Azure AD with Conditional Access
1519

16-
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy authentication doesn't support multifactor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
20+
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy authentication doesn't support things like multifactor authentication (MFA). MFA is a common requirement to improve security posture in organizations.
1721

1822
> [!NOTE]
1923
> Effective October 1, 2022, we will begin to permanently disable Basic Authentication for Exchange Online in all Microsoft 365 tenants regardless of usage, except for SMTP Authentication. Read more [here](/exchange/clients-and-mobile-in-exchange-online/deprecation-of-basic-authentication-exchange-online)
@@ -29,7 +33,7 @@ Alex Weinert, Director of Identity Security at Microsoft, in his March 12, 2020
2933
> - Azure AD accounts in organizations that have disabled legacy authentication experience 67 percent fewer compromises than those where legacy authentication is enabled
3034
>
3135
32-
If your environment is ready to block legacy authentication to improve your tenant's protection, you can accomplish this goal with Conditional Access. This article explains how you can configure Conditional Access policies that block legacy authentication for all workloads within your tenant.
36+
If you're ready to block legacy authentication to improve your tenant's protection, you can accomplish this goal with Conditional Access. This article explains how you can configure Conditional Access policies that block legacy authentication for all workloads within your tenant.
3337

3438
While rolling out legacy authentication blocking protection, we recommend a phased approach, rather than disabling it for all users all at once. Customers may choose to first begin disabling basic authentication on a per-protocol basis, by applying Exchange Online authentication policies, then (optionally) also blocking legacy authentication via Conditional Access policies when ready.
3539

@@ -113,7 +117,7 @@ Many clients that previously only supported legacy authentication now support mo
113117
>
114118
> When implementing Exchange Active Sync (EAS) with CBA, configure clients to use modern authentication. Clients not using modern authentication for EAS with CBA **are not blocked** with [Deprecation of Basic authentication in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/deprecation-of-basic-authentication-exchange-online). However, these clients **are blocked** by Conditional Access policies configured to block legacy authentication.
115119
>
116-
>For more Information on implementing support for CBA with Azure AD and modern authentication See: [How to configure Azure AD certificate-based authentication (Preview)](../authentication/how-to-certificate-based-authentication.md). As another option, CBA performed at a federation server can be used with modern authentication.
120+
> For more Information on implementing support for CBA with Azure AD and modern authentication See: [How to configure Azure AD certificate-based authentication (Preview)](../authentication/how-to-certificate-based-authentication.md). As another option, CBA performed at a federation server can be used with modern authentication.
117121
118122

119123
If you're using Microsoft Intune, you might be able to change the authentication type using the email profile you push or deploy to your devices. If you're using iOS devices (iPhones and iPads), you should take a look at [Add e-mail settings for iOS and iPadOS devices in Microsoft Intune](/mem/intune/configuration/email-settings-ios).
@@ -133,7 +137,7 @@ The easiest way to block legacy authentication across your entire organization i
133137

134138
### Indirectly blocking legacy authentication
135139

136-
Even if your organization isn't ready to block legacy authentication across the entire organization, you should ensure that sign-ins using legacy authentication aren't bypassing policies that require grant controls such as requiring multifactor authentication or compliant/hybrid Azure AD joined devices. During authentication, legacy authentication clients don't support sending MFA, device compliance, or join state information to Azure AD. Therefore, apply policies with grant controls to all client applications so that legacy authentication based sign-ins that can’t satisfy the grant controls are blocked. With the general availability of the client apps condition in August 2020, newly created Conditional Access policies apply to all client apps by default.
140+
If your organization isn't ready to block legacy authentication across the entire organization, you should ensure that sign-ins using legacy authentication aren't bypassing policies that require grant controls such as requiring multifactor authentication or compliant/hybrid Azure AD joined devices. During authentication, legacy authentication clients don't support sending MFA, device compliance, or join state information to Azure AD. Therefore, apply policies with grant controls to all client applications so that legacy authentication based sign-ins that can’t satisfy the grant controls are blocked. With the general availability of the client apps condition in August 2020, newly created Conditional Access policies apply to all client apps by default.
137141

138142
![Client apps condition default configuration](./media/block-legacy-authentication/client-apps-condition-configured-no.png)
139143

@@ -152,4 +156,8 @@ You can select all available grant controls for the **Other clients** condition;
152156
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
153157
- If you aren't familiar with configuring Conditional Access policies yet, see [require MFA for specific apps with Azure Active Directory Conditional Access](../authentication/tutorial-enable-azure-mfa.md) for an example.
154158
- For more information about modern authentication support, see [How modern authentication works for Office client apps](/office365/enterprise/modern-auth-for-office-2013-and-2016)
155-
- [How to set up a multifunction device or application to send email using Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-microsoft-365-or-office-365)
159+
- [How to set up a multifunction device or application to send email using Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-microsoft-365-or-office-365)
160+
- [Enable modern authentication in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/enable-or-disable-modern-authentication-in-exchange-online)
161+
- [Enable Modern Authentication for Office 2013 on Windows devices](/office365/admin/security-and-compliance/enable-modern-authentication)
162+
- [How to configure Exchange Server on-premises to use Hybrid Modern Authentication](/office365/enterprise/configure-exchange-server-for-hybrid-modern-authentication)
163+
- [How to use Modern Authentication with Skype for Business](/skypeforbusiness/manage/authentication/use-adal)

articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md

Lines changed: 0 additions & 102 deletions
This file was deleted.

0 commit comments

Comments
 (0)