<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>authentication strength azure ad Archives - the Sysadmin Channel</title>
	<atom:link href="https://thesysadminchannel.com/tag/authentication-strength-azure-ad/feed/" rel="self" type="application/rss+xml" />
	<link>https://thesysadminchannel.com/tag/authentication-strength-azure-ad/</link>
	<description>Documenting My Life as a System Administrator</description>
	<lastBuildDate>Mon, 31 Oct 2022 23:25:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
<site xmlns="com-wordpress:feed-additions:1">144174110</site>	<item>
		<title>How To Enable Authentication Strengths Using Azure AD Conditional Access Policy</title>
		<link>https://thesysadminchannel.com/how-to-enable-authentication-strengths-using-azure-ad-conditional-access-policy/</link>
					<comments>https://thesysadminchannel.com/how-to-enable-authentication-strengths-using-azure-ad-conditional-access-policy/#respond</comments>
		
		<dc:creator><![CDATA[Paul Contreras]]></dc:creator>
		<pubDate>Sat, 29 Oct 2022 20:07:42 +0000</pubDate>
				<category><![CDATA[Azure]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[authentication strength azure ad]]></category>
		<category><![CDATA[enable authentication strengths]]></category>
		<category><![CDATA[Require Fido 2]]></category>
		<category><![CDATA[Require Windows Hello]]></category>
		<guid isPermaLink="false">https://thesysadminchannel.com/?p=4421</guid>

					<description><![CDATA[<p>We all know it is best practice to enable Multi-Factor Authentication for your user base. However, as we may come to find out, not all MFA methods are created equal. Some methods rely on username and password (weak sauce), while&#8230; <a href="https://thesysadminchannel.com/how-to-enable-authentication-strengths-using-azure-ad-conditional-access-policy/" class="more-link">Continue Reading <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a href="https://thesysadminchannel.com/how-to-enable-authentication-strengths-using-azure-ad-conditional-access-policy/">How To Enable Authentication Strengths Using Azure AD Conditional Access Policy</a> appeared first on <a href="https://thesysadminchannel.com">the Sysadmin Channel</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We all know it is best practice to enable Multi-Factor Authentication for your user base. However, as we may come to find out, not all MFA methods are created equal.  Some methods rely on username and password (weak sauce), while others rely on physical devices such as Fido 2 and Windows Hello for Business.  Today we&#8217;re going to show you <strong>how to enable Authentication Strengths in Azure AD using Conditional Access Policies</strong>.</p>
<div id="blockquote1">
<strong>Note</strong>: Follow this step by step guide if you want to <a href="https://thesysadminchannel.com/how-to-enable-windows-hello-for-business-cloud-trust/" rel="noopener" target="_blank">Enable Windows Hello for Business Cloud Trust</a>
</div>
<div id="tableofcontents">
<h2>Table Of Contents</h2>
<ul>
<li><a href="#whatisauthenticationstrength">What is Authentication Strength?</a></li>
<li><a href="#strengthtypes">What types of Authentication Strengths are available?</a></li>
<li><a href="#requirements">Requirements</a></li>
<li><a href="#enableauthstrength">Enable Authentication Strengths</a></li>
<li><a href="#configurepolicy">Configure the Conditional Access Policy</a></li>
<li><a href="#userexperience">User Experience</a></li>
<ul>
<li><a href="#scenario1">Scenario 1: The user does NOT have the authentication strength registered</a></li>
<li><a href="#scenario2">Scenario 2:  The user does have the authentication method registered</a></li>
</ul>
<li><a href="#limitations">Known Limitations</a></li>
<li><a href="#conclusion">Conclusion</a></li>
</ul>
</div>
<div id="whatisauthenticationstrength" style="scroll-margin-top: 15px;"></div>
<h2>What is Authentication Strength?</h2>
<p>Authentication strength is a Conditional Access control that enables administrators to specify what combination of authentication techniques can be used to access a cloud resource.<br />
&nbsp;</p>
<p>The Authentication methods policy, which allows administrators to specify the authentication methods to be used across Azure AD applications, forms the basis for authentication strength. Authentication strength enables further control over the application which can depend heavily on variables like access to sensitive resources, user risk, location, and more.<br />
&nbsp;</p>
<p>With this policy enabled, you can require access to high profile applications using ONLY MFA resistant methods like Windows Hello for Business or Fido 2.  For all other applications or resources, you can set a policy to enable any one of the Passwordless methods available to you as an Azure AD user.  With that said, let&#8217;s touch on the different authentication strength types and how they&#8217;ll be useful to your organization.</p>
<div id="strengthtypes" style="scroll-margin-top: 15px;"></div>
<h2>What types of Authentication Strengths are available?</h2>
<p>When requiring MFA, it&#8217;s important to know that some methods are better than others.  If your resource is located in Azure, there are several authentication strengths available to you with little configuration on your end.  It&#8217;s all built-in to the product which is great.<br />
&nbsp;</p>
<p>Regarding the actual types, there are 3 main buckets </p>
<ul>
<li><strong>Password + MFA</strong> (Good)</li>
<li><strong>Passwordless MFA</strong> (Better)</li>
<li><strong>Phishing Resistant MFA</strong> (Best)</li>
</ul>
<p>Here is a table provided by Microsoft that outlines all of the possible types and what bucket they fall into.<br />
<a href="https://thesysadminchannel.com/wp-content/uploads/2022/10/MFA-Authentication-Strength-Types-Diagram.png" target="_blank" rel="noopener"><img fetchpriority="high" decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2022/10/MFA-Authentication-Strength-Types-Diagram.png" alt="MFA Authentication Strength Types Diagram" width="860" height="537" class="aligncenter size-full wp-image-4426" srcset="https://thesysadminchannel.com/wp-content/uploads/2022/10/MFA-Authentication-Strength-Types-Diagram.png 860w, https://thesysadminchannel.com/wp-content/uploads/2022/10/MFA-Authentication-Strength-Types-Diagram-768x480.png 768w" sizes="(max-width: 860px) 100vw, 860px" /></a></p>
<div id="requirements" style="scroll-margin-top: 15px;"></div>
<h2>Requirements</h2>
<p>In order to enable authentication strengths, we need check a few boxes to make that happen.  Let&#8217;s cover the requirements needed to ensure you&#8217;re on a road to success.<br />
&nbsp;</p>
<ul>
<li>Azure AD P1/P2 License</li>
<li>Authentication Policy Administrator or Global Administrator</li>
<li>Authentication Methods Policy configured</li>
<li>Enable combined registration</li>
</ul>
<div id="enableauthstrength" style="scroll-margin-top: 15px;"></div>
<h2>Enable Authentication Strengths</h2>
<p>By default Microsoft gives us 3 types of authentication strength policies right out of the box so we can hit the ground running.</p>
<p>Those built-in policies are:</p>
<ul>
<li>Multi-factor authentication</li>
<li>Passwordless MFA</li>
<li>Phishing-resistant MFA</li>
</ul>
<p>&nbsp;</p>
<p>It&#8217;s pretty neat that the 3 built in policies are exactly the same as the three buckets we mentioned above.  That&#8217;s great but what if we wanted to create a custom authentication strength to only allow a specific requirement for a specific Azure resource?  Let&#8217;s look at creating a custom authentication strength policy.<br />
&nbsp;</p>
<p>Within Azure AD:</p>
<ul>
<li>Navigate to <strong>Security</strong> → <strong>Authentication Methods</strong> → <strong>Authentication Strengths</strong></li>
<ul>
<li>Direct Link: <a href="https://portal.azure.com/#view/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/~/AuthStrengths" rel="noopener" target="_blank">https://portal.azure.com/#view/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/~/AuthStrengths</a></li>
</ul>
<li>Click on <strong>New Authentication Strength</strong></li>
<li>Enter in <strong>Name</strong> and <strong>Description</strong></li>
<li>With the chevrons expanded, select the specific authentication strength you&#8217;re looking to add</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2022/10/Create-Authentication-Strength-Policy.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2022/10/Create-Authentication-Strength-Policy.png" alt="Create Authentication Strength Policy" width="1050" height="706" class="aligncenter size-full wp-image-4445" srcset="https://thesysadminchannel.com/wp-content/uploads/2022/10/Create-Authentication-Strength-Policy.png?v=1666988569 1050w, https://thesysadminchannel.com/wp-content/uploads/2022/10/Create-Authentication-Strength-Policy-1024x689.png?v=1666988569 1024w, https://thesysadminchannel.com/wp-content/uploads/2022/10/Create-Authentication-Strength-Policy-768x516.png?v=1666988569 768w" sizes="(max-width: 1050px) 100vw, 1050px" /></a><br />
&nbsp;</p>
<ul>
<li>Follow the prompts to create the policy</li>
<li>My custom policy will only allow Windows Hello or Fido 2 to be used</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2022/10/New-Authentication-Strength-Policy.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2022/10/New-Authentication-Strength-Policy.png" alt="New Authentication Strength Policy" width="987" height="645" class="aligncenter size-full wp-image-4437" srcset="https://thesysadminchannel.com/wp-content/uploads/2022/10/New-Authentication-Strength-Policy.png?v=1666826339 987w, https://thesysadminchannel.com/wp-content/uploads/2022/10/New-Authentication-Strength-Policy-768x502.png?v=1666826339 768w" sizes="(max-width: 987px) 100vw, 987px" /></a></p>
<p>&nbsp;<br />
Once I hit create, we can see that my policy is created.  However, you&#8217;ll notice that it is showing &#8220;Not configured in any policy yet&#8221; under the conditional access policies column.<br />
<a href="https://thesysadminchannel.com/wp-content/uploads/2022/10/Authentication-Strength-Policy.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2022/10/Authentication-Strength-Policy.png" alt="Authentication Strength Policy" width="1138" height="521" class="aligncenter size-full wp-image-4442" srcset="https://thesysadminchannel.com/wp-content/uploads/2022/10/Authentication-Strength-Policy.png?v=1666827195 1138w, https://thesysadminchannel.com/wp-content/uploads/2022/10/Authentication-Strength-Policy-1024x469.png?v=1666827195 1024w, https://thesysadminchannel.com/wp-content/uploads/2022/10/Authentication-Strength-Policy-768x352.png?v=1666827195 768w" sizes="(max-width: 1138px) 100vw, 1138px" /></a><br />
&nbsp;</p>
<p>Let&#8217;s move forward to see how we can configure the conditional access policy.</p>
<div id="configurepolicy" style="scroll-margin-top: 15px;"></div>
<h2>Configure the Conditional Access Policy</h2>
<p>Now that we have our custom authentication strength created, let&#8217;s look at how to apply that for a specific set of users and/or applications.  Conditional access policies can have a wide variety of controls you want to put in place, however, for this article we&#8217;ll apply it to a user on a specific app.<br />
&nbsp;</p>
<p>Within Azure AD:</p>
<ul>
<li>Navigate to Security → Conditional Access → Create a new policy</li>
<li>Give the policy a relevant name</li>
<li>Under Users: select the users/groups you want in scope of this policy</li>
<li>Under Cloud apps:  select the apps you want in scope of this policy</li>
<li>Under Grant:</li>
<ul>
<li>Ensure the <strong>Grant access</strong> radio button is selected</li>
<li>Select <strong>Require authentication strength</strong> checkbox</li>
<li>Select the authentication strength you just created (Ours will be <strong>Fido 2 or Windows Hello</strong>)</li>
<li>Select <strong>require all the selected controls</strong></li>
</ul>
<li>Leave the policy in report only mode until you&#8217;re ready to enable it</li>
</ul>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-Authentication-Strength-1.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-Authentication-Strength-1.png" alt="Require Authentication Strength" width="998" height="706" class="aligncenter size-full wp-image-4457" srcset="https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-Authentication-Strength-1.png?v=1667060740 998w, https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-Authentication-Strength-1-768x543.png?v=1667060740 768w" sizes="(max-width: 998px) 100vw, 998px" /></a></p>
<div id="userexperience" style="scroll-margin-top: 15px;"></div>
<h2>User Experience</h2>
<p>From a user&#8217;s perspective, there are 2 scenarios we need to keep in mind when enforcing an authentication strength through a conditional access policy.  </p>
<ul>
<li>Scenario 1:  The user does NOT have the authentication strength registered</li>
<li>Scenario 2:  The user does have the authentication method registered</li>
</ul>
<p>Let&#8217;s drill down and cover both scenarios so you know exactly what to expect for each. The second scenario is the end goal so we&#8217;ll start with users who have not registered the required authentication strength first.<br />
&nbsp;</p>
<div id="scenario1" style="scroll-margin-top: 15px;"></div>
<h4>The user does NOT have the authentication strength registered</h4>
<p>If a user is in scope of a policy that requires an authentication strength and they have not registered it, what does that look like?<br />
&nbsp;</p>
<p>My new authentication strength CA policy was only scoped to a single user going to Office 365.  This user does not have Fido 2 or Windows Hello registered on their account so here&#8217;s what that looks like when I hit that endpoint.<br />
&nbsp;</p>
<p>First, I am prompted to authenticate using my normal method, then I get a notice saying the following.</p>
<p><em>Keep your account secure<br />
Your organization requires you to set up the following methods of proving who you are.<br />
To complete this sign-in, you need to use one of the methods listed below, but you cannot register those methods here. Please contact your administrator to register one or more of these methods and then try signing into this application again.</p>
<p>Authentication Methods:<br />
Your Required Authentication</em><br />
<a href="https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-registration-of-new-method.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-registration-of-new-method.png" alt="Require registration of new method" width="1061" height="483" class="aligncenter size-full wp-image-4459" srcset="https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-registration-of-new-method.png?v=1667062895 1061w, https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-registration-of-new-method-1024x466.png?v=1667062895 1024w, https://thesysadminchannel.com/wp-content/uploads/2022/10/Require-registration-of-new-method-768x350.png?v=1667062895 768w" sizes="(max-width: 1061px) 100vw, 1061px" /></a><br />
&nbsp;</p>
<p>From here, the user will need to navigate to <a href="https://aka.ms/mysecurityinfo" rel="noopener" target="_blank">https://aka.ms/mysecurityinfo</a>, follow the prompts and add the required method. You can reference this <a href="https://support.microsoft.com/en-us/account-billing/set-up-a-security-key-as-your-verification-method-2911cacd-efa5-4593-ae22-e09ae14c6698" rel="noopener" target="_blank">MS Doc</a> to register a Fido 2 Security Key.</p>
<div id="scenario2" style="scroll-margin-top: 15px;"></div>
<h4>The user does have the authentication method registered</h4>
<p>Moving on to the second scenario.  If a user is already registered for their required auth strength, let&#8217;s take a peek of what that will look like from a user&#8217;s perspective.<br />
&nbsp;</p>
<p>If you&#8217;re signing in to a new session, you will need to successfully authenticate using the most recent authentication method used.  Azure will then determine if the conditions of the policy apply and if it does, you&#8217;ll be prompted to verify the identity using the required auth strength.  In my case, I&#8217;m required to use Fido 2.<br />
<a href="https://thesysadminchannel.com/wp-content/uploads/2022/10/1-Require-Fido-2.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2022/10/1-Require-Fido-2.png" alt="Require Fido 2" width="1022" height="629" class="aligncenter size-full wp-image-4467" srcset="https://thesysadminchannel.com/wp-content/uploads/2022/10/1-Require-Fido-2.png 1022w, https://thesysadminchannel.com/wp-content/uploads/2022/10/1-Require-Fido-2-768x473.png 768w" sizes="(max-width: 1022px) 100vw, 1022px" /></a></p>
<p><a href="https://thesysadminchannel.com/wp-content/uploads/2022/10/2-Require-Fido-2.png" target="_blank" rel="noopener"><img decoding="async" src="https://thesysadminchannel.com/wp-content/uploads/2022/10/2-Require-Fido-2.png" alt="Require Fido 2" width="1025" height="751" class="aligncenter size-full wp-image-4468" srcset="https://thesysadminchannel.com/wp-content/uploads/2022/10/2-Require-Fido-2.png 1025w, https://thesysadminchannel.com/wp-content/uploads/2022/10/2-Require-Fido-2-768x563.png 768w" sizes="(max-width: 1025px) 100vw, 1025px" /></a><br />
&nbsp;</p>
<div id="limitations" style="scroll-margin-top: 15px;"></div>
<h2>Known Limitations</h2>
<p>Before we go all gung ho and start enforcing everything using specific authentication strengths, it is important to know the limitations and how it can impact your users.  If you&#8217;re running a predominantly Windows environment,  there&#8217;s a much better chance you&#8217;ll have success because there are more things that are vertically integrated.<br />
&nbsp;</p>
<p>However, this is not the case for environments that have a mix of MacOS, Linux and Windows.  Obviously since Windows Hello is a Windows feature,  this will not work on other platforms so I guess that goes without saying.  We also need to understand that <strong>Fido 2 doesn&#8217;t work with Safari</strong> so MacOS users will need to use Chrome if they need to Fido into any application.  I&#8217;ve personally run into issues where some applications on MacOS just won&#8217;t work when requiring a security key because Apple hasn&#8217;t fully integrated this into their product yet.<br />
&nbsp;</p>
<p>Another thing to consider is that there are currently issues if you want to enforce Passwordless as a baseline policy.  If you apply a policy enforcing Passwordless to a user who currently doesn&#8217;t have it enabled, they&#8217;ll get an infinite loop.  Before you enforce this policy, be sure the users have this enabled so you can save yourself from trouble down the road.</p>
<div id="conclusion" style="scroll-margin-top: 15px;"></div>
<h2>Conclusion</h2>
<p>At last we&#8217;re at the tail end of this article and hopefully you found it very informative knowing how to enable authentication strengths using Azure AD conditional access policies.  This is something that can definitely improve your organizational security as well as add the convenience of Passwordless.<br />
&nbsp;</p>
<p>This feature is still in preview so there is still more work needed to iron out the rough edges but at the end of the day, this is still a win for admins who want a stronger security posture across their cloud environment.</p>
<p>The post <a href="https://thesysadminchannel.com/how-to-enable-authentication-strengths-using-azure-ad-conditional-access-policy/">How To Enable Authentication Strengths Using Azure AD Conditional Access Policy</a> appeared first on <a href="https://thesysadminchannel.com">the Sysadmin Channel</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thesysadminchannel.com/how-to-enable-authentication-strengths-using-azure-ad-conditional-access-policy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4421</post-id>	</item>
	</channel>
</rss>
