Azure AD Conditional Access support for blocking legacy auth is in Public Preview!
Published Sep 07 2018 09:14 AM 55.3K Views
First published on CloudBlogs on Jun, 07 2018
Howdy folks, Today I'm excited to announce the Public Preview of Azure AD Conditional Access support for blocking legacy authentication. In the past you needed to use ADFS to do this, but using conditional access to do this is SO much simpler/better. Now you to can manage legacy authentication blocking as one part of your overall conditional access strategy, all from right in the Azure AD admin console. And for many of you, this will also give you the option to move away from ADFS to an cloud centered authentication model enabled by pass-through authentication . First things first, let's define legacy authentication. Legacy authentication is a term that refers to authentication protocols used by apps like:
  • Older Office clients that do not use modern authentication (e.g., Office 2010 client)
  • Clients that use mail protocols such as IMAP/SMTP/POP
Attackers strongly prefer these protocols – in fact, nearly 100% of password spray attacks use legacy authentication protocols! This is because legacy authentication protocols don't support interactive sign-in, which is required for additional security challenges like multi-factor authentication and device authentication. Before we get into the details, I want to be super duper clear - I strongly recommend you block use of legacy authentication protocols in your tenant. There are VERY few things you can do which are as easy to deploy and can improve your security posture as much. It should be one of the top items on your To-Do list for next week! Get started! Ready to try this new feature out? You'll find it under the "Client apps" condition in Azure AD Conditional access. To create a test policy:
  1. In the Azure AD portal, go to "Conditional access" and create a new policy.
  2. Select the users for your pilot group. As with all conditional access policies, we recommend starting with a small set of users to be sure you understand the support and end user experience impact.
  3. Select "All cloud apps".
  4. Under the "Client apps" conditions, you should now see the "Other clients" checkbox . The "Other clients" checkbox includes older Office clients that do not support modern authentication, as well as clients that use mail protocols like POP, IMAP, SMTP, etc.

  5. Select the "Block access" control.
  6. Save the policy.
To test the policy, we recommend installing an older version of the Office client, like Office 2010, and signing in with a user from the pilot group. If you'd like to test with basic authentication clients that use SMTP, POP, IMAP, etc., first run this PowerShell commandlet for the test user and then sign-in with the test user after an hour. The PowerShell commandlet ensures that the policy will take effect for the user within an hour of when it's run. Typically, it takes up to 24 hours for the policy to take affect for basic authentication clients. Don't forget to review the FAQ section to learn more about this new feature. And if you're not familiar with conditional access yet, go ahead and read through our Azure AD conditional access documentation . Tell us what you think As always, we'd love to hear any feedback or suggestions you have. We've even created a short survey for you to participate in. Please let us know what you think! Best regards, Alex Simons (Twitter: @Alex_A_Simons ) Director of Program Management Microsoft Identity Division
6 Comments
Copper Contributor

Alex,

Thanks, this is great! One question: If not selecting ActiveSync clients in the policy, will legacy authentication via ActiveSync still be possible, and if so still subject to password spray attacks? If so is there then any way to disable legacy auth for ActiveSync but still allow modern auth over ActiveSync, such as how the newer iOS mail client supports.

Regards,

Stephen

Copper Contributor

I have enabled this condition as a part of a conditional access block policy, but it makes no difference to any of our legacy auth client access.  I am assuming it is still in public preview and that our tenant is not apart of this?

Copper Contributor

I takes up to 24 hours after the policy is enabled, before legacy authentication will be blocked.

Take notice, when you are using AD FS to authenticate with Azure AD. Password Spray attacks directly on your AD FS (sts.domain.com) will not be blocked with this policy. You need to migrate to PTA or Password hash to prevent this.

Hi All. I think there is a big confusion about what Conditional Access does. CA block authorization and not authentication requests.

 

If you are having issues with password spray attacks please check this document: https://docs.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/disable-basic-authen...

 

 

Copper Contributor
Can we control what apps are categorised as "Other"? Office 2016 is classified as "Other clients; Older Office clients" and blocked.
Copper Contributor

Could it be that Office2016 is still using legacy authentication? If you got an old AAD you need to enable modern authentication for Exchange and Skype. 

Version history
Last update:
‎Jul 24 2020 01:56 AM
Updated by: