Blog Post

Microsoft Entra Blog
3 MIN READ

Azure AD Conditional Access support for blocking legacy auth is in Public Preview!

Alex Simons (AZURE)'s avatar
Sep 07, 2018
First published on CloudBlogs on Jun, 07 2018
Howdy folks, Today I'm excited to announce the Public Preview of Azure AD Conditional Access support for blocking legacy authentication. In the past you needed to use ADFS to do this, but using conditional access to do this is SO much simpler/better. Now you to can manage legacy authentication blocking as one part of your overall conditional access strategy, all from right in the Azure AD admin console. And for many of you, this will also give you the option to move away from ADFS to an cloud centered authentication model enabled by pass-through authentication . First things first, let's define legacy authentication. Legacy authentication is a term that refers to authentication protocols used by apps like:
  • Older Office clients that do not use modern authentication (e.g., Office 2010 client)
  • Clients that use mail protocols such as IMAP/SMTP/POP
Attackers strongly prefer these protocols – in fact, nearly 100% of password spray attacks use legacy authentication protocols! This is because legacy authentication protocols don't support interactive sign-in, which is required for additional security challenges like multi-factor authentication and device authentication. Before we get into the details, I want to be super duper clear - I strongly recommend you block use of legacy authentication protocols in your tenant. There are VERY few things you can do which are as easy to deploy and can improve your security posture as much. It should be one of the top items on your To-Do list for next week! Get started! Ready to try this new feature out? You'll find it under the "Client apps" condition in Azure AD Conditional access. To create a test policy:
  1. In the Azure AD portal, go to "Conditional access" and create a new policy.
  2. Select the users for your pilot group. As with all conditional access policies, we recommend starting with a small set of users to be sure you understand the support and end user experience impact.
  3. Select "All cloud apps".
  4. Under the "Client apps" conditions, you should now see the "Other clients" checkbox . The "Other clients" checkbox includes older Office clients that do not support modern authentication, as well as clients that use mail protocols like POP, IMAP, SMTP, etc.

  5. Select the "Block access" control.
  6. Save the policy.
To test the policy, we recommend installing an older version of the Office client, like Office 2010, and signing in with a user from the pilot group. If you'd like to test with basic authentication clients that use SMTP, POP, IMAP, etc., first run this PowerShell commandlet for the test user and then sign-in with the test user after an hour. The PowerShell commandlet ensures that the policy will take effect for the user within an hour of when it's run. Typically, it takes up to 24 hours for the policy to take affect for basic authentication clients. Don't forget to review the FAQ section to learn more about this new feature. And if you're not familiar with conditional access yet, go ahead and read through our Azure AD conditional access documentation . Tell us what you think As always, we'd love to hear any feedback or suggestions you have. We've even created a short survey for you to participate in. Please let us know what you think! Best regards, Alex Simons (Twitter: @Alex_A_Simons ) Director of Program Management Microsoft Identity Division
Updated Jul 24, 2020
Version 9.0
  • Stephen Wilson's avatar
    Stephen Wilson
    Copper Contributor

    Alex,

    Thanks, this is great! One question: If not selecting ActiveSync clients in the policy, will legacy authentication via ActiveSync still be possible, and if so still subject to password spray attacks? If so is there then any way to disable legacy auth for ActiveSync but still allow modern auth over ActiveSync, such as how the newer iOS mail client supports.

    Regards,

    Stephen

  • JTRealms's avatar
    JTRealms
    Copper Contributor
    Can we control what apps are categorised as "Other"? Office 2016 is classified as "Other clients; Older Office clients" and blocked.
  • Anthony Brock's avatar
    Anthony Brock
    Copper Contributor

    I have enabled this condition as a part of a conditional access block policy, but it makes no difference to any of our legacy auth client access.  I am assuming it is still in public preview and that our tenant is not apart of this?

  • Lennard Kuijten's avatar
    Lennard Kuijten
    Copper Contributor

    I takes up to 24 hours after the policy is enabled, before legacy authentication will be blocked.

    Take notice, when you are using AD FS to authenticate with Azure AD. Password Spray attacks directly on your AD FS (sts.domain.com) will not be blocked with this policy. You need to migrate to PTA or Password hash to prevent this.

  • Magnus Tengmo's avatar
    Magnus Tengmo
    Copper Contributor

    Could it be that Office2016 is still using legacy authentication? If you got an old AAD you need to enable modern authentication for Exchange and Skype.