Advancing Cybersecurity: The Latest enhancement in Phishing-Resistant Authentication (2024)

Today, I’m excited to share with you several new developments in the journey towards phishing-resistant authentication for all users! This isn’t just essential for compliance with Executive Order14028 on Improving the Nation's Cybersecurity but is increasingly critical for the safety of all the orgs and users who bet on digital identity.

TL;DR? Here’s the cheat sheet!

  • Microsoft Authenticator announces phishing-resistant passkey support.
  • More configuration options for PIV/CAC authentication.
  • FIDO2 support for iOS and MacOS applications.
  • Managed policies help you with “secure by design, secure by default.”

Details below!

Microsoft Authenticator is becoming phishing-resistant!

As announced at Ignite 2023, in the first half of 2024, Microsoft Entra ID users will soon be able to register and sign in with device-bound passkeys managed in the Microsoft Authenticator app. This is a cost-effective, phishing-resistant credential available to anyone with the Authenticator app! Passkeys provide you with the latest and greatest security enhancements that will come to the FIDO standard over the next many years – and Authenticator integration lets you take advantage of the security innovations and advanced features Authenticator provides.

Advancing Cybersecurity: The Latest enhancement in Phishing-Resistant Authentication (1)Figure 1: Passkey managed in the Microsoft Authenticator app

NOTE: In new updates from the previous version of this blogpost: Microsoft Authenticator is not yet FIPS 140 compliant on Android. Microsoft Authenticator on Android is currently pending FIPS compliance certification to support our customers that may require FIPS validated cryptography.

The Microsoft Authenticator app on iOS is already FIPS-140 compliant, as announced in December of 2022. Learn more about FIPS 140 complaint for the Microsoft Authenticator app.

Improved configurability for organizations that uses PIV / CAC

In the last year since we announced the General Availability of Certificate-based Authentication (CBA), we’ve seen an increase of over 850% in Entra ID CBA usage for US Government customers. CBA helps our customers in their Zero Trust journey, migrating from on-premises IdPs such as AD FS, while continuing to provide familiar end user experience using PIV / CAC.

We continue our investments in cloud-based CBA with recently added capabilities that allow you to tailor authentication policies by certificate and resource type, as well as user group. You can now select certificate strength for different users, use CBA with other methods for multifactor or step-up authentication, and set high affinity (strong) binding for either the entire tenant or by user group.

Advancing Cybersecurity: The Latest enhancement in Phishing-Resistant Authentication (2)Figure 2: Configure certificate-based authentication binding policy rule

Learn more about our latest enhancements to Microsoft Entra certificate-based authentication.

Additional phishing-resistant authentication options for mobile: FIDO2 support for iOS and macOS applications

In the summer of 2023, we announced support for FIDO2 authentication on iOS and macOS web browsers. Today, we’re excited to announce the public preview of FIDO2 authentication on iOS and macOS . With this release, users who have Microsoft Authenticator installed on iOS or Microsoft Intune Company Portal installed on macOS can sign into Microsoft applications using a FIDO2 security key. This feature is available now on iOS and will be available early next year on macOS.

FIDO2 authentication is also available in MSAL-enabled third-party apps on iOS and macOS that meet the requirements listed in Support passwordless authentication with FIDO2 keys in apps you develop.

Learn more about the supported platforms here.

Adopting secure defaults, aligned with “Secure by design, secure by default” approach outlined by CISA

Earlier this month, Microsoft announced the Secure Future Initiative. As part of this initiative, we will start Auto-rollout of Conditional Access policies. These initiatives align with the “Secure by design, Secure by default” approach called out by The Cybersecurity and Infrastructure Security Agency (CISA), to ensure consumers can trust the safety and integrity of the technology that they use every day.

We believe that tackling cybersecurity challenges is a collective effort. We're dedicated to collaborating closely with government agencies, security experts, and the broader community to strengthen our collective defenses against cyber threats. Our aim is to provide government customers with the tools and knowledge they need to stay ahead of evolving risks.

Our recent releases and ongoing commitment to enhancing cybersecurity will support our broad set of customers, including the U.S. government customers who are working to meet the Executive Order. Together, we can build a more secure digital future.

Best regards,

Alex Weinert

Learn more about Microsoft Entra:

  • See recent Microsoft Entra blogs
  • Dive into Microsoft Entra technical documentation
  • Learn more at Azure Active Directory (Azure AD) rename to Microsoft Entra ID
  • Join the conversation on the Microsoft Entra discussion space and Twitter
  • Learn more about Microsoft Security
Advancing Cybersecurity: The Latest enhancement in Phishing-Resistant Authentication (2024)

FAQs

What is phishing-resistant authentication? ›

Phishing-resistant authentication detects and prevents the disclosure of sensitive authentication data to fake apps or websites. WebAuthn (FIDO 2) and Okta FastPass (which comes with Okta Verify) are phishing-resistant authenticators that prevent email, SMS, and social media phishing attacks.

Why is FIDO2 phishing-resistant? ›

It is phishing-resistant because it does not share user credentials between services. FIDO2 uses WebAuthn APIs and public key cryptography to store credentials as encrypted public and private key combinations.

Is the Microsoft authenticator phishing-resistant? ›

Install Microsoft Authenticator on devices accessing applications protected by Microsoft Entra ID. To meet the phishing-resistant requirement: Manage only the devices accessing the protected application.

Is RSA phishing-resistant? ›

WASHINGTON, DC, August 27, 2024—RSA, the security-first identity leader, today announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to ...

Does 2FA stop phishing? ›

2FA doesn't prevent phishing or social engineering from being successful. 2FA is good. Everyone should use it when they can, but it isn't unbreakable. If you use or consider going to 2FA, Security Awareness Training has still got to be a big part of your overall security defense.

Can FIDO2 be hacked? ›

Single factor login with FIDO2 offers strong authentication as a single factor. In many cases, this single factor authentication is more secure than other forms of two-factor authentication (such as SMS), as there are no secrets that can be phished remotely when using FIDO2.

Why is FIDO2 more secure? ›

FIDO2 passkeys use public-key cryptography, which provides a higher level of security compared to centralized password databases. The private key never leaves the user's device, making it nearly impossible for attackers to steal or intercept it.

What makes YubiKey phishing-resistant? ›

The touch sensor on the YubiKey verifies that the user is a real human and that the authentication is done with real intent. This prevents remote attacks that can easily bypass software-based MFA.

How do you ensure phishing-resistant MFA strength? ›

Under Access controls > Grant, select Grant access, Require authentication strength, select Phishing-resistant MFA, then select Select. Confirm your settings and set Enable policy to Report-only.

What is the safest authentication type? ›

Categories
  • The Three Types of Authentication Factors.
  • Least Secure: Passwords.
  • More Secure: One-time Passwords.
  • More Secure: Biometrics.
  • Most Secure: Hardware Keys.
  • Most Secure: Device Authentication and Trust Factors.
Sep 4, 2024

What is the difference between passwordless and phishing-resistant MFA? ›

Passwordless MFA strength - includes authentication methods that satisfy MFA but don't require a password. Phishing-resistant MFA strength - includes methods that require an interaction between the authentication method and the sign-in surface.

Are passkeys phishing-resistant? ›

Passkeys offer a compelling combination of security and convenience, making them a powerful tool against phishing attacks. By eliminating the need for passwords and leveraging strong cryptographic principles, passkeys provide a phishing-resistant authentication method that enhances both user experience and security.

Why is WebAuthn phishing-resistant? ›

WebAuthn and Phishing

The reason WebAuthn is resistant to phishing attacks is due to the domain name being stored on the authenticator. Since most phishing attacks are hosted on fake websites, the authenticator will compare domain names that were stored in Step 3.

Is OTP phishing-resistant? ›

Attackers have devised ways to compromise legacy MFA solutions at scale; both OTP and push-based MFA are no longer sufficient. To defend against modern attacks, public and private sector organizations must start looking at phishing-resistant MFA to secure their systems.

What is the difference between passwordless and phishing-resistant? ›

Passwordless MFA strength - includes authentication methods that satisfy MFA but don't require a password. Phishing-resistant MFA strength - includes methods that require an interaction between the authentication method and the sign-in surface.

How is passkey phishing-resistant? ›

5.5 Unique Passkeys for Each Account#

Each passkey is tied to a single account, eliminating the risk of reuse across different services. This prevents a data breach in one account from compromising others. Your accounts remain secure, and the risk of credential phishing is significantly reduced.

How do I require phishing-resistant MFA for admins? ›

Under Target resources > Cloud apps > Include, select All cloud apps. Under Access controls > Grant, select Grant access, Require authentication strength, select Phishing-resistant MFA, then select Select. Confirm your settings and set Enable policy to Report-only. Select Create to create to enable your policy.

Top Articles
How To Buy Elcid Investments Share
LGFX Global Review 2023 - Get refund if scammed by broker
Xre-02022
Fredatmcd.read.inkling.com
East Cocalico Police Department
Unitedhealthcare Hwp
Women's Beauty Parlour Near Me
Aces Fmc Charting
Gameplay Clarkston
More Apt To Complain Crossword
Western Razor David Angelo Net Worth
Katie Boyle Dancer Biography
Hallelu-JaH - Psalm 119 - inleiding
Palace Pizza Joplin
Morocco Forum Tripadvisor
Keniakoop
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Restaurants Near Paramount Theater Cedar Rapids
7 Fly Traps For Effective Pest Control
Slope Tyrones Unblocked Games
Dr Adj Redist Cadv Prin Amex Charge
Imagetrend Inc, 20855 Kensington Blvd, Lakeville, MN 55044, US - MapQuest
iZurvive DayZ & ARMA Map
Christina Steele And Nathaniel Hadley Novel
Kirksey's Mortuary - Birmingham - Alabama - Funeral Homes | Tribute Archive
Riherds Ky Scoreboard
Craigslist Pearl Ms
Military life insurance and survivor benefits | USAGov
Best Transmission Service Margate
Dal Tadka Recipe - Punjabi Dhaba Style
Craigslist Pasco Kennewick Richland Washington
Tactical Masters Price Guide
Joann Fabrics Lexington Sc
Reserve A Room Ucla
Nicole Wallace Mother Of Pearl Necklace
Here’s how you can get a foot detox at home!
Joplin Pets Craigslist
Unlock The Secrets Of "Skip The Game" Greensboro North Carolina
Ursula Creed Datasheet
National Insider Threat Awareness Month - 2024 DCSA Conference For Insider Threat Virtual Registration Still Available
NHL training camps open with Swayman's status with the Bruins among the many questions
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
968 woorden beginnen met kruis
11526 Lake Ave Cleveland Oh 44102
Quiktrip Maple And West
Tommy Bahama Restaurant Bar & Store The Woodlands Menu
Jackerman Mothers Warmth Part 3
Diamond Spikes Worth Aj
Unit 4 + 2 - Concrete and Clay: The Complete Recordings 1964-1969 - Album Review
Tamilyogi Cc
Dr Seuss Star Bellied Sneetches Pdf
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 6061

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.