Tenant Configuration
After completing federation and provisioning, there are a few recommended configurations in your Microsoft Entra ID tenant to ensure the best experience with BlokSec passwordless authentication.
Block legacy authentication
Section titled “Block legacy authentication”This is the most important tenant configuration for a passwordless deployment. Legacy authentication protocols (SMTP basic auth, POP, IMAP, Exchange ActiveSync) bypass browser-based sign-in entirely — they send usernames and passwords directly to the identity provider. Since BlokSec is passwordless and doesn’t validate passwords, these legacy requests will always fail.
Blocking legacy authentication:
- Prevents confusing authentication failures for users on old email clients
- Eliminates a significant security risk (credentials sent in plain text)
- Aligns with Microsoft’s own security baseline recommendations
Create the Conditional Access policy
Section titled “Create the Conditional Access policy”- Sign in to the Microsoft Entra admin center (https://entra.microsoft.com)
- Go to Protection > Conditional Access > Policies
- Click New policy
- Name it something descriptive like “Block legacy authentication”
Configure assignments
Section titled “Configure assignments”Under Users, select All users. If you have a break-glass emergency access account, add it as an exclusion.
Under Target resources, select All cloud apps.
Configure conditions
Section titled “Configure conditions”Under Conditions > Client apps, check:
- Exchange ActiveSync clients
- Other clients
Leave all other client app types unchecked (Browser and Mobile apps and desktop clients should remain unchecked — these use modern authentication and work with BlokSec).
Configure access controls
Section titled “Configure access controls”Under Grant, select Block access.
Enable the policy
Section titled “Enable the policy”To review the impact in Report-only mode:
- Go to Identity > Monitoring & health > Sign-in logs
- Filter by Conditional Access > Report-only: Failure
- Look for users who would have been blocked — these are users whose clients are using legacy authentication
Once you’re satisfied, edit the policy and change it from Report-only to On.
MFA behavior for federated domains
Section titled “MFA behavior for federated domains”BlokSec performs multi-factor authentication as part of the passwordless flow (device biometrics + the approved device itself). You should configure your tenant to accept MFA performed by BlokSec rather than requiring Microsoft’s own MFA on top:
- In the Entra admin center, go to Identity > External Identities > All identity providers
- Find your federated domain and open its settings
- Set Federated IdP MFA behavior to Accept MFA done by federated IdP
This is typically configured automatically by the BlokSec federation wizard (the federatedIdpMfaBehavior: acceptIfMfaDoneByFederatedIdp setting), but it’s worth verifying.
Session and token lifetime
Section titled “Session and token lifetime”Microsoft 365 has its own session lifetime policies that work alongside BlokSec’s session duration:
- BlokSec session duration — How long the user’s authentication with BlokSec is valid (configured in the application settings)
- Microsoft token lifetime — How long the M365 access/refresh tokens are valid
For the smoothest user experience, set the BlokSec session duration to be equal to or longer than your Microsoft token lifetime. This prevents users from being asked to re-authenticate with BlokSec before their M365 session has expired.
The default BlokSec session duration of 8 hours works well with Microsoft’s default token lifetimes.
Verify the configuration
Section titled “Verify the configuration”After completing all the tenant configuration steps, verify the end-to-end flow:
- Open a private/incognito browser window
- Go to https://portal.office.com
- Sign in with a federated user’s email address
- You should be redirected to BlokSec’s sign-in page
- Approve the sign-in on the user’s phone
- You should be signed in to Microsoft 365 without entering a password
Test with a few different applications (Outlook web, Teams web, SharePoint) to confirm everything works as expected.