Policies
This page describes the configuration of authentication policies within Microsoft Entra ID associated with systems built according to the guidance provided by ASD's Blueprint for Secure Cloud.
Estimated reading time: 2 minutes
Instruction
The below tables outline the as built configuration for ASD’s Blueprint for Secure Cloud (the Blueprint) for the Microsoft Entra admin portal at the following URL:
The settings described on these pages provide a baseline implementation for a system configured using the Blueprint. Any implementation implied by these pages should not be considered as prescriptive as to how an organisation must scope, build, document, or assess a system.
Implementation of the guidance provided by the Blueprint will differ depending on an organisation’s operating context and organisational culture. Organisations should implement the Blueprint in alignment with their existing change management, business processes and frameworks.
Placeholders such as <ORGANISATION.GOV.AU>
, <BLUEPRINT.GOV.AU>
and <TENANT-NAME>
should be replaced with the relevant details as required.
Method | Target | Enabled |
---|---|---|
FIDO2 security key | All users, excluding <Conditional Access excluded identities> | Yes |
Microsoft Authenticator | All users, excluding <Conditional Access excluded identities> | Yes |
SMS | No | |
Temporary Access Pass settings | All users, excluding <Conditional Access excluded identities> | Yes |
Hardware OATH tokens (Preview) | No | |
Third-party software OATH tokens | No | |
Voice call | No | |
Email OTP | No | |
Certificate-based authentication | No |
FIDO2 security key settings
Enable and Target
Item | Value |
---|---|
Enabled | Yes |
Target | All users |
Exclude | <Conditional Access excluded identities> |
Configure
Item | Value |
---|---|
Allow self-service set up | Yes |
Enforce attestation | Yes |
Enforce key restrictions | Yes |
Restrict specific keys | Allow |
Microsoft Authenticator (Preview) | Not checked |
Add AAGUID | organisation AAGUIDs |
Microsoft Authenticator settings
Enable and Target
Item | Value |
---|---|
Enabled | Yes |
Target | All users |
Exclude | <Conditional Access excluded identities> |
Configure
Item | Value |
---|---|
Allow use of Microsoft Authenticator OTP | No |
Require number matching for push notifications - Status | Enabled |
Require number matching for push notifications - Target | All users |
Show application name in push and passwordless notifications - Status | Microsoft managed |
Show application name in push and passwordless notifications - Target | All users |
Show geographic location in push and passwordless notifications - Status | Microsoft managed |
Show geographic location in push and passwordless notifications - Target | All users |
Microsoft Authenticator on companion applications - Status | Microsoft managed |
Microsoft Authenticator on companion applications - Target | All users |
Temporary Access Pass settings
Enable and Target
Item | Value |
---|---|
Enabled | Yes |
Target | All users |
Exclude | <Conditional Access excluded identities> |
Configure
Item | Value |
---|---|
Minimum lifetime | 1 hour |
Maximum lifetime | 8 hours |
Default lifetime | 1 hour |
One-time | No |
Length | 14 characters |
Related information
Security & Governance
- Authentication Hardening
- System Management
- Essential Eight: Multi-factor Authentication
- Essential Eight: Restrict Microsoft Office Macros