Conditional Access Trusted Locations

Sophisticated phishing emails continue to bypass perimeter defences and reach end users’ mailboxes. While security awareness training is essential, it cannot be the sole line of defence.

The seamless sign-on risk

Zero Trust principles dictate that we assume breach. If Entra Connect Seamless SSO is enabled and a user clicks a phishing link, they will be automatically signed into Entra ID/M365 without any authentication prompt. This creates a critical vulnerability: a single click can compromise both the user account and potentially the entire M365 tenant.

Trusted locations: use with caution

Whilst there are legitimate use cases for trusted IP ranges, organisations should carefully review what qualifies as a “trusted location.” Creating a Conditional Access policy that exempts trusted locations from MFA is particularly risky—it assumes that network perimeter equals trustworthiness, which contradicts Zero Trust principles.

Recommendations

  • Deploy phishing-resistant authentication (FIDO2, Windows Hello for Business) where possible
  • Review and minimise seamless SSO scope
  • Audit existing trusted location definitions and remove unnecessary exemptions
  • Ensure MFA is enforced for all users, regardless of location
  • Layer security awareness training with technical controls

Disabling Entra Connect Seamless SSO: A Security-First Decision

After reviewing the security implications of Microsoft Entra Connect Seamless Single Sign-On (SSO), I am disabling this feature for my enterprise clients. Here’s why.

The vulnerability

Seamless SSO automatically authenticates users to Entra ID/M365 from domain-joined machines without prompting for credentials. Whilst this improves user experience, it creates a critical security gap: if a user clicks a phishing link, they are silently authenticated to the attacker’s infrastructure with no MFA challenge.

The attack chain is straightforward:

  1. Sophisticated phishing email bypasses perimeter controls
  2. User clicks malicious link
  3. Seamless SSO automatically authenticates the user to the attacker’s site
  4. Account compromised—no second factor, no user awareness
  5. Potential lateral movement across the M365 tenant

Why this matters

Zero Trust architecture assumes breach. Seamless SSO directly contradicts this principle by establishing implicit trust based solely on network location and device state. In today’s threat landscape—where phishing campaigns are increasingly sophisticated and AI-generated—this convenience feature represents an unacceptable risk.

The alternative

Modern authentication methods provide both security and usability:

  • Windows Hello for Business – Biometric or PIN-based authentication tied to hardware
  • FIDO2 security keys – Phishing-resistant hardware tokens
  • Microsoft Authenticator passwordless – Push notifications with number matching
  • Traditional MFA – Still far better than seamless authentication

Implementation approach

For existing environments with Seamless SSO enabled, I recommend:

  1. Audit current usage and document business justification
  2. Deploy phishing-resistant authentication methods
  3. Pilot the change with a test group
  4. Disable Seamless SSO via Entra Connect configuration
  5. Monitor authentication logs for issues
  6. Update security awareness training to reflect the new authentication flow

The minor inconvenience of an additional authentication prompt is a worthwhile trade-off for significantly improved security posture.

This recommendation

Leave a comment