
Next, we will check the audit logs and properties of the users…Īzure AD’s sign-in logs shows the initial authentication with “Temporary Access Pass” to the “Microsoft Authentication Broker”:Īudit logs of Azure AD gives you an overview about the various steps of the security key registration process: This offers the opportunity to complete the user on-boarding and registration of the FIDO2 security key from the assigned device of the user or any shared device.Īfter the initial sign-in you should start with registering your FIDO2 key as your next step. I’m using the “Web Sign-in” option in Windows 10 to redeem the TAP for the first sign-in. This limitation does not apply to a Temporary Access Pass that can be used more than once. When using a one-time Temporary Access Pass to register a Passwordless method such as FIDO2 or Phone sign-in, the user must complete the registration within 10 minutes of sign-in with the one-time Temporary Access Pass. Important note from the “Limitations” section of the TAP documentation: In my use case, I’ve limited the creation of TAPs to a “user deployment group” and restrict them as “one-time use”:Īfterwards, you should be able to create a TAP for users within this policy as well as delegated Graph API or “ Azure AD Directory Role” permissions are assigned. In the first part of the blog post, you should have already seen the pre-requisites to enable “Temporary Access Pass” (TAP). Attack scenarios on Kerberos (Azure AD-joined device).Analyzing the original source of unresolved “Device names” by IP address.Consideration of detections by “Microsoft Defender for Identity”.Monitoring of sign-in events to Active Directory.Authentication to Active Directory and On-Premises Resources.

VPN connectivity to on-premises network.Monitoring of sign-in events to cloud resources.Authentication to Azure AD-integrated apps and resources.
