How to configure Microsoft Entra certificate-based authentication
Microsoft Entra certificate-based authentication (CBA) enables organizations to configure their Microsoft Entra tenants to allow or require users to authenticate with X.509 certificates created by their Enterprise Public Key Infrastructure (PKI) for app and browser sign-in. This feature enables organizations to adopt phishing-resistant modern passwordless authentication by using an x.509 certificate.
During sign-in, users also see an option to authenticate with a certificate instead of entering a password. If multiple matching certificates are present on the device, the user can pick which one to use. The certificate is validated against the user account and if successful, they sign in.
Follow these instructions to configure and use Microsoft Entra CBA for tenants in Office 365 Enterprise and US Government plans. You should already have a public key infrastructure (PKI) configured.
Prerequisites
Make sure that the following prerequisites are in place:
- Configure at least one certificate authority (CA) and any intermediate CAs in Microsoft Entra ID.
- The user must have access to a user certificate (issued from a trusted Public Key Infrastructure configured on the tenant) intended for client authentication to authenticate against Microsoft Entra ID.
- Each CA should have a certificate revocation list (CRL) that can be referenced from internet-facing URLs. If the trusted CA doesn't have a CRL configured, Microsoft Entra ID doesn't perform any CRL checking, revocation of user certificates doesn't work, and authentication isn't blocked.
Important
Make sure the PKI is secure and can't be easily compromised. In the event of a compromise, the attacker can create and sign client certificates and compromise any user in the tenant, both users whom are synchronized from on-premises and cloud-only users. However, a strong key protection strategy, along with other physical and logical controls, such as HSM activation cards or tokens for the secure storage of artifacts, can provide defense-in-depth to prevent external attackers or insider threats from compromising the integrity of the PKI. For more information, see Securing PKI.
Important
Please visit the Microsoft recommendations for best practices for Microsoft Cryptographic involving algorithm choice, key length and data protection. Please make sure to use one of the recommended algorithms, key length and NIST approved curves.
Important
As part of ongoing security improvements Azure/M365 endpoints are adding support for TLS1.3 and this process is expected to take a few months to cover the thousands of service endpoints across Azure/M365. This includes the Microsoft Entra endpoint used by Microsoft Entra certificate-based authentication (CBA) *.certauth.login.microsoftonline.com
and *.certauth.login.microsoftonline.us
. TLS 1.3 is the latest version of the internet’s most deployed security protocol, which encrypts data to provide a secure communication channel between two endpoints. TLS 1.3 eliminates obsolete cryptographic algorithms, enhances security over older versions, and aims to encrypt as much of the handshake as possible. We highly recommend for developers to start testing TLS 1.3 in their applications and services.
Note
When evaluating a PKI, it is important to review certificate issuance policies and enforcement. As mentioned, adding certificate authorities (CAs) to Microsoft Entra configuration allows certificates issued by those CAs to authenticate any user in Microsoft Entra ID. For this reason, it is important to consider how and when the CAs are allowed to issue certificates, and how they implement reusable identifiers. Where administrators need to ensure only a specific certificate is able to be used to authenticate a user, admins should exclusively use high-affinity bindings to achieve a higher level of assurance that only a specific certificate is able to authenticate the user. For more information, see high-affinity bindings.
Steps to configure and test Microsoft Entra CBA
Some configuration steps need to be done before you enable Microsoft Entra CBA. First, an admin must configure the trusted CAs that issue user certificates. As seen in the following diagram, we use role-based access control to make sure only least-privileged administrators are needed to make changes.
A Global Administrator is needed to manage this feature.
Optionally, you can also configure authentication bindings to map certificates to single-factor or multifactor authentication, and configure username bindings to map the certificate field to an attribute of the user object. Authentication Policy Administrators can configure user-related settings. Once all the configurations are complete, enable Microsoft Entra CBA on the tenant.
Step 1: Configure the certificate authorities with PKI-based trust store (Preview)
Entra has a new public key infrastructure (PKI) based certificate authorities (CA) trust store. The PKI-based CA trust store keeps CAs within a container object for each different PKI. Admins can manage CAs in a container based on PKI easier than one flat list of CAs.
The PKI-based trust store has higher limits for the number of CAs and the size of each CA file. A PKI-based trust store supports up to 250 CAs and 8-KB size for each CA object. We highly recommended you use the new PKI-based trust store for storing CAs, which is scalable and supports new functionality like issuer hints.
Note
If you use the old trust store to configure CAs, we recommended you configure a PKI-based trust store. After you make sure everything works well, you can delete the CAs from old trust store.
An admin must configure the trusted CAs that issue user certificates. Only least-privileged administrators are needed to make changes. A PKI-based trust store has RBAC roles Privilege Authentication Administrator and Authentication Administrator.
A Microsoft Entra ID P1 or P2 license is required to configure the certificate authorities with a PKI-based trust store. If you have a free Microsoft Entra ID license or Microsoft 365 license, you can configure certificate authorities to enable CBA by using the Microsoft Entra admin center. For more information, see How to configure certificate authorities for Microsoft Entra certificate-based authentication.
Configure certificate authorities by using the Microsoft Entra admin center
Create a PKI container object.
Sign in to the Microsoft Entra admin center as an Authentication Policy Administrator.
Browse to Protection > Show more > Security Center (or Identity Secure Score) > Public key infrastructure (Preview).
Click + Create PKI.
Enter Display Name.
Click Create.
To delete a PKI, select the PKI and select Delete. If the PKI has CAs in it, enter the name of the PKI to acknowledge the deletion of all CAs within it and select Delete.
Select Columns to add or delete columns.
Select Refresh to refresh the list of PKIs.
To upload a CA into the PKI container:
Click on + Add certificate authority.
Select the CA file.
Select Yes if the CA is a root certificate, otherwise select No.
For Certificate Revocation List URL, set the internet-facing URL for the CA base CRL that contains all revoked certificates. If the URL isn't set, authentication with revoked certificates doesn't fail.
For Delta Certificate Revocation List URL, set the internet-facing URL for the CRL that contains all revoked certificates since the last base CRL was published.
The Issuer hints flag is enabled by default. Turn off Issuer hints if the CA shouldn't be included in issuer hints.
Select Save.
To delete a CA certificate, select the certificate and select Delete.
Select Columns to add or delete columns.
Select Refresh to refresh the list of CAs.
To upload all CAs at once into the PKI container:
- Create a PKI container object, or open one.
- Select Upload PKI.
- Enter the http internet facing URL where the .p7b file is available.
- Enter the SHA256 checksum of the file.
- Select the upload.
- Upload PKI is an asynchronous process. As each CA is uploaded, it's available in the PKI. Completion of PKI upload can take up to 30 minutes.
- Select Refresh to refresh the CAs.
To generate the SHA256 checksum of the PKI .p7b file, run this command:
Get-FileHash .\CBARootPKI.p7b -Algorithm SHA256
Edit a PKI
- To edit PKI, select ... on the PKI row and select Edit.
- Enter a new PKI name and select Save.
Edit a CA
- To edit CA, select ... on the CA row and select Edit.
- Enter new values for Certificate Authority type (root/intermediate), CRL URL, Delta CRL URL, Issuer Hints enabled flag as necessary and select Save.
Restore a PKI
- Select the Deleted PKIs tab.
- Select the PKI and select Restore PKI.
Restore a CA
- Select the Deleted CAs tab.
- Select the CA file and select Restore certificate authority.
Understanding isIssuerHintEnabled attribute on CA
Issuer hints send back a Trusted CA Indication as part of the Transport Layer Security (TLS) handshake. The trusted CA list is set to the subject of the CAs uploaded by the tenant in the Entra trust store. For more information about issuer hints, see Understanding Issuer Hints.
By default, the subject names of all CAs in the Microsoft Entra trust store are sent as hints.
If you want to send back a hint with only specific CAs, set the issuer hint attribute isIssuerHintEnabled to true
.
There's a character limit of 16 KB for the issuer hints (subject name of the CA) that the server can send back to the TLS client. As a good practice, set the attribute isIssuerHintEnabled to true only for the CAs that issue user certificates.
If multiple intermediate CAs from the same root certificate issue the end user certificates, then by default all the certificates show up in the certificate picker. But if you set isIssuerHintEnabled to true
for specific CAs, only the proper user certificates appear in the certificate picker. To enable isIssuerHintEnabled, edit the CA, and update the value to true
.
Configure certificate authorities using the Microsoft Graph APIs
Microsoft Graph APIs can be used to configure CAs. The following examples show how to use Microsoft Graph to run Create, Read, Update, or Delete (CRUD) operations for a PKI or CA.
Create a PKI container object
PATCH https://graph.microsoft.com/beta/directory/publicKeyInfrastructure/certificateBasedAuthConfigurations/
Content-Type: application/json
{
"displayName": "ContosoPKI"
}
Get all the PKI objects
GET https://graph.microsoft.com/beta/directory/publicKeyInfrastructure/certificateBasedAuthConfigurations
ConsistencyLevel: eventual
Get PKI object by PKI-id
GET https://graph.microsoft.com/beta/directory/publicKeyInfrastructure/certificateBasedAuthConfigurations/{PKI-id}/
ConsistencyLevel: eventual
Upload CAs with a .p7b file
PATCH https://graph.microsoft.com/beta/directory/publicKeyInfrastructure/certificateBasedAuthConfigurations/{PKI-id}/certificateAuthorities/{CA-id}
Content-Type: application/json
{
"uploadUrl":"https://CBA/demo/CBARootPKI.p7b,
"sha256FileHash": "AAAAAAD7F909EC2688567DE4B4B0C404443140D128FE14C577C5E0873F68C0FE861E6F"
}
Get all CAs in a PKI
GET https://graph.microsoft.com/beta/directory/publicKeyInfrastructure/certificateBasedAuthConfigurations/{PKI-id}/certificateAuthorities
ConsistencyLevel: eventual
Get a specific CA within a PKI by CA-id
GET https://graph.microsoft.com/beta/directory/publicKeyInfrastructure/certificateBasedAuthConfigurations/{PKI-id}/certificateAuthorities/{CA-id}
ConsistencyLevel: eventual
Update specific CA issuer hints flag
PATCH https://graph.microsoft.com/beta/directory/publicKeyInfrastructure/certificateBasedAuthConfigurations/{PKI-id}/certificateAuthorities/{CA-id}
Content-Type: application/json
{
"isIssuerHintEnabled": true
}
Configure certificate authorities (CA) using PowerShell For this configuration, you can use [Microsoft Graph PowerShell] (/powershell/microsoftgraph/installation).
Start PowerShell with administrator privileges.
Install and import the Microsoft Graph PowerShell SDK.
Install-Module Microsoft.Graph -Scope AllUsers Import-Module Microsoft.Graph.Authentication Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
Connect to the tenant and accept all.
Connect-MGGraph -Scopes "Directory.ReadWrite.All", "User.ReadWrite.All" -TenantId <tenantId>
Audit log
Any CRUD operations on a PKI or CA within the trust store are logged into the Microsoft Entra audit logs.
FAQs
Question: Why does upload PKI fail?
Answer: Check if the PKI file is valid and can be accessed without any issues. The max size of PKI file should be
Question: What is the service level agreement (SLA) for PKI upload?
Answer: PKI upload is an asynchronous operation and may take up to 30 minutes for completion.
Question: How do you generate SHA256 checksum for PKI file?
Answer: To generate the SHA256 checksum of the PKI.p7b file, run this command:
Get-FileHash .\CBARootPKI.p7b -Algorithm SHA256
Step 2: Enable CBA on the tenant
Important
A user is considered capable for MFA when the user is in scope for Certificate-based authentication in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods. If the users don't have access to certificates, they get locked out and can't register other methods for MFA. Authentication Policy Administrators need to enable CBA only for users who have a valid certificates. Don't include All users for CBA. Only use groups of users with valid certificates available. For more information, see Microsoft Entra multifactor authentication.
To enable CBA in the Microsoft Entra admin center, complete the following steps:
Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.
Browse to Groups > All groups > select New group and create a group for CBA users.
Browse to Protection > Authentication methods > Certificate-based Authentication.
Under Enable and Target, select Enable.
Select Add groups to select specific groups like the one you created. Use specific groups rather than All users.
Once certificate-based authentication is enabled on the tenant, all users in the tenant see the option to sign in with a certificate. Only users who are enabled for CBA can authenticate by using the X.509 certificate.
Note
The network administrator should allow access to certauth endpoint for the customer's cloud environment in addition to login.microsoftonline.com
. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
Step 3: Configure authentication binding policy
The authentication binding policy helps determine the strength of authentication to either a single factor or multifactor. The default protection level for the certificates on the tenant is single-factor authentication.
An Authentication Policy Administrator can change the default value from single-factor to multifactor and configure custom policy rules. Authentication binding rules map certificate attributes, such as Issuer, or Policy Object ID (OID), or Issuer and Policy OID, to a value and select default protection level for that rule. You can create multiple rules.
To modify tenant default settings in the Microsoft Entra admin center, complete the following steps:
Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.
Browse to Protection > Authentication methods > Policies.
Under Manage, select Authentication methods > Certificate-based Authentication.
Select Configure to set up authentication binding and username binding.
The protection level attribute has a default value of Single-factor authentication. Select Multifactor authentication to change the default value to MFA.
Note
The default protection level value is in effect if no custom rules are added. If custom rules are added, the protection level defined at the rule level is honored instead.
You can also set up custom authentication binding rules to help determine the protection level for client certificates. It can be configured using either the issuer Subject or Policy OID fields in the certificate.
Authentication binding rules map the certificate attributes (issuer or Policy OID) to a value, and select default protection level for that rule. Multiple rules can be created.
To add custom rules, select Add rule.
To create a rule by certificate issuer, select Certificate issuer.
Select a Certificate issuer identifier from the list box.
Select Multifactor authentication, Low affinity binding, and then click Add. When prompted, click I acknowledge to finish adding the rule.
To create a rule by Policy OID, select Policy OID.
Enter a value for Policy OID.
Select Multifactor authentication, Low affinity binding, and then click Add. When prompted, click I acknowledge to finish adding the rule.
To create a rule by Issuer and Policy OID:
Select Certificate Issuer and Policy OID.
Select an issuer and enter the policy OID.
For Authentication strength, select Single-factor authentication or Multifactor authentication.
For Affinity binding, select Low.
Select Add.
Authenticate with a certificate that has policy OID of 3.4.5.6 and Issued by CN=CBATestRootProd. Authentication should pass and get a multifactor claim.
Important
There's a known issue where a Microsoft Entra tenant Authentication Policy Administrator configures a CBA authentication policy rule by using both Issuer and Policy OID. The issue impacts some device registration scenarios, including:
- Windows Hello For Business enrollment
- FIDO2 security key registration
- Windows passwordless phone sign-in
Device registration with Workplace Join, Microsoft Entra ID and Hybrid Microsoft Entra device join scenarios aren't impacted. CBA authentication policy rules using either Issuer OR Policy OID aren't impacted. To mitigate, admins should:
- Edit the certificate-based authentication policy rules that use both Issuer and Policy OID options. Remove either the Issuer or Policy OID requirement and Save. -Or-
- Remove the authentication policy rule that uses both Issuer and Policy OID. Create rules that use only Issuer or Policy OID.
We're working to fix the issue.
To create a rule by Issuer and Serial Number:
Add an authentication binding policy. The policy requires that any certificate issued by CN=CBATestRootProd with policyOID 1.2.3.4.6 needs only high affinity binding. Issuer and serial number are used.
Select the certificate field. In this example, let's select Issuer and Serial number.
The only user attribute supported is CertificateUserIds. Select Add.
Select Save.
The sign-in log shows which binding was used for sign-in, and the details from the certificate.
Select Ok to save any custom rule.
Important
Enter the PolicyOID by using the object identifier format. For example, if the certificate policy says All Issuance Policies, enter the OID as 2.5.29.32.0 when you add the rule. The string All Issuance Policies is invalid for the rules editor and doesn't take effect.
Step 4: Configure username binding policy
The username binding policy helps validate the certificate of the user. By default, we map Principal Name in the certificate to UserPrincipalName in the user object to determine the user.
An Authentication Policy Administrator can override the default and create a custom mapping. To determine how to configure username binding, see How username binding works.
For other scenarios that use the certificateUserIds attribute, see Certificate user IDs.
Important
If a username binding policy uses synchronized attributes, such as the certificateUserIds, onPremisesUserPrincipalName, and userPrincipalName attribute of the user object, be aware that accounts with administrative privileges in Active Directory (such as those with delegated rights on user objects or administrative rights on the Microsoft Entra Connect Server) can make changes that impact these attributes in Microsoft Entra ID.
Create the username binding by selecting one of the X.509 certificate fields to bind with one of the user attributes. The username binding order represents the priority level of the binding. The first one has the highest priority, and so on.
If the specified X.509 certificate field is found on the certificate, but Microsoft Entra ID doesn't find a user object using that value, the authentication fails. Microsoft Entra ID tries the next binding in the list.
Select Save to save the changes.
The final configuration looks like this image:
Step 5: Test your configuration
This section covers how to test your certificate and custom authentication binding rules.
Test your certificate
As a first configuration test, you should try to sign in to the MyApps portal using your on-device browser.
Enter your User Principal Name (UPN).
Select Next.
If you enabled other authentication methods like Phone sign-in or FIDO2, users might see a different sign-in screen.
Select Sign in with a certificate.
Pick the correct user certificate in the client certificate picker UI and select OK.
Users should be signed into MyApps portal.
If your sign-in is successful, then you know that:
- The user certificate is provisioned into your test device.
- Microsoft Entra ID is configured correctly with trusted CAs.
- Username binding is configured correctly, and the user is found and authenticated.
Test custom authentication binding rules
Let's walk through a scenario where we validate strong authentication. We create two authentication policy rules, one by using issuer subject to satisfy single-factor authentication, and another by using policy OID to satisfy multifactor authentication.
Create an issuer Subject rule with protection level as single-factor authentication and value set to your CAs Subject value. For example:
CN = WoodgroveCA
Create a policy OID rule, with protection level as multifactor authentication and value set to one of the policy OIDs in your certificate. For example, 1.2.3.4.
Create a Conditional Access policy for the user to require multifactor authentication by following steps at Conditional Access - Require MFA.
Navigate to MyApps portal. Enter your UPN and select Next.
Select Sign in with a certificate.
If you enabled other authentication methods like Phone sign-in or security keys, users might see a different sign-in screen.
Select the client certificate and select Certificate Information.
The certificate appears, and you can verify the issuer and policy OID values.
To see Policy OID values, select Details.
Select the client certificate and select OK.
The policy OID in the certificate matches the configured value of 1.2.3.4, and satisfies multifactor authentication. Similarly, the issuer in the certificate matches the configured value of CN=WoodgroveCA, and satisfies single-factor authentication.
Because the policy OID rule takes precedence over the issuer rule, the certificate satisfies multifactor authentication.
The Conditional Access policy for the user requires MFA and the certificate satisfies multifactor, so the user can sign in to the application.
Test username binding policy
The username binding policy helps validate the certificate of the user. There are three bindings that are supported for the username binding policy:
- IssuerAndSerialNumber > CertificateUserIds
- IssuerAndSubject > CertificateUserIds
- Subject > CertificateUserIds
By default, Microsoft Entra ID maps Principal Name in the certificate to UserPrincipalName in the user object to determine the user. An Authentication Policy Administrator can override the default and create a custom mapping, as explained earlier.
An Authentication Policy Administrator needs to enable the new bindings. To prepare, they must make sure the correct values for the corresponding username bindings are updated in the CertificateUserIds attribute of the user object:
- For cloud only users, use the Microsoft Entra admin center or Microsoft Graph APIs to update the value in CertificateUserIds.
- For on-premises synced users, use Microsoft Entra Connect to sync the values from on-premises by following Microsoft Entra Connect Rules or syncing AltSecId value.
Important
The format of the values of Issuer, Subject, and SerialNumber should be in the reverse order of their format in the certificate. Don't add any space in the Issuer or Subject.
Issuer and Serial Number manual mapping
Here's an example for Issuer and Serial Number manual mapping. The Issuer value to be added is:
C=US,O=U.SGovernment,OU=DoD,OU=PKI,OU=CONTRACTOR,CN=CRL.BALA.SelfSignedCertificate
To get the correct value for serial number, run the following command, and store the value shown in CertificateUserIds. The command syntax is:
Certutil –dump –v [~certificate path~] >> [~dumpFile path~]
For example:
certutil -dump -v firstusercert.cer >> firstCertDump.txt
Here's an example for the certutil command:
certutil -dump -v C:\save\CBA\certs\CBATestRootProd\mfausercer.cer
X509 Certificate:
Version: 3
Serial Number: 48efa06ba8127299499b069f133441b2
b2 41 34 13 9f 06 9b 49 99 72 12 a8 6b a0 ef 48
The SerialNumber value to be added in CertificateUserId is:
b24134139f069b49997212a86ba0ef48
CertificateUserId:
X509:<I>C=US,O=U.SGovernment,OU=DoD,OU=PKI,OU=CONTRACTOR,CN=CRL.BALA.SelfSignedCertificate<SR> b24134139f069b49997212a86ba0ef48
Issue and Subject manual mapping
Here's an example for Issue and Subject manual mapping. The Issuer value is:
The Subject value is:
CertificateUserId:
X509:<I>C=US,O=U.SGovernment,OU=DoD,OU=PKI,OU=CONTRACTOR,CN=CRL.BALA.SelfSignedCertificate<S> DC=com,DC=contoso,DC=corp,OU=UserAccounts,CN=FirstUserATCSession
Subject manual mapping
Here's an example for Subject manual mapping. The Subject value is:
CertificateUserId:
X509:<S>DC=com,DC=contoso,DC=corp,OU=UserAccounts,CN=FirstUserATCSession
Test affinity binding
Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.
Browse to Protection > Authentication methods > Policies.
Under Manage, select Authentication methods > Certificate-based Authentication.
Select Configure.
Set Required Affinity Binding at the tenant level.
Important
Be careful with the tenant-wide affinity setting. You can lock out the entire tenant if you change the Required Affinity Binding for the tenant and you don't have proper values in the user object. Similarly, if you create a custom rule that applies to all users and requires high affinity binding, users in the tenant can get locked out.
To test, select Required Affinity Binding to be Low.
Add a high affinity binding like SKI. Select Add rule under Username binding.
Select SKI and select Add.
When finished, the rule looks like this screenshot:
Update all user objects CertificateUserIds attribute to have the correct value of SKI from the user certificate. For more information, see Supported patterns for CertificateUserIDs.
Create a custom rule for Authentication binding.
Select Add.
When finished, the rule looks like this screenshot:
Update the user CertificateUserIds with correct SKI value from the certificate with policy OID 9.8.7.5.
Test with a certificate with policy OID 9.8.7.5 and the user should be authenticated with SKI binding and get MFA with only the certificate.
Enable CBA using Microsoft Graph API
To enable CBA and configure username bindings using Graph API, complete the following steps.
Go to Microsoft Graph Explorer.
Select Sign into Graph Explorer and sign in to your tenant.
Follow the steps to consent to the Policy.ReadWrite.AuthenticationMethod delegated permission.
GET all authentication methods:
GET https://graph.microsoft.com/v1.0/policies/authenticationmethodspolicy
GET the configuration for the x509 Certificate authentication method:
GET https://graph.microsoft.com/v1.0/policies/authenticationmethodspolicy/authenticationMethodConfigurations/X509Certificate
By default, the x509 Certificate authentication method is disabled. To allow users to sign in with a certificate, you must enable the authentication method and configure the authentication and username binding policies through an update operation. To update policy, run a PATCH request.
Request body:
PATCH https://graph.microsoft.com/v1.0/policies/authenticationMethodsPolicy/authenticationMethodConfigurations/x509Certificate Content-Type: application/json { "@odata.type": "#microsoft.graph.x509CertificateAuthenticationMethodConfiguration", "id": "X509Certificate", "state": "enabled", "certificateUserBindings": [ { "x509CertificateField": "PrincipalName", "userProperty": "onPremisesUserPrincipalName", "priority": 1 }, { "x509CertificateField": "RFC822Name", "userProperty": "userPrincipalName", "priority": 2 }, { "x509CertificateField": "PrincipalName", "userProperty": "certificateUserIds", "priority": 3 } ], "authenticationModeConfiguration": { "x509CertificateAuthenticationDefaultMode": "x509CertificateSingleFactor", "rules": [ { "x509CertificateRuleType": "issuerSubject", "identifier": "CN=WoodgroveCA ", "x509CertificateAuthenticationMode": "x509CertificateMultiFactor" }, { "x509CertificateRuleType": "policyOID", "identifier": "1.2.3.4", "x509CertificateAuthenticationMode": "x509CertificateMultiFactor" } ] }, "includeTargets": [ { "targetType": "group", "id": "all_users", "isRegistrationRequired": false } ] }
You get a
204 No content
response code. Rerun the GET request to make sure the policies are updated correctly.Test the configuration by signing in with a certificate that satisfies the policy.
Enable CBA using Microsoft PowerShell
- Open PowerShell.
- Connect to Microsoft Graph:
Connect-MgGraph -Scopes "Policy.ReadWrite.AuthenticationMethod"
- Create a variable for defining group for CBA users:
$group = Get-MgGroup -Filter "displayName eq 'CBATestGroup'"
- Define the request body:
$body = @{ "@odata.type" = "#microsoft.graph.x509CertificateAuthenticationMethodConfiguration" "id" = "X509Certificate" "state" = "enabled" "certificateUserBindings" = @( @{ "@odata.type" = "#microsoft.graph.x509CertificateUserBinding" "x509CertificateField" = "SubjectKeyIdentifier" "userProperty" = "certificateUserIds" "priority" = 1 }, @{ "@odata.type" = "#microsoft.graph.x509CertificateUserBinding" "x509CertificateField" = "PrincipalName" "userProperty" = "UserPrincipalName" "priority" = 2 }, @{ "@odata.type" = "#microsoft.graph.x509CertificateUserBinding" "x509CertificateField" = "RFC822Name" "userProperty" = "userPrincipalName" "priority" = 3 } ) "authenticationModeConfiguration" = @{ "@odata.type" = "#microsoft.graph.x509CertificateAuthenticationModeConfiguration" "x509CertificateAuthenticationDefaultMode" = "x509CertificateMultiFactor" "rules" = @( @{ "@odata.type" = "#microsoft.graph.x509CertificateRule" "x509CertificateRuleType" = "policyOID" "identifier" = "1.3.6.1.4.1.311.21.1" "x509CertificateAuthenticationMode" = "x509CertificateMultiFactor" } ) } "includeTargets" = @( @{ "targetType" = "group" "id" = $group.Id "isRegistrationRequired" = $false } ) } | ConvertTo-Json -Depth 5
- Run the PATCH request:
Invoke-MgGraphRequest -Method PATCH -Uri "https://graph.microsoft.com/v1.0/policies/authenticationMethodsPolicy/authenticationMethodConfigurations/x509Certificate" -Body $body -ContentType "application/json"