Enabling Token Protection in Entra ID Conditional Access
|
Field |
Details |
|
Document Type |
How-To Guide - Enable Token Protection in Entra ID Conditional Access |
|
Applies To |
Microsoft Entra ID, Conditional Access policy |
|
Audience |
2nd Line / Entra ID Admins / IT Engineer |
|
Author |
AK. Udofeh |
|
Last Updated |
March 2026 |
Overview
Token Protection is a Conditional Access session control that cryptographically binds authentication tokens (e.g., Primary Refresh Tokens) to a specific device. This prevents token replay, pass‑the‑cookie attacks, and AiTM token theft. It ensures that even if an attacker steals a token, they cannot use it on another machine.
Use Cases
Use Token Protection when:
- Protecting Exchange Online, SharePoint Online, Teams, and Microsoft 365 native applications.
- Hardening admin or power‑user endpoints
- Preventing AiTM attacks that harvest tokens after MFA completion
- Enforcing Zero‑Trust principles
Prerequisites
Licensing - Microsoft Entra ID P1 is required for Token Protection.
Device Requirements
Supported Platforms (per Microsoft):
| Platform | Support Level | Requirements |
|---|---|---|
| Windows 10+ | GA | Entra‑joined, Hybrid‑joined, or Entra‑registered devices |
| macOS 14+ | Preview | Must be MDM‑managed + Enterprise SSO plug‑in |
| iOS/iPadOS 16+ | Preview | Must be MDM‑managed + Enterprise SSO plug‑in |
| Android | ❌ Not Supported | - |
Application Requirements
Token Protection currently supports:
- Exchange Online
- SharePoint Online
- Microsoft Teams
- Supported Microsoft 365 native clients (Outlook, OneDrive, Teams)
Browser‑based sessions NOT supported (only native apps). Deploy in Report‑only mode first to prevent app/device disruption. MDM is required for macOS/iOS preview support.
Step‑by‑Step Configuration
Step 1: Validate Device Registration
Devices must be:
- Entra‑joined
- Hybrid‑joined
- Entra‑registered
This ensures PRT issuance.
Step 2: Create a Pilot Group
Create group: TokenProtection‑Pilot.
Step 3: Create Token Protection Conditional Access Policy
- Go to Entra Admin Center
→>IdentityEntra→IDProtection →> ConditionalAccess.Access - Click + New Policy.
- Name it Enable Token Protection (Pilot).
- Assign:
- Users:
TokenProtection‑Choose a Pilot Security Group
- Cloud Apps:
SelectOffice 365 Exchange Online, Office365,365orSharePointspecificOnline, Microsoft Teams Services
- Users:
The Conditional Access policy should only be configured for these applications. Selecting the Office 365 application group might result in unintended failures. This change is an exception to the general rule that the Office 365 application group should be selected in a Conditional Access policy. - According to Microsoft Learn.
Not configuring the Client Apps condition, or leaving Browser selected might cause applications that use MSAL.js, such as Teams Web to be blocked.
Step 4: Move to Full Enforcement
After reviewing logs:
- Set policy to ON
- Gradually expand target groups
Validation Steps
- Go to Sign‑in logs > Check “Token Protection” evaluation result.
- You should see accepted device‑bound PRTs.
- Confirm user can still access native apps (Outlook, Teams, OneDrive).
- Attempt to use token replay:
(Documented limitation for browsers. Token replay should fail only in native apps.)
======================== Troubleshooting =======================
| Issue | Cause | Solution |
|---|---|---|
| User blocked from Outlook/Teams | Device not registered / not supported | Verify Entra join/registration status |
| macOS/iOS failing | Not MDM‑managed | Enforce MDM requirement for preview support |
| Browser apps unaffected | Browsers not supported | Use native apps or combine with CA blocking controls |
| Token still reusable | App not in supported list | Only Teams/SharePoint/Exchange supported currently |