Entra ID - smart lockout - protect your users from malicious account lockouts!

By Lukasz Kozubal

I recently had several conversations related to smart lockout feature in Entra ID. Based on those, it occurred to me that inner workings of this feature are not as widely known as I assumed.

TL;DR

Smart lockout is a capability of Entra ID that makes a given user account appear locked out for certain entities, while allowing legitimate users to successfully authenticate.
By slowing down an attacker, it raises the cost of successful brute force attack on primary authentication factor (it’s unfortunately still a password in majority of the cases).

How does Entra ID realize this?

The secret lies in clever management of account metadata responsible for lockout:

  • each Entra ID user account has two separate lockout counters;
  • each lockout counter is assigned to a specific location - either “unknown” or “familiar” one;
  • “familiar” location keeps track of IP address ranges from which user has successfully authenticated in the past*, everything else is “unfamiliar”.

* - the period of observation is not disclosed but it is fair to assume 30-90 days

%%{
  init: {
    'theme': 'base',
    'themeVariables': {
      'primaryColor': '#BB2528',
      'primaryTextColor': '#fff',
      'primaryBorderColor': '#7C0000',
      'lineColor': '#F8B229',
      'secondaryColor': '#006100',
      'tertiaryColor': '#fff'
    }
  }
}%%
flowchart TD
    Start@{ shape: circle, label: "Authentication attempt" }
    Is_IPFamiliar@{ shape: diamond, label: "Is source IP in familiar location?" }
    Fam_Is_AccountLocked@{ shape: diamond, label: "Is account locked for authentication attempts from familiar locations?" }
    Fam_CredsOK@{ shape: diamond, label: "Are credentials valid?" }
    Fam_AllowAuth@{ shape: rounded, label: "Accept authentication" }
    Fam_Deny@{ shape: rounded, label: "Deny authentication" }
    Fam_DenyTimer@{ shape: rounded, label: "Deny authentication" }
    Fam_IncrementCounter@{ shape: rounded, label: "Increment bad authentication attempt counter for familiar locations" }
    Fam_IncrementTimer@{ shape: rounded, label: "Increment account lockout time" }
    Unfam_Is_AccountLocked@{ shape: diamond, label: "Is account locked for authentication attempts from unknown locations?" }
    Unfam_Deny@{ shape: rounded, label: "Deny authentication" }
    Unfam_DenyTimer@{ shape: rounded, label: "Deny authentication" }
    Unfam_DenySuspicious@{ shape: rounded, label: "Deny authentication" }
    Unfam_AADSTSCode@{ shape: rounded, label: "Return AADSTS50053 error code" }
    Unfam_CredsOK@{ shape: diamond, label: "Are credentials valid?" }
    Unfam_AllowAuth@{ shape: rounded, label: "Accept authentication" }
    Unfam_AddIP@{ shape: rounded, label: "Add source IP to familiar locations" }
    Unfam_IncrementCounter@{ shape: rounded, label: "Increment bad authentication attempt counter for unknown locations" }
    Unfam_IncrementTimer@{ shape: rounded, label: "Increment account lockout time" }
    Unfam_Is_Suspicious@{ shape: diamond, label: "Is activity suspicious - matches known attack patterns?" }
Start --> Is_IPFamiliar
Is_IPFamiliar-->|Yes|Fam_Is_AccountLocked
Is_IPFamiliar-->|No|Unfam_Is_AccountLocked
Fam_Is_AccountLocked-->|Yes|Fam_DenyTimer
Fam_Is_AccountLocked-->|No|Fam_CredsOK
Fam_CredsOK-->|No|Fam_Deny
Fam_CredsOK-->|Yes|Fam_AllowAuth
Fam_DenyTimer-->Fam_IncrementTimer
Fam_Deny-->Fam_IncrementCounter
Unfam_Is_AccountLocked-->|Yes|Unfam_DenyTimer
Unfam_Is_AccountLocked-->|No|Unfam_Is_Suspicious
Unfam_Is_Suspicious-->|Yes|Unfam_DenySuspicious
Unfam_Is_Suspicious-->|No|Unfam_CredsOK
Unfam_CredsOK-->|No|Unfam_Deny
Unfam_CredsOK-->|Yes|Unfam_AllowAuth
Unfam_AllowAuth-->Unfam_AddIP
Unfam_DenyTimer-->Unfam_IncrementTimer
Unfam_Deny-->Unfam_IncrementCounter
Unfam_DenySuspicious-->Unfam_AADSTSCode

Smart lockout is enabled for every Entra ID customer but it’s not configurable for free tenants. For tenants licensed with Premium P1 or P2, some configuration capabilities become available:

Lockout threshold - Maximum number of bad authentication attempts over which the account is locked out. If the first sign-in after a lockout also fails, the account locks out again.

Lockout duration - Minimum lockout duration in seconds (during initial lockout). Subsequent lockouts are increasingly longer.

image

You might say, “That’s cool, but what actually happens if I am hybrid and use password hash synchronization (PHS), will my users’ on-premises accounts also be locked out?”.

Great question! Let’s consider two scenarios:

Scenario 1:

  • Attacker tries to brute force user password from location that is unknown for the user, lockout counter exceeds the limit.

Result:

  • Attacker is locked out. User authenticating from familiar location can authenticate successfully to all services relying on Entra ID, as well as to on-premises workloads.

Scenario 2:

  • Attacker attempts to brute force user password from location that is familiar for the user and lockout counter exceeds the limit.

Result:

  • Both attacker and legitimate user are locked out. During the lockout, user cannot successfully authenticate to all services relying on Entra ID (e.g., Microsoft 365, Azure Resource Manager, 3rd party integrated SaaS apps). Because affected user’s lockout status is not replicated to on-premises Active Directory, they can still successfully authenticate to all on-prem workloads relying on Active Directory.

What about passwordless users? Are their account susceptible to brute force attempts and malicious lockouts?
Unfortunately yes, as currently you can’t create an user object without specyfing its password, below creation attempt via New-MgBetaUser proves that.

image

If you are using pass-through-authentication or ADFS (you really need that PHS project going!), above scenarios become a bit more complex as they involve real-time password verification against on-premises Active Directory. To avoid unnecessary account lockouts, you should set lockout threshold in Entra ID to be lower than one configured for on-premises Active Directory environment.

Microsoft Entra ID also protects against attacks by analyzing additional signals during each authentication attempt. Assessed data includes source IP reputation and associated malicious activity. If a given sign-in is originating from a suspicious IP, regardless if provided credentials are correct, Entra returns AADSTS50053

Useful resources:


All work is licensed under a Creative Commons Attribution 4.0 International License.

CC BY 4.0

Share: X (Twitter) LinkedIn