🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-300 Domain 2
Domain 2 — Module 1 of 7 14%
9 of 27 overall

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free
Domain 2: Implement Authentication and Access Management Premium ⏱ ~14 min read

Authentication Methods: Plan & Implement

Plan and implement authentication methods in Entra ID — from certificate-based auth to Temporary Access Pass, OAuth tokens, and Microsoft Authenticator.

Planning your authentication strategy

☕ Simple explanation

Authentication methods are the ways you prove you are who you say you are — like showing ID at a hotel check-in.

A hotel might accept your passport, driver’s licence, or a temporary guest code the concierge gave you over the phone. Each method has trade-offs: a passport is very secure but slow to replace; a temporary code is fast but expires quickly.

Entra ID works the same way. You choose which “IDs” your organisation accepts — passwords, certificates, authenticator app, temporary passes — and who gets to use each one.

Authentication methods in Entra ID define how users verify their identity during sign-in and multi-factor authentication. Planning involves deciding which methods to enable, for which users, and how to migrate from weaker methods (SMS, voice) to stronger ones (Authenticator push, FIDO2, certificates).

The Authentication methods policy (Entra admin center → Protection → Authentication methods) is the central control plane. Each method can be enabled for all users or specific groups, and you can configure method-specific settings like number matching or certificate trust levels.

Microsoft recommends a phased approach: enable modern methods first, run both old and new in parallel, then disable legacy methods once adoption is high.

The authentication methods landscape

MethodStrengthUse Case
PasswordWeakest (standalone)Legacy default — always pair with MFA
SMS / Voice callLowBackup only — vulnerable to SIM swap
Microsoft AuthenticatorStrongPush notifications with number matching
FIDO2 security keysVery strongPasswordless, phishing-resistant
Certificate-based auth (CBA)Very strongGovernment, regulated industries
Temporary Access Pass (TAP)Time-limitedOnboarding, device setup, recovery
Windows Hello for BusinessVery strongPasswordless on Windows devices
OAuth 2.0 tokensVariesApp-to-app, API access

Authentication methods policy

The Authentication methods policy in Entra replaces the legacy per-user MFA settings. Key concepts:

  • Enable per method — turn individual methods on/off for all users or specific groups
  • Registration campaigns — nudge users to set up Authenticator (we’ll cover this in the MFA module)
  • Migration guide — Entra provides a migration status showing whether you’ve fully moved from legacy MFA settings to the new policy
💡 Exam tip: legacy MFA vs authentication methods policy

The exam tests whether you know the difference between two places where MFA methods are configured:

  • Legacy: per-user MFA settings (the old portal at aka.ms/mfasetup) — methods enabled globally for all users
  • Modern: Authentication methods policy (Entra admin center → Protection → Authentication methods) — granular, group-targeted, supports passwordless

Microsoft is migrating everyone to the modern policy. The legacy settings will be deprecated. If an exam question asks about enabling a method “for a specific group of users,” the answer is the Authentication methods policy.

Certificate-based authentication (CBA)

Certificate-based authentication lets users sign in using an X.509 certificate on a smart card or device — no password needed.

How it works:

  1. Admin uploads trusted CA certificates to Entra ID
  2. Configure CBA authentication rules (which certificate fields map to which user attributes)
  3. User presents their certificate (smart card, device certificate, or virtual smart card)
  4. Entra validates the certificate chain, checks revocation (CRL/OCSP), and maps the certificate to a user account

Key configuration decisions:

SettingOptionsNotes
Username bindingPrincipalName, RFC822Name, Subject, SHA1PublicKeyMaps certificate field → Entra user attribute
Authentication strengthSingle-factor or multi-factorMulti-factor CBA counts as phishing-resistant MFA
Revocation checkingCRL, OCSPOCSP is checked first if configured
Affinity bindingRequired or lowWhether certificate must match at the issuer or exact certificate level
ℹ️ Scenario: Anika plans CBA for a government client

Anika’s government client issues PIV (Personal Identity Verification) smart cards to all employees. Federal policy requires phishing-resistant MFA for all cloud access.

Her plan:

  1. Upload the government CA chain (root + intermediate CAs) to Entra ID
  2. Configure username binding: PrincipalName → userPrincipalName in Entra
  3. Set authentication strength to multi-factor (smart card + PIN counts as two factors)
  4. Enable CRL distribution point checking for revocation
  5. Create a Conditional Access policy requiring “phishing-resistant MFA” — CBA satisfies this

Result: Users insert smart card, enter PIN, and they’re in. No passwords, no phone-based MFA. Meets federal compliance requirements.

Temporary Access Pass (TAP)

A Temporary Access Pass is a time-limited passcode issued by an admin. It’s designed for scenarios where users can’t use their normal authentication methods.

Common scenarios:

  • Onboarding — new employee needs to sign in before they’ve set up Authenticator or FIDO2
  • Lost device — user lost their phone with Authenticator, needs to sign in to register a new device
  • FIDO2 recovery — user’s security key broke, needs temporary access while a replacement arrives
  • Windows Hello for Business setup — some WHfB deployment models require TAP for initial provisioning

TAP settings:

SettingDefaultRange
Minimum lifetime1 hour10 minutes – 30 days
Maximum lifetime24 hours10 minutes – 30 days
Default lifetime1 hourWithin min/max range
One-time useNoYes / No
ℹ️ Scenario: Jake onboards a new designer at Coastline

New designer Sofia starts Monday. Jake needs her to sign in, set up MFA, and register her MacBook — but she can’t set up Authenticator until she signs in for the first time.

Jake’s approach:

  1. Creates a TAP for Sofia in the Entra admin center (Users → Sofia → Authentication methods → Add)
  2. Sets lifetime to 2 hours, one-time use enabled
  3. Sends Sofia the TAP via a secure channel (encrypted email or in-person)
  4. Sofia signs in with her UPN + TAP code
  5. During sign-in, she’s prompted to register Authenticator (TAP satisfies MFA for registration)
  6. The TAP expires after use — from now on, Sofia uses Authenticator

Key insight: TAP can satisfy the MFA requirement for registering other methods. This solves the “chicken-and-egg” problem of needing MFA to register MFA.

OAuth 2.0 tokens

OAuth 2.0 is the protocol behind how apps get authorised access to resources without seeing the user’s password. You won’t configure OAuth from scratch — Entra handles it — but you need to understand token types:

TokenPurposeLifetime
Access tokenPresented to a resource (API) to prove authorisationDefault 60–90 min (configurable)
Refresh tokenExchanged for a new access token when the current one expiresDefault 90 days (rolling)
ID tokenContains claims about the user’s identity (used by the app)Matches access token lifetime
Primary Refresh Token (PRT)Device-level token for SSO across all apps on a joined deviceTied to device registration

Token lifetime policies are largely deprecated. You cannot customise refresh token or session token lifetimes via token lifetime policies (deprecated January 2021). Access token lifetimes can still be adjusted (10 min to 1 day), but the exam-expected approach is Conditional Access session controls.

💡 Exam tip: use CA session controls, not token lifetime policies

Token lifetime policies for refresh and session tokens are deprecated. For controlling session behaviour, use Conditional Access session controls instead:

  • Sign-in frequency — how often users must re-authenticate (e.g., every 8 hours)
  • Persistent browser session — whether the session survives browser close

Access and ID token lifetimes can still be configured (10 min to 1 day, default ~1 hour), but these are edge cases. The exam answer is almost always CA session controls.

Microsoft Authenticator

The Authenticator app is the centrepiece of Microsoft’s modern MFA strategy.

Modes:

  • Push notification — user approves/denies on their phone (with number matching)
  • Passwordless phone sign-in — no password entered; user matches number and uses biometric/PIN
  • TOTP codes — 6-digit time-based codes (works offline)

Number matching (enabled by default): When a user gets a push notification, the sign-in screen shows a two-digit number. The user must type that number in the Authenticator app. This prevents MFA fatigue attacks (where attackers spam push notifications hoping the user taps “Approve”).

Additional context (enabled by default): The push notification shows the app name and approximate location (city) of the sign-in attempt. Helps users identify suspicious requests.

ℹ️ Scenario: Jake sets up Authenticator for Coastline Creative

Coastline Creative has been using SMS for MFA. Jake wants to upgrade everyone to Authenticator.

His plan:

  1. Enable Microsoft Authenticator in the Authentication methods policy
  2. Configure: push notifications ON, number matching ON, additional context ON
  3. Use a registration campaign (nudge) to prompt users to set up Authenticator at next sign-in
  4. Give the team 30 days to switch — most will do it after the first nudge
  5. After 30 days, disable SMS as an MFA method

Why the switch matters: SMS is vulnerable to SIM swapping. One of Coastline’s freelancers had their number hijacked last year. Authenticator with number matching is phishing-resistant and doesn’t rely on carrier security.

🎬 Video walkthrough

🎬 Video coming soon

Authentication Methods — SC-300 Module 9

Authentication Methods — SC-300 Module 9

~14 min

Flashcards

Question

What is a Temporary Access Pass (TAP) and when would you issue one?

Click or press Enter to reveal answer

Answer

A time-limited passcode issued by an admin for scenarios like onboarding (user hasn't set up MFA yet), lost devices, or FIDO2 key replacement. TAP can satisfy MFA requirements, solving the chicken-and-egg problem of needing MFA to register MFA. It can be one-time or multi-use, with a configurable lifetime.

Click to flip back

Question

What is the difference between single-factor and multi-factor certificate-based authentication?

Click or press Enter to reveal answer

Answer

Single-factor CBA: the certificate alone counts as one factor — user still needs another factor for MFA. Multi-factor CBA: the certificate + PIN together count as two factors (possession + knowledge), satisfying MFA requirements. Multi-factor CBA is considered phishing-resistant.

Click to flip back

Question

What is number matching in Microsoft Authenticator?

Click or press Enter to reveal answer

Answer

When a push notification is triggered, the sign-in screen shows a two-digit number. The user must type this number into the Authenticator app to approve. This prevents MFA fatigue attacks where attackers spam approval requests. Number matching is enabled by default.

Click to flip back

Question

Why can you no longer use token lifetime policies to control refresh token lifetimes?

Click or press Enter to reveal answer

Answer

Microsoft deprecated refresh token and session token lifetime configuration via token lifetime policies in January 2021. To control session duration, use Conditional Access session controls: sign-in frequency (how often users re-authenticate) and persistent browser session (whether sessions survive browser close).

Click to flip back

Knowledge Check

Knowledge Check

A new employee needs to sign in and register for MFA, but they can't set up MFA without first signing in. How should the admin resolve this?

Knowledge Check

A government agency requires phishing-resistant MFA for all cloud access. Employees have PIV smart cards. Which authentication method should the identity admin configure?

Knowledge Check

Jake wants to move Coastline Creative from SMS-based MFA to Microsoft Authenticator. He needs most users to switch within 30 days without forcing an immediate cutover. What should he configure?


Next up: Passwordless & Windows Hello for Business — eliminate passwords entirely with FIDO2 passkeys, Windows Hello, and Entra Kerberos for hybrid environments.

← Previous

Hybrid Authentication: PHS, PTA & Seamless SSO

Next →

Passwordless & Windows Hello for Business

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.