top of page

Break glass accounts - best practices

  • Writer: Vlad Johansen
    Vlad Johansen
  • Oct 10, 2024
  • 3 min read

Updated: Jul 30

Good evening everyone!


Here is a new blog post about Break Glass Accounts / Emergency accounts in Entra ID.


What is emergency accounts and why do we need them?


Break glass account is an account that is only accessible in an emergency situation, like a cyber-attack. It's a global admin account that can help to restore access to your employees and your clients once any threats have been removed.


Let's take a look on how to create an Break glass account


First of all Sign in to Entra and go to Groups -> All groups --> New group


Choose type: Security


Call it for example BG accounts, give the group a description (optional) and choose membership: Assigned


ree

Press Create


Now go to Admin center and press Users -> Active Users --> Add a User


Create a user account, give it a name, for example BG1 and generate a strong password. I'm using Bitwarden for this purpose. Remember! Always use .onmicrosoft.com domains on this accounts to avoid problems with sign-ins.


ree

Don't assign any licenses to this user and press Next


ree

Give this user account Global administrator role and press Next



ree

Now, review and press Finish adding


ree

Add this user to BG account group from Teams and groups --> Active teams and groups


ree

Go back to Entra ID and go to Protection --> Authentification Methods --> Press on Temporary Access Pass and enable this method


This will help us to register a security key on this account, because phishing resistant MFA can only be registered with at least one other active MFA method. Since this is a Break glass account we can't and don't want to register MFA methods like Microsoft authenticator or SMS.


ree

Now go to Users , search for your user account --> Choose Authentification methods on user page and Add Authentification method, choose Temporary Access Pass


ree

Choose activation duration- 1 hour and press Add


Now, copy paste your TAP and go to https://aka.ms/mysecurityinfo


Login in to your account with generated TAP

ree

Now, press add sign in method and choose Security key

ree

Choose USB device


ree

Follow the instructions to register your security key

ree

Choose Security key

ree

Set up your PIN


ree

And


ree

Great !

ree

After you press OK now, you will be redirected to Security info page again


Give your security key a name and press Next and Finish


ree

Now repeat all this steps again and create account number 2, and add another security key on each account, this is highly recommended, in case if number one get's stolen or lost.


If your environment doesn't have a Conditional Access policy which enforces a phishing resistant MFA on admin roles such as Global administrators, than create one and don't exclude this group from this policy, but remember to exclude this group from other policies. You can of course also add this group to a trusted location policy as well if you want so, for example only allow sign ins from your countries IP's or trusted IP's for more stronger security.


Don't forget to store your PIN codes and security keys in a safe place ! They should be stored separately.


And of course, this accounts should also be monitored it depends on your licenses. If you have active subscription you can use Log Analytic Workspace / Azure Monitor to trigger sms or email alerts. Ifyou have M365 license or Defender for Cloud App license you can set up Defender for Cloud Apps policy to trigger email alerts. Check out my blog posts on how to setup monitoring for break glass accounts.


And always test this accounts every 30-60 days and NEVER use them to do daily admin tasks!






Comments


Latest Blog Posts

© 2024-2025 need4.cloud

bottom of page