Entra ID

Microsoft Entra GA Adds WAF, Bot Defense Integrations

3 min read

Summary

Microsoft Entra has generally released new partner integrations that let organizations add edge-level WAF and bot protection to authentication endpoints, plus fraud prevention in External ID sign-up flows, directly from the Entra portal. The update matters because it helps security teams block DDoS attacks, malicious bots, and fraudulent account creation earlier in the user journey while reducing deployment friction through built-in purchasing and integration options.

Need help with Entra ID?Talk to an Expert

Introduction: why this matters

Identity attacks increasingly target the entire user journey—sign-up, sign-in, and recovery—not just authentication itself. Microsoft Entra’s new GA partner integrations are notable because they combine stronger controls with faster adoption: admins can discover, purchase, and deploy select partner solutions directly in the Entra portal (and via the Microsoft Security Store) without the traditional friction of custom integrations, long implementation cycles, or bespoke contracts.

What’s new (GA): integrated partner solutions for identity security

Microsoft Entra now offers in-product integrations that add layered protections across key identity touchpoints:

1) Edge-level WAF protection for authentication endpoints

  • Partners: Cloudflare and Akamai
  • Scenario: Protect external-facing authentication endpoints from DDoS, OWASP Top 10 risks, and malicious bots.
  • Architecture (layered): Traffic flows through Cloudflare/Akamai WAF → Azure Front Door → Microsoft Entra External ID tenant.
  • Value: Blocks threats earlier (at the edge), reducing load and risk before requests reach identity infrastructure.

2) Fraud prevention during sign-up (CIAM)

  • Partners: Arkose Labs and HUMAN Security
  • Scenario: Add risk-based screening and adaptive challenges into Microsoft Entra External ID sign-up flows.
  • Value: Increases resistance to automated account creation and fraud while aiming to minimize friction for legitimate users.

3) Stronger account recovery and secure access using government ID verification

  • Partners: Au10tix, IDEMIA, and TrueCredential (LexisNexis)
  • Scenario: Replace weaker recovery methods (for example, security questions) with government ID document verification and privacy-protecting face biometrics for Entra ID account recovery.
  • Extension: The same verification flow can be used for Access Packages, enabling higher-assurance requests to sensitive resources.
  • Follow-on benefit: Users can register passkeys after verification to reduce future lockouts.

Impact for IT administrators and end users

For admins:

  • Faster onboarding and configuration for partner protections directly within the Entra experience.
  • More consistent defense-in-depth across CIAM and workforce identity scenarios, with clearer placement of controls (edge WAF, sign-up protection, recovery assurance).
  • Centralized acquisition and deployment via the Microsoft Security Store, reducing procurement and integration overhead.

For end users:

  • Better protection from account takeover and fraudulent sign-ups, with fewer disruptive incidents.
  • Higher-assurance recovery options that can be more secure than legacy recovery methods.

Action items / next steps

  1. Review your identity perimeter: Identify which apps/tenants use Microsoft Entra External ID and which endpoints are exposed.
  2. Pilot edge protection: Evaluate Cloudflare/Akamai WAF in front of External ID entry points (especially for high-volume public apps).
  3. Harden sign-up flows: For CIAM scenarios, test Arkose Labs or HUMAN integrations to reduce bot-driven registrations.
  4. Modernize recovery: Assess whether government ID verification is appropriate for your regulatory, privacy, and user populations; plan comms and support.
  5. Operationalize: Update incident runbooks and monitoring to include edge/WAF and fraud signals alongside Entra sign-in logs.

Reference docs (from Microsoft): Cloudflare/Akamai WAF setup, Arkose/HUMAN fraud protection integrations, and Entra ID account recovery guidance.

Need help with Entra ID?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Microsoft EntraExternal IDidentity securityWAFaccount recovery

Related Posts

Entra ID

Microsoft Entra Backup and Recovery Enters Preview

Microsoft has launched Microsoft Entra Backup and Recovery in public preview, giving organizations a Microsoft-managed way to restore critical identity objects and configurations to a known-good state. The service helps IT teams recover faster from accidental admin changes, provisioning errors, and malicious modifications that could otherwise disrupt access and security.

Entra ID

Microsoft Entra External MFA Now Generally Available

Microsoft has announced general availability of external MFA in Microsoft Entra ID, allowing organizations to integrate trusted third-party MFA providers using OpenID Connect. The feature lets IT teams keep Microsoft Entra ID as the central identity control plane while maintaining Conditional Access, risk evaluation, and unified authentication method management.

Entra ID

Microsoft Entra RSAC 2026 Identity Security Updates

At RSAC 2026, Microsoft announced major Microsoft Entra updates aimed at securing not only users and devices but also AI agents, workloads, and modern multi-tenant environments. The new capabilities—such as expanded Entra Agent ID governance, shadow AI detection, prompt injection protection, passkey enhancements, and adaptive risk-based access—matter because they strengthen Zero Trust identity security as organizations adopt AI and face more dynamic access risks.

Entra ID

Microsoft Entra Secure Access Report 2026 on AI Risk

Microsoft’s Entra Secure Access Report 2026 says AI adoption is significantly increasing identity and network access risk, with 97% of organizations reporting an access-related incident in the past year and 70% tying incidents to AI activity. The report argues that fragmented identity and network tools are making the problem worse, which matters because more organizations are now moving toward consolidated access platforms to better secure AI tools, agents, and machine identities.

Entra ID

Microsoft Entra Conditional Access All Resources Update

Microsoft is updating Entra Conditional Access so policies targeting "All resources" will be enforced consistently even when resource exclusions exist, closing a gap where some sign-ins requesting only OIDC or limited directory scopes could bypass policy checks. Beginning March 27, 2026 and rolling out through June 2026, affected tenants may see more users prompted for MFA, device compliance, or other controls—making this important for organizations to review impacted Conditional Access policies and prepare for changes in sign-in behavior.

Entra ID

Microsoft Entra Access Priorities Webinar Series

Microsoft is launching the four-part Microsoft Entra Access Priorities webinar series to help IT teams turn its identity-first security strategy into practical deployment steps, with guidance on phishing-resistant authentication, adaptive access, least privilege, and securing AI-related access. The series matters because it gives organizations concrete tools, demos, and checklists to strengthen Zero Trust and prepare for an emerging Access Fabric model that spans users, apps, devices, and AI agents.