Certificate-Based Auth, TAP & Password Protection
Understanding the Concept
Certificate-Based Authentication (CBA) allows users to authenticate using X.509 certificates stored on smart cards or devices. This provides phishing-resistant authentication without passwords and is commonly used in government and regulated industries. CBA can be configured as single-factor or multi-factor based on policy OID rules.
Temporary Access Pass (TAP) is a time-limited passcode that allows users to onboard passwordless authentication methods. When a user receives a new FIDO2 key or needs to set up Authenticator, TAP provides a secure bootstrap mechanism without requiring a traditional password.
Microsoft Entra Password Protection prevents users from choosing weak or banned passwords. It includes a global banned password list maintained by Microsoft and allows custom banned password lists. For hybrid environments, Password Protection agents can be deployed on domain controllers to enforce bans during on-premises password changes.
Key Points
- CBA: X.509 certificates on smart cards, phishing-resistant, configurable strength
- TAP: Time-limited passcode to bootstrap passwordless methods
- Global banned password list: Microsoft-maintained common weak passwords
- Custom banned password list: Organization-specific terms to block
- On-prem Password Protection: Agents on DCs enforce cloud ban lists
Advanced Authentication Methods
CBA Setup
Upload CA certificates, configure user bindings and auth strength
TAP Issuance
Admin creates time-limited pass for user onboarding
Password Protection
Cloud + custom ban lists evaluate password changes
On-Prem Agent
DC agents enforce cloud ban lists during on-prem resets
Why This Matters in Real Organizations
These features address critical gaps: CBA meets compliance requirements for smart card authentication, TAP solves the chicken-and-egg problem of deploying passwordless methods, and Password Protection prevents the most common attack vector - weak passwords.
Common Mistakes to Avoid
Interview Tips
- Explain when CBA is preferred over FIDO2 or WHfB
- Describe the TAP use case for passwordless bootstrapping
- Discuss how Password Protection works in hybrid environments
Exam Tips (SC-300)
- Know CBA configuration requirements and PKI integration
- Understand TAP settings: lifetime, one-time vs reusable
- Know Password Protection architecture for cloud and on-prem
Course Complete!
You've finished all lessons