Strengthening Microsoft Entra: How Secfense secures what Entra doesn’t cover

How Secfense Secures What Entra Doesn’t Cover

Organizations building modern identity and access management (IAM) strategies often turn to Microsoft Entra as a central component. With strong integration into Microsoft 365, native support for conditional access, and increasingly mature passwordless capabilities, Entra provides a comprehensive approach to cloud-based identity management.

However, IAM in enterprise environments is rarely limited to the cloud. Many organizations operate hybrid environments, maintain legacy applications, and serve both internal and external users – each with specific identity and authentication requirements. These use cases sometimes fall outside the scope of what Entra directly supports.

In such scenarios, additional tools like Secfense can complement Microsoft Entra by addressing specialized needs related to authentication, compliance, and security for applications and systems not fully covered by Entra’s architecture.


IAM in practice: When Entra needs support

Microsoft Entra is designed to be the central control plane for identity in Microsoft-first environments. It supports:

  • Single Sign-On (SSO) and federation via SAML/OIDC
  • Conditional Access based on device, location, and risk
  • Passwordless authentication through Microsoft Authenticator and Windows Hello
  • Integration with Microsoft Defender and Microsoft Graph for reporting

That said, a number of common enterprise scenarios require capabilities that may sit adjacent to or outside of Entra’s focus:

1. Legacy and on-prem applications

Many organizations continue to use web applications that don’t natively support modern authentication protocols. Entra’s Application Proxy can provide access to these apps, but implementation may involve identity synchronization, gateway configuration, or code-level changes.

A reverse proxy such as Secfense can enforce phishing-resistant MFA (e.g., FIDO2 or passkeys) for legacy and on-prem apps without requiring changes to the applications themselves. This can be particularly valuable in hybrid environments with sensitive internal systems.


2. Customer Identity (CIAM) with modern authentication

Microsoft Entra External ID provides basic support for external user authentication. At present, however, FIDO2 and passkey support is not yet available in External ID, with roadmap availability expected in the future.

Secfense enables FIDO2-based passwordless login for B2B and B2C users today, using any FIDO-compliant authenticator, including device-bound passkeys. This can help organizations improve usability while meeting modern compliance standards like PSD2 or NIST 800-63B.


3. Environments requiring local identity ownership

Some organizations, particularly those in government, healthcare, or financial services, are required to maintain identity data on-premises or avoid cloud synchronization for regulatory reasons.

Secfense supports FIDO2 authentication directly from on-prem Active Directory, without syncing identity data to the cloud. This allows organizations to adopt modern authentication while preserving local identity governance.


4. Authenticator and passkey flexibility

Microsoft Authenticator and Windows Hello offer strong options for Entra-connected systems. However, passkeys stored in Microsoft Authenticator are currently limited to use within Microsoft ecosystems.

Secfense works with a wide range of authenticators (e.g., YubiKey, platform authenticators, biometric sensors), enabling cross-platform passkey support and fine-grained control over how passkeys are used, stored, or synchronized.


Layered authentication as a design principle

A common challenge in IAM is ensuring that authentication does not rely on a single layer or mechanism. Entra offers a strong set of protections, but in high-risk or regulated environments, additional security layers are often recommended.

Secfense adds such a layer by operating independently from identity providers. Even if a user is authenticated through Entra, Secfense can apply additional controls, such as:

  • Secondary FIDO2 prompts for sensitive applications
  • Microauthorizations (e.g., step-up authentication for specific actions)
  • Session-level policies beyond initial login

This separation of identity storage (IAM) from authentication enforcement (IdP/MFA) supports defense-in-depth strategies and aligns with Zero Trust principles.


Complementing, Not Replacing

It is important to emphasize that Secfense does not aim to replace Microsoft Entra or any other identity platform. Instead, it is designed to coexist with existing identity infrastructure and to extend authentication capabilities to places where built-in Entra features are either unavailable or unsuitable.

For example, in a typical architecture:

  • Microsoft Entra manages identity federation, SSO, and policy across Microsoft services.
  • Secfense adds phishing-resistant authentication to custom apps, legacy systems, or CIAM portals without code changes.

This modular, layered approach allows organizations to make targeted improvements without redesigning their identity stack or compromising existing investments.


Summary table: Secfense capabilities in Microsoft environments

Use CaseMicrosoft EntraSecfense
Legacy/on-prem appsApplication Proxy with integrationReverse proxy, no code, MFA enforcement
Passkeys for CIAMRoadmap (not yet available)Available today
Local identity ownershipRequires sync to Entra IDWorks with on-prem AD
Per-app MFA policiesCentral policy enforcementMFA per app/session with microauth
Authenticator choiceMicrosoft Authenticator, Windows HelloAny FIDO2 method
Defense in depthIAM and IdP tightly integratedIAM ≠ MFA enforcement layer

Final considerations

Organizations need flexibility to adapt to new standards (like passkeys), comply with new regulations, and protect systems that aren’t cloud-native or modernized.

Microsoft Entra provides a strong foundation for identity in Microsoft environments. Secfense can complement this foundation, helping extend phishing-resistant authentication to specialized or hard-to-reach parts of your infrastructure without replacing or duplicating what Entra already does well.


Next Steps

If your organization is:

  • Looking to enable passkeys or FIDO2 for legacy, CIAM, or regulated apps
  • Evaluating layered security models for identity and authentication
  • Exploring passwordless strategies beyond the Microsoft ecosystem

…we’d be happy to show you how Secfense works alongside your current Entra setup.

Request a demo or technical consultation: Contact Secfense

Testimonials

We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that the User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Poland

As part of the pre-implementation analysis, we verified that users utilize a wide range of client platforms: desktop computers, laptops, tablets, smartphones, and traditional mobile phones. Each of these devices differs in technological advancement, features, and level of security. Because of this, and also due to the recommendation of the Polish Financial Supervision Authority (UKNF), we decided to introduce additional protection in the form of multi-factor authentication mechanisms based on FIDO. As a result, users of our applications can log in safely, avoiding common cyber threats such as phishing, account takeover, and theft of their own and their clients’ data.

Marcin Bobruk

CEO

Sandis

We are excited to partner with Secfense to enhance our user access security for our web apps. By integrating their User Access Security Broker, we ensure seamless and secure protection for our applications and systems, delivering superior security and convenience to our customers.

Charm Abeywardana

IT & Infrastructure

Visium Networks

Before investing in Secfense, we had the opportunity to talk to its existing clients. Their reactions were unanimous: wow, it’s so easy to use. We were particularly impressed by the fact that implementing their solution does not require the involvement of IT developers. It gives Secfense a huge advantage over the competition, and at the same time opens the door to potential customers who so far were afraid of changes related to the implementation of multi-factor authentication solutions.

Mateusz Bodio

Managing Director

RKKVC

Even when the network and infrastructure are secured enough, social engineering and passwords can be used to gain control of the system by attackers. Multifactor authentication is the current trend. Secfense addresses this and allows you to build zero trust security and upgrade your current systems to passwordless applications within minutes, solving this problem right away,” said Eduard Kučera, Partner at Presto Ventures and cybersecurity expert – former Director in hugely successful Czech multinational cyber security firm Avast.

Eduard Kučera

Partner

Presto Ventures

One of the biggest challenges the world is facing today is securing our identity online. That’s why we were so keen to have Secfense in our portfolio. They make it possible to introduce strong authentication in an automated way. Until now, organizations had to selectively protect applications because the deployment of new technology was very hard, or even impossible. With Secfense, the implementation of multi-factor authentication is no longer a problem, and all organizations can use the highest standards of authentication security.

Stanislav Ivanov

Founding Partner

Tera Ventures