Skip to content
all writing

10.07.26

Conditional Access policy stacking without breaking break-glass accounts

A field-tested layering pattern for organizations rolling out phishing-resistant MFA.

Rolling out phishing-resistant MFA across an organization is a multi-month project. You can't flip a switch and require FIDO2 keys for everyone on day one. You need a layered approach.

The baseline

Start with a policy that requires MFA for all users, all apps, with an exclusion group for your break-glass accounts. This is your foundation.

The escalation path

Add a second policy that requires phishing-resistant methods (FIDO2, Windows Hello, certificate-based auth) for sensitive applications. Target your IT team first.

Protecting break-glass

Your break-glass accounts should be excluded from all conditional access policies except one: a policy that requires MFA but allows any method. This ensures they can still sign in during emergencies.

The rollout

Gradually move user groups from the baseline policy to the stricter policy as you distribute hardware keys and train users.