Microsoft has introduced plans to enhance the safety of Entra ID authentication by blocking unauthorized script injection assaults beginning a 12 months from now.
The replace to its Content material Safety Coverage (CSP) goals to reinforce the Entra ID sign-in expertise at “login.microsoftonline[.]com” by solely letting scripts from trusted Microsoft domains run.
“This replace strengthens safety and provides an additional layer of safety by permitting solely scripts from trusted Microsoft domains to run throughout authentication, blocking unauthorized or injected code from executing in the course of the sign-in expertise,” the Home windows maker mentioned.
Particularly, it solely permits script downloads from Microsoft trusted CDN domains and inline script execution from a Microsoft trusted supply. The up to date coverage is proscribed to browser-based sign-in experiences for URLs starting with login.microsoftonline.com. Microsoft Entra Exterior ID won’t be affected.
The change, which has been described as a proactive measure, is a part of Microsoft’s Safe Future Initiative (SFI) and is designed to safeguard customers towards cross-site scripting (XSS) assaults that make it attainable to inject malicious code into web sites. It is anticipated to be rolled out globally beginning mid-to-late October 2026.
Microsoft is urging organizations to check their sign-in flows totally forward of time to make sure that there are not any points and the sign-in expertise has no friction.
It is also advising prospects to chorus from utilizing browser extensions or instruments that inject code or script into the Microsoft Entra sign-in expertise. Those that observe this strategy are really useful to modify to different instruments that do not inject code.
To determine any CSP violations, customers can undergo a sign-in circulation with the dev console open and entry the browser’s Console device inside the developer instruments to test for errors that say “Refused to load the script” for going towards the “script-src” and “nonce” directives.
Microsoft’s SFI is a multi-year effort that seeks to place safety above all else when designing new merchandise and higher put together for the rising sophistication of cyber threats.
It was first launched in November 2023 and expanded in Could 2024 following a report from the U.S. Cyber Security Overview Board (CSRB), which concluded that the corporate’s “safety tradition was insufficient and requires an overhaul.”
In its third progress report revealed this month, the tech large mentioned it has deployed over 50 new detections in its infrastructure to focus on high-priority ways, strategies, and procedures, and that the adoption of phishing-resistant multi-factor authentication (MFA) for customers and units has hit 99.6%.
Different notable adjustments enacted by Microsoft are as follows –
- Enforced Obligatory MFA throughout all providers, together with for all Azure service customers
- Launched Computerized restoration capabilities through Fast Machine Restoration, expanded passkey and Home windows Hey help, and improved reminiscence security in UEFI firmware and drivers through the use of Rust
- Migrated 95% of Microsoft Entra ID signing VMs to Azure Confidential Compute and moved 94.3% of Microsoft Entra ID safety token validation to its customary id Software program Growth Package (SDK)
- Discontinued the usage of Energetic Listing Federation Companies (ADFS) in our productiveness surroundings
- Decommissioned 560,000 further unused and aged tenants and 83,000 unused Microsoft Entra ID apps throughout Microsoft manufacturing and productiveness environments
- Superior menace looking by centrally monitoring 98% of manufacturing infrastructure
- Achieved full community system stock and mature asset lifecycle administration
- Nearly completely locked code signing to manufacturing identities
- Printed 1,096 CVEs, together with 53 no-action cloud CVEs, and paid out $17 million in bounties
“To align with Zero Belief ideas, organizations ought to automate vulnerability detection, response, and remediation utilizing built-in safety instruments and menace intelligence,” Microsoft mentioned. “Sustaining real-time visibility into safety incidents throughout hybrid and cloud environments permits quicker containment and restoration.”












