Microsoft Entra External Authentication Is Now Generally Available!
There’s a moment every identity engineer knows too well: you’re designing an access flow, everything looks clean on paper, and then someone says the words that derail the whole architecture—“We need to use our existing MFA provider.” Historically, that sentence meant pain. You either duct‑taped Custom Controls into Conditional Access, built brittle redirects, or told the business “no” and hoped they forgot. Finally, that tailspin is over.
Microsoft has rolled out a new capability in Entra that changes the external authentication story entirely. Instead of relying on proprietary hooks or deprecated features, Entra now supports standards‑based external authentication using OpenID Connect. In plain English: you can plug in a third‑party identity or MFA provider, and Entra treats it like its own.
Why This Matters More Than You Think
Identity teams have been asking for this for years, and not because they enjoy wiring up extra systems. The real world is messy. Organizations merge. Universities collaborate. Vendors bring their own identity stacks. Security teams standardize on MFA platforms that aren’t Microsoft. Until now, Entra’s answer was basically “use what we give you.”
External authentication changes that dynamic.
You can now:
- Redirect users to a third‑party IdP during sign‑in
- Enforce Conditional Access using an external MFA provider
- Build authentication strengths that include non‑Microsoft factors
- Integrate national, sector‑specific, or custom identity systems
- Replace Custom Controls with something that won’t disappear in six months
And because it’s all OIDC under the hood, you’re not locked into a vendor list. If the provider speaks the protocol correctly, Entra will accept it.
How It Works
At the heart of this feature is a simple concept: Entra expects a standards‑compliant OIDC provider. That means your external IdP must expose:
- A discovery document
- Authorization and token endpoints
- A JWKS endpoint with stable signing keys
- ID tokens with valid issuer, audience, and signature
Once you register that provider in Entra, you can bind it to Conditional Access. From there, the flow becomes seamless: user signs in -> Entra redirects to your IdP -> user authenticates -> Entra validates the token -> access granted.
No hacks. No custom XML. No hoping it doesn't break somehow.
Where This Fits in the Identity Landscape
This feature lands at a perfect moment. Organizations are moving toward:
- Zero Trust architectures
- Multi‑IdP ecosystems
- Stronger MFA requirements
- Decentralized identity models
- Sector‑specific authentication (education, healthcare, government)
Entra’s new external authentication capability gives identity teams the flexibility they’ve been missing. It also opens the door for scenarios that were previously painful or impossible—like integrating a custom OIDC provider you built or another provider that you must use for any number of reasons.
The Bottom Line
Microsoft finally delivered a clean, standards‑based way to integrate external identity and MFA providers into Entra. It’s flexible, future‑proof, and—most importantly—built on open protocols.
This is one of those features that unlocks a lot of possibilities. Whether you’re running a building apps, incorporating multiple IdP's from within your environment, or just trying to clean up your Conditional Access policies, external authentication is going to make your life easier.
Until next week folks!

Comments