🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Configure Azure AD and Okta to Enforce Replay-Resistant Network Authentication β€” NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IA.L2-3.5.4 Implementation Tips

Step-by-step guidance to configure Azure AD and Okta for replay-resistant network authentication to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 IA.L2-3.5.4 compliance.

β€’
March 31, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control IA.L2-3.5.4 requires replay-resistant authentication mechanisms for network access β€” in practice this means replacing one-time passwords or poorly protected token flows that can be captured and replayed with cryptographic challenge-response or mutual-authentication schemes. For small businesses using Azure AD or Okta as identity providers, you can meet this control by enforcing modern, cryptographically strong authentication methods (FIDO2/WebAuthn, client certificates, EAP-TLS) and by hardening access policies and session controls so captured credentials or tokens cannot be replayed to gain access.

Why replay resistance matters and the compliance objective

The objective of IA.L2-3.5.4 is to ensure that an attacker who captures authentication traffic or one-time codes cannot reuse that data to impersonate a user. Replay attacks are practical against poorly designed OTP (SMS/unsynchronized tokens) and basic bearer-token flows. Failure to implement replay-resistant authentication exposes CUI and business systems to credential replay, lateral movement, ransomware, and loss of contractual compliance. For Compliance Framework implementation, you must show that network authentication uses challenge/response or mutual TLS mechanisms, that legacy/basic authentication is blocked, and that policies make token replay ineffective (short session lifetimes, continuous access evaluation, device attestation).

Azure AD: actionable configuration steps

In Azure AD, prioritize built-in passwordless and certificate methods and harden Conditional Access. Practical steps: first, enable FIDO2/WebAuthn and Windows Hello for Business in the Azure portal (Azure Active Directory β†’ Security β†’ Authentication methods β†’ FIDO2 Security Key; enable and scope to groups for phased rollout). Second, enable Certificate-based Authentication (CBA) if you issue client certs (Azure AD supports CBA with uploaded CA chains and user mapping rules; configure under Azure AD β†’ Security β†’ Authentication methods β†’ Certificate-based authentication). Third, create Conditional Access policies that require authentication strength β€” for high-value apps require 'passwordless' or 'multi-factor' using a FIDO/WebAuthn authenticator and set 'Grant' controls to require compliant devices. Fourth, block legacy authentication (basic auth) at the tenant level (Azure AD β†’ Sign-in risk & legacy auth controls) to prevent replay of simple credentials. Fifth, configure session controls: set sign-in frequency to enforce reauthentication (for example 1 hour for risky scopes), enable Continuous Access Evaluation (CAE) where supported so revoked credentials invalidate tokens quickly, and set persistent browser session to 'Never persist'. Finally, integrate your VPN/Wi‑Fi with certificate-based authentication (EAP-TLS) β€” use your PKI to issue client certs, and have VPN/RADIUS servers validate certs rather than relying solely on password-based RADIUS.

Okta: practical steps to enforce replay resistance

Okta provides WebAuthn (FIDO2) and certificate-based options you can enforce via authenticators and Sign-On policies. In the Admin Console enable WebAuthn and configure it as a required authenticator for critical apps (Security β†’ Authenticators β†’ WebAuthn; set enrollment and policy). Use Okta Verify (push) and WebAuthn rather than SMS or TOTP for MFA β€” Okta Verify push uses a signed challenge tied to a session and device to resist replay. Create Sign-On policies (Security β†’ Authentication β†’ Sign-On Policies) that require these authenticators for all network-accessing apps and VPN integrations. For VPN/Wi-Fi, deploy Okta’s RADIUS agent or a RADIUS proxy that validates client certificates (EAP-TLS) against your CA; configure your VPN to use RADIUS + EAP-TLS instead of PAP/CHAP. Also disable legacy authentication endpoints and make API tokens short-lived; enforce device trust with Okta Device Trust for managed devices and require device attestations or MDM enrollment for elevated access. Finally, set session lifetime policies short for sensitive applications and enable token revocation on logout or credential change.

Network-layer specifics (VPN, Wi‑Fi, RADIUS, EAP-TLS)

Replay-resistance at the network layer is best achieved via mutual TLS (EAP-TLS) or other certificate-based EAP methods, not OTP over RADIUS alone. Small business example: replace VPN username/password + RADIUS OTP with EAP-TLS β€” issue device or user client certificates from your internal CA (or use an enterprise CA service), configure the VPN to accept only certificate authentication, and configure RADIUS to validate certificate revocation lists (CRLs) or OCSP. If using Azure AD integration, avoid relying solely on NPS + SMS OTP β€” instead use certificate-based (EAP-TLS) authentication or a modern SAML/OIDC flow backed by FIDO2. Test replay resistance by attempting a captured handshake replay; a properly configured EAP-TLS handshake with unique nonces and cert-based mutual auth will fail on replay. Maintain certificate lifecycle: automation for issuance/renewal, documented revocation procedures, and monitoring for expired certs that could create outages.

Monitoring, testing, and evidence for auditors

Show auditors that your tenant rejects replay attempts and that logs reflect cryptographic methods. Enable and retain sign-in logs in Azure AD and System Logs in Okta; forward these to your SIEM (Azure Sentinel, Splunk, etc.). Create detection rules for unusual token reuse, sudden increases in failed FIDO/WebAuthn assertions, repeated certificate authentication failures, and sign-ins from unexpected geolocations. Periodically perform live tests: capture a legitimate authentication exchange and verify that replay is rejected, run red-team exercises on VPN/Wi‑Fi, and document mitigation. For Compliance Framework evidence, export Conditional Access configuration, Sign-On policy settings, authenticator enforcement, and sample logs demonstrating rejected legacy auth or replay attempts.

Compliance tips, best practices and small-business scenarios

For a small business with limited staff: phase rollout by enforcing modern authenticators on high-value accounts first (finance, admins, CUI handlers) and use group-based policies to expand. Require hardware-bound authenticators (security keys) or platform WebAuthn (Windows Hello) for administrators, and issue device client certs for company laptops used for VPN. Keep a break-glass account secured offline with a hardware security key, documented and strictly controlled. Best practices: disable SMS/TOTP as primary MFA for sensitive access, block legacy auth, shorten session lifetimes for web apps, use device compliance (Intune/MDM or Okta Device Trust), automate certificate management, and rotate keys/certs routinely. Train staff on enrolling and using FIDO2 keys and on the reason you’re disabling older MFA methods β€” staff compliance removes common operational friction and reduces risky workarounds.

In summary, meeting IA.L2-3.5.4 requires replacing replayable authentication mechanisms with cryptographic, challenge-response or mutual-authentication mechanisms and enforcing them via identity-provider policies and network-layer configurations. For Azure AD and Okta, that means enabling and requiring FIDO2/WebAuthn or client certificates, blocking legacy/basic auth, integrating VPN/Wi‑Fi with EAP-TLS, tightening session controls and sign-in frequency, and demonstrating through logs and tests that replay attempts are rejected. Implement these steps iteratively, document configurations and tests for auditors, and combine technical controls with staff training and incident monitoring to maintain ongoing compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes