{
  "title": "How to Deploy Single Sign-On and Conditional Access for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI with Azure AD or Okta",
  "date": "2026-04-21",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-deploy-single-sign-on-and-conditional-access-for-far-52204-21-cmmc-20-level-1-control-ial1-b1vi-with-azure-ad-or-okta.jpg",
  "content": {
    "full_html": "<p>Implementing Single Sign-On (SSO) and Conditional Access is a practical, high-impact way for small and mid-size contractors to satisfy FAR 52.204-21 basic safeguarding expectations and the CMMC 2.0 Level 1 IA.L1-B.1.VI control by ensuring authenticated, risk-aware access to systems that handle Contractor Controlled Unclassified Information (CUI).</p>\n\n<h2>Why SSO + Conditional Access answers the compliance need</h2>\n<p>FAR 52.204-21 requires basic safeguarding practices for federal contract information; CMMC 2.0 Level 1 focuses on foundational cyber hygiene (including identification and authentication). Combining SSO and conditional access centralizes authentication, reduces password sprawl, enables MFA enforcement, and documents access decisions — all key evidence points for an assessor. For small businesses this means fewer user mistakes, easier account lifecycle management, and auditable controls without a huge operational footprint.</p>\n\n<h2>Implementation overview (Compliance Framework specifics)</h2>\n<p>At a high level you must: 1) migrate apps to an identity provider (IdP) for SSO (SAML/OIDC), 2) configure Conditional Access policies to enforce MFA and device or location checks, 3) integrate device/compliance signals (Intune, Jamf, or device trust in Okta), and 4) enable logging and retention so you can produce access logs during assessment. Map each of these artifacts to the control language: policy text, policy configurations (screenshots / exports), sign-in logs, and test results with fictitious accounts to show enforcement.</p>\n\n<h2>Step-by-step: Azure AD practical implementation</h2>\n<p>Azure AD is a common choice for Microsoft-centric shops. Practical steps: 1) Ensure licensing: Azure AD P1 is required for Conditional Access; P2 is recommended for Identity Protection. 2) Onboard domains and verify DNS. 3) Register enterprise applications or use the Azure Gallery apps and enable SAML or OIDC SSO; enable SCIM provisioning where supported for automated account lifecycle. 4) Create Conditional Access policy templates: example — Target: All cloud apps (or scoped apps handling CUI); Users: All users except emergency/break-glass; Conditions: Client apps (block legacy authentication), Locations (block risky countries and allow corporate IP ranges), Device state (require compliant). 5) Grant controls: Require multi-factor authentication AND Require device to be marked compliant (Intune). 6) Session controls: Sign-in frequency = 8 hours or use persistent browser session policy as appropriate. 7) Test with pilot group and use Azure AD Sign-in logs plus Conditional Access insights to collect evidence. Specific technical notes: block legacy auth by creating a policy targeting \"Legacy authentication clients\" and set to Block; configure report-only mode first and then enforce; use Named Locations for your trusted IPs; configure and protect emergency access accounts by excluding them from CA policies and storing credentials offline with a hardware token.</p>\n\n<h2>Step-by-step: Okta practical implementation</h2>\n<p>Okta provides equivalent capabilities. Practical steps: 1) Ensure correct Okta edition (Adaptive MFA + Lifecycle Management recommended). 2) Add applications via OIDC or SAML; use SCIM for provisioning where available. 3) Build Sign-On Policies and/or Okta Access Policies for specific apps: require MFA on first-time device and on sign-ins from new geolocations. 4) Use Okta's Adaptive MFA and contextual factors (IP, device posture, network) to create dynamic rules — example: Require Okta Verify or FIDO2 for administrative users and MFA for all users accessing CUI apps. 5) Implement Device Trust: integrate with Jamf (macOS) or Microsoft Intune for Windows to ensure only managed/compliant devices can complete SSO. 6) Use System Log API and reports to retain sign-on and policy evaluation logs for your assessment evidence. 7) Disable legacy auth entry by blocking older protocols at the application level and creating rules that deny unknown client types.</p>\n\n<h2>Real-world small-business scenarios</h2>\n<p>Example A: A small subcontractor hosts a SharePoint site and a vendor portal. Migrate both to SSO with Azure AD: add them as Enterprise Applications, enable SAML SSO, then apply a Conditional Access policy that requires MFA and Intune-compliant devices for access from outside the corporate network. Evidence: application SSO configuration screenshot, CA policy export, and sign-in log showing an enforced MFA event. Example B: A small engineering firm using Okta integrates their SaaS apps with Okta SSO, enforces Adaptive MFA, and uses SCIM to automatically revoke access for terminated contractors — evidence includes user lifecycle logs and policy rule screenshots.</p>\n\n<h2>Compliance tips, best practices and technical specifics</h2>\n<p>Best practices include: maintain a documented access control policy mapping SSO/CA configurations to the relevant FAR/CMMC control statements; keep Conditional Access policies lean and test in report-only mode before enforcement; exclude a small number of hardened break-glass accounts from CA but protect them with hardware-based MFA and offline credentials; disable legacy authentication (Basic Auth) to stop protocol-based bypass; set log retention to meet contract audit requirements and export logs to SIEM (Azure Sentinel, Splunk) for long-term storage. Technical specifics: export Azure CA policy JSON and include in your evidence package; in Okta, save the System Log exports for sign-in events and policy evaluation; automate onboarding/offboarding with SCIM to reduce orphan accounts.</p>\n\n<h2>Risks of not implementing SSO and Conditional Access</h2>\n<p>Failing to deploy these controls leaves organizations exposed to credential theft, lateral movement, and unauthorized access to CUI. Legacy authentication channels and unmanaged devices dramatically raise risk of phishing success and account takeover. For contractors this can lead to data breaches, loss of contracts, remedial audits, or suspension from DoD programs. From an assurance perspective, absence of centralized access enforcement and logs makes demonstrating compliance to an assessor difficult or impossible.</p>\n\n<p>In summary, to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI a small business should implement SSO across relevant apps, enforce Conditional Access (MFA, device compliance, location), integrate device management, and retain sign-in/policy logs as evidence; using Azure AD or Okta this can be done with moderate licensing and straightforward configurations — test carefully, document everything, and automate provisioning to reduce human error.</p>",
    "plain_text": "Implementing Single Sign-On (SSO) and Conditional Access is a practical, high-impact way for small and mid-size contractors to satisfy FAR 52.204-21 basic safeguarding expectations and the CMMC 2.0 Level 1 IA.L1-B.1.VI control by ensuring authenticated, risk-aware access to systems that handle Contractor Controlled Unclassified Information (CUI).\n\nWhy SSO + Conditional Access answers the compliance need\nFAR 52.204-21 requires basic safeguarding practices for federal contract information; CMMC 2.0 Level 1 focuses on foundational cyber hygiene (including identification and authentication). Combining SSO and conditional access centralizes authentication, reduces password sprawl, enables MFA enforcement, and documents access decisions — all key evidence points for an assessor. For small businesses this means fewer user mistakes, easier account lifecycle management, and auditable controls without a huge operational footprint.\n\nImplementation overview (Compliance Framework specifics)\nAt a high level you must: 1) migrate apps to an identity provider (IdP) for SSO (SAML/OIDC), 2) configure Conditional Access policies to enforce MFA and device or location checks, 3) integrate device/compliance signals (Intune, Jamf, or device trust in Okta), and 4) enable logging and retention so you can produce access logs during assessment. Map each of these artifacts to the control language: policy text, policy configurations (screenshots / exports), sign-in logs, and test results with fictitious accounts to show enforcement.\n\nStep-by-step: Azure AD practical implementation\nAzure AD is a common choice for Microsoft-centric shops. Practical steps: 1) Ensure licensing: Azure AD P1 is required for Conditional Access; P2 is recommended for Identity Protection. 2) Onboard domains and verify DNS. 3) Register enterprise applications or use the Azure Gallery apps and enable SAML or OIDC SSO; enable SCIM provisioning where supported for automated account lifecycle. 4) Create Conditional Access policy templates: example — Target: All cloud apps (or scoped apps handling CUI); Users: All users except emergency/break-glass; Conditions: Client apps (block legacy authentication), Locations (block risky countries and allow corporate IP ranges), Device state (require compliant). 5) Grant controls: Require multi-factor authentication AND Require device to be marked compliant (Intune). 6) Session controls: Sign-in frequency = 8 hours or use persistent browser session policy as appropriate. 7) Test with pilot group and use Azure AD Sign-in logs plus Conditional Access insights to collect evidence. Specific technical notes: block legacy auth by creating a policy targeting \"Legacy authentication clients\" and set to Block; configure report-only mode first and then enforce; use Named Locations for your trusted IPs; configure and protect emergency access accounts by excluding them from CA policies and storing credentials offline with a hardware token.\n\nStep-by-step: Okta practical implementation\nOkta provides equivalent capabilities. Practical steps: 1) Ensure correct Okta edition (Adaptive MFA + Lifecycle Management recommended). 2) Add applications via OIDC or SAML; use SCIM for provisioning where available. 3) Build Sign-On Policies and/or Okta Access Policies for specific apps: require MFA on first-time device and on sign-ins from new geolocations. 4) Use Okta's Adaptive MFA and contextual factors (IP, device posture, network) to create dynamic rules — example: Require Okta Verify or FIDO2 for administrative users and MFA for all users accessing CUI apps. 5) Implement Device Trust: integrate with Jamf (macOS) or Microsoft Intune for Windows to ensure only managed/compliant devices can complete SSO. 6) Use System Log API and reports to retain sign-on and policy evaluation logs for your assessment evidence. 7) Disable legacy auth entry by blocking older protocols at the application level and creating rules that deny unknown client types.\n\nReal-world small-business scenarios\nExample A: A small subcontractor hosts a SharePoint site and a vendor portal. Migrate both to SSO with Azure AD: add them as Enterprise Applications, enable SAML SSO, then apply a Conditional Access policy that requires MFA and Intune-compliant devices for access from outside the corporate network. Evidence: application SSO configuration screenshot, CA policy export, and sign-in log showing an enforced MFA event. Example B: A small engineering firm using Okta integrates their SaaS apps with Okta SSO, enforces Adaptive MFA, and uses SCIM to automatically revoke access for terminated contractors — evidence includes user lifecycle logs and policy rule screenshots.\n\nCompliance tips, best practices and technical specifics\nBest practices include: maintain a documented access control policy mapping SSO/CA configurations to the relevant FAR/CMMC control statements; keep Conditional Access policies lean and test in report-only mode before enforcement; exclude a small number of hardened break-glass accounts from CA but protect them with hardware-based MFA and offline credentials; disable legacy authentication (Basic Auth) to stop protocol-based bypass; set log retention to meet contract audit requirements and export logs to SIEM (Azure Sentinel, Splunk) for long-term storage. Technical specifics: export Azure CA policy JSON and include in your evidence package; in Okta, save the System Log exports for sign-in events and policy evaluation; automate onboarding/offboarding with SCIM to reduce orphan accounts.\n\nRisks of not implementing SSO and Conditional Access\nFailing to deploy these controls leaves organizations exposed to credential theft, lateral movement, and unauthorized access to CUI. Legacy authentication channels and unmanaged devices dramatically raise risk of phishing success and account takeover. For contractors this can lead to data breaches, loss of contracts, remedial audits, or suspension from DoD programs. From an assurance perspective, absence of centralized access enforcement and logs makes demonstrating compliance to an assessor difficult or impossible.\n\nIn summary, to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI a small business should implement SSO across relevant apps, enforce Conditional Access (MFA, device compliance, location), integrate device management, and retain sign-in/policy logs as evidence; using Azure AD or Okta this can be done with moderate licensing and straightforward configurations — test carefully, document everything, and automate provisioning to reduce human error."
  },
  "metadata": {
    "description": "Step-by-step guidance to implement SSO and Conditional Access with Azure AD or Okta to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements for identity and access controls.",
    "permalink": "/how-to-deploy-single-sign-on-and-conditional-access-for-far-52204-21-cmmc-20-level-1-control-ial1-b1vi-with-azure-ad-or-okta.json",
    "categories": [],
    "tags": []
  }
}