🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Deploy MFA and SSO to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI (Small Contractor Guide)

Step-by-step guidance for small contractors to implement MFA and SSO to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 (IA.L1-B.1.VI), with practical examples, technical details, and audit evidence tips.

•
April 18, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Small government contractors can meet the authentication requirements of FAR 52.204-21 and CMMC 2.0 Level 1 Control IA.L1-B.1.VI by deploying a practical, auditable combination of Single Sign-On (SSO) and Multi-Factor Authentication (MFA) that protects user access to systems handling Federal Contract Information (FCI) and basic Controlled Unclassified Information (CUI).

Why MFA + SSO matters for Compliance Framework

FAR 52.204-21 requires basic safeguarding of contractor information and CMMC Level 1 requires implementation of "basic cyber hygiene" controls — the Control IA.L1-B.1.VI is focused on identity assurance and access control. Together, SSO centralizes authentication and user lifecycle management while MFA provides the second factor needed to reduce credential theft and unauthorized access. For a small contractor this is the highest-value control: it is relatively low cost but disproportionately reduces the risk of breach and non‑compliance.

Practical implementation plan (step-by-step)

1) Inventory and classify: list all systems that store/access FCI/CUI (Office 365/Google Workspace, cloud apps, VPN, RMM, code repos). 2) Choose an Identity Provider (IdP): common choices for small businesses include Microsoft Entra ID (Azure AD), Google Identity, Okta, or JumpCloud — pick one that supports SAML 2.0 / OIDC, SCIM for provisioning, and conditional access. 3) Enable SSO: configure your cloud apps to use SAML/OIDC; set NameID to userPrincipalName/email, map group claims if you use role-based access. 4) Configure MFA: enforce at least one second factor for all users accessing governed systems — prefer phishing-resistant factors (FIDO2 keys, hardware tokens, or TOTP + push). 5) Apply policies: require MFA for remote access, privileged roles, and administrative portals; disable legacy auth (IMAP/POP/SMTP auth) and configure session timeouts. 6) Document and test: capture screenshots, policy exports, and logs to demonstrate implementation for auditors.

Technical specifics — SSO & MFA configuration examples

For SAML apps set the Assertion Consumer Service (ACS) URL to the service provider's endpoint (e.g., https://app.example.com/saml/acs) and sign assertions with the IdP certificate. Configure NameID format as urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress and include attributes like email, given_name, family_name, and groups. For OIDC public clients use PKCE, set redirect URIs exactly, and restrict token lifetimes. For MFA: enable TOTP (RFC 6238) as a baseline, enable push notifications from a reputable authenticator app (Microsoft Authenticator, Google Authenticator, Authy), and where possible require FIDO2/WebAuthn for administrative accounts and remote access. Disable SMS as a long-term primary factor due to SIM‑swap risks.

Small business real-world scenarios

Scenario A — 12-person consulting firm using Google Workspace and a cloud-based CRM: Turn on Google Workspace SSO and enforce 2-step verification for all users. For CRM and other SaaS, configure enterprise SSO via SAML with Google as IdP, enable SCIM to auto-provision/deprovision accounts, and require re-authentication for sensitive operations. Scenario B — 20-person dev shop using Office 365 and an on-prem VPN: Deploy Azure AD, enable Conditional Access so VPN connections require device compliance + MFA via Azure MFA or a third-party RADIUS bridge, and use Azure AD Application Proxy to provide SSO for internal web apps instead of exposing them directly to the internet.

Compliance evidence and audit readiness

Auditors will want proof that MFA is enforced and SSO is configured for systems in scope. Prepare: exported conditional access policies, screenshots of IdP configuration (ACS URLs, claims mapping), user provisioning logs (SCIM activity), MFA enrollment logs with timestamps, and examples of rejection events (failed logins blocked by MFA). Keep a written access control policy describing which roles require MFA and the acceptable second factors. Retain logs for at least the period specified in your contract and CUI handling policy — typically 90 days to one year depending on internal rules and contract clauses.

Best practices and hardening tips

1) Enforce least privilege: map SSO groups to least-privileged roles and avoid overbroad admin privileges. 2) Protect recovery flows: require identity-proofing or in-person verification for MFA reset, and log all resets. 3) Disable legacy authentication and enable modern auth only (OAuth/OIDC/SAML). 4) Use conditional access: require compliant devices, geographic/IP restrictions, and MFA for risky sign-ins. 5) Rotate service account credentials, avoid long-lived plaintext keys, and use short-lived tokens or managed identities for automation. 6) Train staff on phishing and on how to use authenticators and recovery codes; test incident response with a planned MFA outage drill.

Risks of not implementing MFA and SSO

Without MFA and SSO, you face elevated risk of credential compromise, lateral movement, and unauthorized access to FCI/CUI. Consequences include data breach, contract termination, financial penalties, reputational damage, and failure in a CMMC assessment. For small contractors, a single compromised admin account can lead to loss of multiple contracts or disqualification from future solicitations — implementing MFA/SSO addresses the most common attack vector (phished or reused passwords) quickly and effectively.

Summary: For small contractors seeking to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI, deploy a centrally managed IdP with SSO, enforce MFA (prefer phishing-resistant factors), use conditional access and device checks, document policies and evidence, and include recovery and testing procedures. This approach gives you a strong, cost-effective defense and a clear audit trail to demonstrate compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes