🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Deploy Single Sign-On and Conditional Access for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI with Azure AD or Okta

Step-by-step guidance to implement SSO and Conditional Access with Azure AD or Okta to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements for identity and access controls.

April 21, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Implementing Single Sign-On (SSO) and Conditional Access is a practical, high-impact way for small and mid-size contractors to satisfy FAR 52.204-21 basic safeguarding expectations and the CMMC 2.0 Level 1 IA.L1-B.1.VI control by ensuring authenticated, risk-aware access to systems that handle Contractor Controlled Unclassified Information (CUI).

Why SSO + Conditional Access answers the compliance need

FAR 52.204-21 requires basic safeguarding practices for federal contract information; CMMC 2.0 Level 1 focuses on foundational cyber hygiene (including identification and authentication). Combining SSO and conditional access centralizes authentication, reduces password sprawl, enables MFA enforcement, and documents access decisions — all key evidence points for an assessor. For small businesses this means fewer user mistakes, easier account lifecycle management, and auditable controls without a huge operational footprint.

Implementation overview (Compliance Framework specifics)

At a high level you must: 1) migrate apps to an identity provider (IdP) for SSO (SAML/OIDC), 2) configure Conditional Access policies to enforce MFA and device or location checks, 3) integrate device/compliance signals (Intune, Jamf, or device trust in Okta), and 4) enable logging and retention so you can produce access logs during assessment. Map each of these artifacts to the control language: policy text, policy configurations (screenshots / exports), sign-in logs, and test results with fictitious accounts to show enforcement.

Step-by-step: Azure AD practical implementation

Azure AD is a common choice for Microsoft-centric shops. Practical steps: 1) Ensure licensing: Azure AD P1 is required for Conditional Access; P2 is recommended for Identity Protection. 2) Onboard domains and verify DNS. 3) Register enterprise applications or use the Azure Gallery apps and enable SAML or OIDC SSO; enable SCIM provisioning where supported for automated account lifecycle. 4) Create Conditional Access policy templates: example — Target: All cloud apps (or scoped apps handling CUI); Users: All users except emergency/break-glass; Conditions: Client apps (block legacy authentication), Locations (block risky countries and allow corporate IP ranges), Device state (require compliant). 5) Grant controls: Require multi-factor authentication AND Require device to be marked compliant (Intune). 6) Session controls: Sign-in frequency = 8 hours or use persistent browser session policy as appropriate. 7) Test with pilot group and use Azure AD Sign-in logs plus Conditional Access insights to collect evidence. Specific technical notes: block legacy auth by creating a policy targeting "Legacy authentication clients" and set to Block; configure report-only mode first and then enforce; use Named Locations for your trusted IPs; configure and protect emergency access accounts by excluding them from CA policies and storing credentials offline with a hardware token.

Step-by-step: Okta practical implementation

Okta provides equivalent capabilities. Practical steps: 1) Ensure correct Okta edition (Adaptive MFA + Lifecycle Management recommended). 2) Add applications via OIDC or SAML; use SCIM for provisioning where available. 3) Build Sign-On Policies and/or Okta Access Policies for specific apps: require MFA on first-time device and on sign-ins from new geolocations. 4) Use Okta's Adaptive MFA and contextual factors (IP, device posture, network) to create dynamic rules — example: Require Okta Verify or FIDO2 for administrative users and MFA for all users accessing CUI apps. 5) Implement Device Trust: integrate with Jamf (macOS) or Microsoft Intune for Windows to ensure only managed/compliant devices can complete SSO. 6) Use System Log API and reports to retain sign-on and policy evaluation logs for your assessment evidence. 7) Disable legacy auth entry by blocking older protocols at the application level and creating rules that deny unknown client types.

Real-world small-business scenarios

Example A: A small subcontractor hosts a SharePoint site and a vendor portal. Migrate both to SSO with Azure AD: add them as Enterprise Applications, enable SAML SSO, then apply a Conditional Access policy that requires MFA and Intune-compliant devices for access from outside the corporate network. Evidence: application SSO configuration screenshot, CA policy export, and sign-in log showing an enforced MFA event. Example B: A small engineering firm using Okta integrates their SaaS apps with Okta SSO, enforces Adaptive MFA, and uses SCIM to automatically revoke access for terminated contractors — evidence includes user lifecycle logs and policy rule screenshots.

Compliance tips, best practices and technical specifics

Best practices include: maintain a documented access control policy mapping SSO/CA configurations to the relevant FAR/CMMC control statements; keep Conditional Access policies lean and test in report-only mode before enforcement; exclude a small number of hardened break-glass accounts from CA but protect them with hardware-based MFA and offline credentials; disable legacy authentication (Basic Auth) to stop protocol-based bypass; set log retention to meet contract audit requirements and export logs to SIEM (Azure Sentinel, Splunk) for long-term storage. Technical specifics: export Azure CA policy JSON and include in your evidence package; in Okta, save the System Log exports for sign-in events and policy evaluation; automate onboarding/offboarding with SCIM to reduce orphan accounts.

Risks of not implementing SSO and Conditional Access

Failing to deploy these controls leaves organizations exposed to credential theft, lateral movement, and unauthorized access to CUI. Legacy authentication channels and unmanaged devices dramatically raise risk of phishing success and account takeover. For contractors this can lead to data breaches, loss of contracts, remedial audits, or suspension from DoD programs. From an assurance perspective, absence of centralized access enforcement and logs makes demonstrating compliance to an assessor difficult or impossible.

In summary, to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI a small business should implement SSO across relevant apps, enforce Conditional Access (MFA, device compliance, location), integrate device management, and retain sign-in/policy logs as evidence; using Azure AD or Okta this can be done with moderate licensing and straightforward configurations — test carefully, document everything, and automate provisioning to reduce human error.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes