When everything fails—MFA outages, identity provider downtime, or a mass configuration error—Microsoft Entra Break-Glass Access is the emergency key that keeps the lights on. It is the final fail-safe for Azure AD and Microsoft Entra ID, designed to bypass every normal control so that you can recover access without delay. Done wrong, it is a time bomb. Done right, it’s the foundation of a resilient identity strategy.
What is Microsoft Entra Break-Glass Access
Break-glass accounts are special cloud-only accounts with global admin rights. They are excluded from conditional access, MFA requirements, and automated governance. Their only job is to grant full access when standard authentication paths are unavailable. Microsoft recommends at least two break-glass accounts stored securely offline, monitored 24/7, and tested regularly.
A strong policy for these accounts protects against both downtime and intrusion. Without them, major outages can escalate into full-scale business disruption.
Why Break-Glass Matters Now
Cloud identity is the single point of entry for nearly every critical system. Outages or lockouts can grind recovery to a halt if there is no alternative administrative access. Break-glass accounts give you a guaranteed backdoor in—a controlled path that skips failed sign-in controls and restores stability without waiting for upstream providers to recover.
Attackers know the value of these accounts. That’s why their configuration must be airtight. Use unique, randomly generated passwords stored in hardware security modules or secure physical vaults. Ensure they are exempt from normal policies but not from monitoring. Every sign-in from a break-glass account should trigger immediate, high-priority alerts.