Mirage CA Baseline Deployer

v2026 · Microsoft Entra ID - Conditional Access policies, groups, and named locations · New CA policies mostly Report-only (enabledForReportingButNotEnforced), including device registration MFA (CA112 / User actions). Eight baseline rules default Off: CA111, CA202, CA204, CA302, CA303, CA603, CA606, CAA01. Optional deploymentState in intent JSON applies only on first create (POST; never PATCH existing policies).

Browse all 41 policies README

1. Sign in to your tenant

You sign in with your administrator account to your Microsoft Entra tenant (delegated sign-in, not a shared credential). The Mirage CA Baseline Deployer app is a multi-tenant, public client with no client secret. The first administrator to use it in your tenant sees the standard Microsoft consent screen for the requested Graph permissions. Sign-in state lives in memory for this tab only: reloading or closing the page clears it (no token cache in session storage).

Account: Not signed in

2. Review what will happen

The baseline covers users, administrators, guests, service accounts, and agents - not every policy applies to every principal on day one.

Details: policies on this page · live catalog (with descriptions) · README. Baseline source: (resolving...)

Policy catalog

All 41 Conditional Access policies in the baseline (new deploys: Report-only except eight default Off - see bullets above). For descriptions and personas, open the live catalog.

ID Display name Persona Criticality
CA101 Require MFA All users Critical
CA102 User Risk - Require MFA + Password Change All users Critical
CA103 Sign-In Risk - Require MFA All users Critical
CA104 Block Legacy Authentication All users Critical
CA105 Block Unknown Platforms All users Recommended
CA106 Block Outside Trusted Countries All users Critical
CA107 Session Controls All users Recommended
CA108 Block Cross-Device Auth Flows All users Critical
CA109 Require MFA for Azure Management All users Recommended
CA110 Block Malicious IPs All users Optional
CA111 Continuous Access Evaluation - Standard All users Recommended
CA112 MFA on Device Register or Join All users Critical
CA113 Require Token Protection (Pilot) All users Optional
CA114 Terms of Use All users Optional
CA201 Intune Enrolling - Require MFA All users Critical
CA202 Require App Protection (Mobile) All users Critical
CA204 Require Compliant Mobile (Optional MDM track) All users Optional
CA301 Require Compliant Windows All users Critical
CA302 Require Compliant macOS All users Critical
CA303 Limited Browser Access on Unmanaged Devices All users Recommended
CA304 Require Compliant Linux All users Critical
CA601 Phishing-Resistant MFA for Admins Admins Critical
CA602 Admin Session Controls Admins Critical
CA603 Admin CAE - Strict Admins Critical
CA604 Admin Block High User Risk Admins Critical
CA605 Admin Block High Sign-In Risk Admins Critical
CA606 Admin Require Compliant or Joined Device Admins Critical
CA701 App - FortiClient - MFA Application Optional
CA702 App - Salesforce - MFA Application Optional
CA801 Service - Require MFA (Interactive) Service Recommended
CA802 Service - Block Outside Trusted IPs Service Critical
CA803 Service - Block Legacy Auth Service Recommended
CA804 Service - Block Non-M365 Apps Service Recommended
CA901 Guest - Require MFA Guest Critical
CA902 Guest - Block High Sign-In Risk Guest Recommended
CA903 Guest - Block Legacy Auth Guest Recommended
CA904 Guest - Block Outside Trusted Countries Guest Critical
CA905 Guest - Block Non-Collaboration Apps Guest Critical
CA906 Guest - Terms of Use Guest Optional
CA907 Guest - Session Controls Guest Recommended
CAA01 Agent - Block High Risk Agent Recommended

3. Deploy

Dry run previews the work - no directory writes. Turn it off for a real deploy.

Sign in to begin.

Next: read the activity log below, then After deployment.

Activity log

After deployment

Use Microsoft Entra admin center - not this page - to finish rollout:

Full guidance (hosting, roles, fork): see the README - Deploy in your tenant on GitHub.

What this tool does