Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤️ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1191924

Microsoft Entra ID: Enhance protection of the authentication experience by blocking external script injection

Informational

Message ID

MC1191924
View in Admin Center

Services

Microsoft Entra

Summary

Microsoft Entra ID will enhance authentication security by enforcing a Content Security Policy that blocks external script injection, allowing only trusted Microsoft scripts. This rollout begins mid-October 2026, affecting browser-based sign-ins on login.microsoftonline.com, with no impact on Entra External ID tenants.

Details

Introduction

As part of Microsoft’s Secure Future Initiative, we’re updating our Content Security Policy for the Microsoft Entra ID sign-in experience. This change adds an extra layer of protection by allowing only scripts from trusted Microsoft domains to run during authentication, blocking unauthorized or injected external code. This proactive measure helps safeguard users against threats like cross-site scripting (XSS), further strengthening security for your organization.

When this will happen

General Availability (Production/Worldwide only):

  • Rollout begins mid-October 2026
  • Expected completion by late October 2026

Periodic communications will be sent closer to release.

How this affects your organization

Who is affected:

  • Organizations using browser-based sign-in experiences on URLs starting with login.microsoftonline.com.
  • No impact to Microsoft Entra External ID tenants.

What will happen:

  • A new Content Security Policy header will be added to Microsoft Entra sign-in pages.
  • Scripts will only be allowed from Microsoft trusted CDN domains.
  • Inline script execution will only be allowed from trusted Microsoft sources.
  • Browser extensions or tools that inject code into the sign-in page will stop working, though users can still sign in.

What you can do to prepare

  • If you do not use tools or extensions that inject code into the sign-in experience, no action is required.
  • If you do use such tools, switch to alternatives that don’t inject code.
  • Test your sign-in flows thoroughly before rollout to identify and resolve any issues early. Testing instructions can be found on our CSP Guide for Microsoft Entra ID.

Learn more:

  • Content Security Policy Overview for Microsoft Entra ID 
  • Microsoft Entra ID Content Security Policy Public Blog Post on Techcommunity
  • Microsoft Secure Future Initiative
  • The CSP nonce guide | Content Security Policy (CSP) quick reference guide
  • The CSP script-src directive guide | Content Security Policy (CSP) quick reference guide
  • Why XSS still matters: MSRC’s perspective on a 25-year-old threat | Microsoft Blog

Compliance considerations

No compliance considerations identified; review as appropriate for your organization.

Timeline

📅
Published
Dec 3, 2025
Message published to Message Center
✏️
Updated
Dec 3, 2025
Message content updated
🏁
End Date
Nov 25, 2026
Message timeline ends

Tags

#Feature update#User impact#Admin impact

Category

📖Stay Informed

Related Messages

Similar updates

MC1192252

External authentication methods (EAM) – Public preview update

Dec 5, 2025
MC1198077

Microsoft Entra: Cross-tenant security group synchronization

Dec 16, 2025
MC1187672

Get ready for security agents: Microsoft Security Copilot will be included in Microsoft 365 E5

Nov 18, 2025
MC1179154

Microsoft Authenticator app: Upcoming changes to jailbreak and root detection

Oct 24, 2025
MC1141956

Microsoft Entra: Refreshed credential enrollment and management UX

Aug 25, 2025