Introduction
As part of Microsoft’s Secure Future Initiative, we’re updating our Content Security Policy for the Microsoft Entra ID sign-in experience. This change adds an extra layer of protection by allowing only scripts from trusted Microsoft domains to run during authentication, blocking unauthorized or injected external code. This proactive measure helps safeguard users against threats like cross-site scripting (XSS), further strengthening security for your organization.
When this will happen
General Availability (Production/Worldwide only):
- Rollout begins mid-October 2026
- Expected completion by late October 2026
Periodic communications will be sent closer to release.
How this affects your organization
Who is affected:
- Organizations using browser-based sign-in experiences on URLs starting with login.microsoftonline.com.
- No impact to Microsoft Entra External ID tenants.
What will happen:
- A new Content Security Policy header will be added to Microsoft Entra sign-in pages.
- Scripts will only be allowed from Microsoft trusted CDN domains.
- Inline script execution will only be allowed from trusted Microsoft sources.
- Browser extensions or tools that inject code into the sign-in page will stop working, though users can still sign in.
What you can do to prepare
- If you do not use tools or extensions that inject code into the sign-in experience, no action is required.
- If you do use such tools, switch to alternatives that don’t inject code.
- Test your sign-in flows thoroughly before rollout to identify and resolve any issues early. Testing instructions can be found on our CSP Guide for Microsoft Entra ID.
Learn more:
- Content Security Policy Overview for Microsoft Entra ID
- Microsoft Entra ID Content Security Policy Public Blog Post on Techcommunity
- Microsoft Secure Future Initiative
- The CSP nonce guide | Content Security Policy (CSP) quick reference guide
- The CSP script-src directive guide | Content Security Policy (CSP) quick reference guide
- Why XSS still matters: MSRC’s perspective on a 25-year-old threat | Microsoft Blog
Compliance considerations
No compliance considerations identified; review as appropriate for your organization.
Source: Microsoft
Latest Posts
- Microsoft Entra ID: Enhance protection of the authentication experience by blocking external script injection [MC1191924]
![Microsoft Entra ID: Enhance protection of the authentication experience by blocking external script injection [MC1191924] 2 pexels leofallflat 1089194](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- (Updated) Microsoft Outlook: Automatically display automapped calendars [MC906502]
![(Updated) Microsoft Outlook: Automatically display automapped calendars [MC906502] 3 pexels steve 27424779](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- New enrollment dashboard and data deletion controls in Teams Admin Center [MC1191921]
![New enrollment dashboard and data deletion controls in Teams Admin Center [MC1191921] 4 girl 2605129 1920](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
- (Updated) Microsoft Teams: Rule-based enablement of Microsoft 365 third-party apps in the Teams admin center [MC1085133]
![(Updated) Microsoft Teams: Rule-based enablement of Microsoft 365 third-party apps in the Teams admin center [MC1085133] 5 road 6486701 1920](data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==)
![Microsoft Entra ID: Enhance protection of the authentication experience by blocking external script injection [MC1191924] 1 Microsoft Entra ID: Enhance protection of the authentication experience by blocking external script injection [MC1191924]](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-leofallflat-1089194-1024x683.webp)
![Microsoft Entra ID: Enhance protection of the authentication experience by blocking external script injection [MC1191924] 2 pexels leofallflat 1089194](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-leofallflat-1089194-150x150.webp)
![(Updated) Microsoft Outlook: Automatically display automapped calendars [MC906502] 3 pexels steve 27424779](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-steve-27424779-150x150.webp)
![New enrollment dashboard and data deletion controls in Teams Admin Center [MC1191921] 4 girl 2605129 1920](https://mwpro.co.uk/wp-content/uploads/2025/06/girl-2605129_1920-150x150.webp)
![(Updated) Microsoft Teams: Rule-based enablement of Microsoft 365 third-party apps in the Teams admin center [MC1085133] 5 road 6486701 1920](https://mwpro.co.uk/wp-content/uploads/2025/06/road-6486701_1920-150x150.webp)