Skip to Content

Break-Glass Accounts That Fail During Real Incidents

21 January 2026 by
Jaspreet Singh

MacBook Pro inside gray room

Break-Glass Accounts That Fail During Real Incidents

And why most organizations only notice this problem when it’s already too late.When an incident hits, break-glass accounts are supposed to save you.No MFA loops.

No Conditional Access lockouts.

No dependency on a broken identity plane.

Yet in real incidents, break-glass accounts fail far more often than people admit. (Gentles et al., 2025)

The idea itself isn’t the problem.  The real issue is that implementations are often lazy, untested, and based on too many assumptions.

Let’s talk about why break-glass accounts fail exactly when you need them most.

The uncomfortable truth

Most organizations create break-glass accounts to satisfy a checklist, not to survive an outage.

  • Account exists
  • Excluded from Conditional Access
  • Password stored “somewhere safe.”

And then… no one touches it again.

This works until Entra ID policies fail, MFA providers go down, or a bad Conditional Access change locks out every admin, including you.That’s when reality hits.

Failure #1: MFA is disabled — but the account is still unreachable

Disabling MFA is not enough.

Common real-world blockers:

  • Sign-in risk policies still apply
  • User risk policies still apply
  • Legacy CA policies target All Users
  • Authentication strength policies override exclusions

Result:

The break-glass account exists… but still can’t sign in.

If your break-glass account depends on any risk evaluation, it is not a break-glass account.

Failure #2: Password stored securely — but not accessible

Security teams love vaults.

Incident response hates them.

Real incidents look like this:

  • Vault access requires SSO
  • SSO requires Entra ID
  • Entra ID is the thing that’s broken

In the end, your emergency account is locked away right when you need it most.

Rule:

A break-glass password must be:

  • Offline
  • Human-accessible
  • Recoverable under stress

If it requires another identity system, it will fail.

Failure #3: Account exists — but is blocked or disabled

This happens more than anyone admits. (Security operations for privileged accounts in Microsoft Entra ID, 2024)

  • “Block sign-in” toggled during cleanup
  • Account auto-disabled due to inactivity
  • License removed and forgotten
  • Sign-in is restricted by tenant-wide settings

No alerts.

No warnings.

There is only silence until it suddenly matters.

Failure #4: Roles are wrong (or gone)

Break-glass accounts often start out strong but gradually become less effective over time.

  • Global Admin removed during least-privilege cleanup
  • PIM applied “temporarily.”
  • Role eligibility expired
  • Admin roles are split across multiple accounts

During an incident, PIM approvals don’t work and notifications don’t arrive.

If your break-glass account:

  • Requires activation
  • Requires approval
  • Requires another admin

it has already failed.

Failure #5: No one has tested it — ever

This is the biggest failure of all.

Ask yourself honestly:

  • When was the last successful login?
  • From a clean device?
  • Outside your corporate network?
  • Without cached sessions?
  • Without MFA?

For most tenants, the answer is never. (Security operations for privileged accounts in Microsoft Entra ID, 2024)If you have never tested your break-glass account, it only provides a false sense of security.

What actually works in real incidents

High-maturity tenants do a few things differently:

1. Two break-glass accounts (not one)

  • Different passwords
  • Different authentication paths
  • Different storage locations

Having only one break-glass account is as risky as having none at all. (Manage emergency access admin accounts - Microsoft Entra ID, 2024)

2. Absolute minimal policy surface

  • Excluded from all Conditional Access
  • No risk policies
  • No authentication strength enforcement
  • No device requirements

It might not look pretty.

But it is effective.

3. Permanent roles, no PIM

Break-glass accounts are not meant for everyday admin tasks.

Permanent Global Admin

No activation

No approvals

No dependencies

4. Offline password handling

Examples that work:

  • Sealed envelope in a physical safe
  • Split custody (two executives, two halves)
  • Offline password manager not tied to SSO

If Entra ID is down, you must still be able to read the password.

5. Scheduled testing (and alerts)

At least:

  • Quarterly sign-in test
  • Alert on any sign-in attempt
  • Alert on password change
  • Alert on role change (Microsoft Entra ID Security Baseline: Best Practices 2025, 2025)

A break-glass account should remain inactive until there is a real emergency.

The mindset shift

Break-glass accounts are not:

  • “Just another admin”
  • “Set it and forget it.”
  • “A compliance requirement”

They are incident response tooling.

And like any tool you rely on during a crisis:

  • You test it
  • You maintain it
  • You assume it will be needed at the worst possible moment

Because it will be.

Final thought

Most identity outages aren’t caused by attackers.

They’re caused by well-intentioned admins locking themselves out. (Widespread Microsoft Entra Lockouts Disrupt Organizations Globally – April 2025, 2025)When that happens, your break-glass account is the difference between:

  • a 10-minute recovery
  • and a multi-hour business-impacting outage

Test your break-glass account now, so you don’t discover problems when it’s too late.


Written by Jaspreet Singh — Microsoft identity & security practitioner. Author at ITBlogs.ca. Lab notes and testing at f11.ca.


References

Gentles, J., Fields, M., Goodman, G. & Bhunia, S. (2025). Breaking the Vault: A Case Study of the 2022 LastPass Data Breach. arXiv preprint. https://doi.org/10.48550/arXiv.2502.04287

(2024). Security operations for privileged accounts in Microsoft Entra ID. Microsoft Entra | Microsoft Learn. https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts

(2024). Security operations for privileged accounts in Microsoft Entra ID. Microsoft Entra | Microsoft Learn. https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts

(2024). Manage emergency access admin accounts - Microsoft Entra ID. Microsoft Learn. https://learn.microsoft.com/en-us/azure/active-directory/roles/security-emergency-access

(2025). Microsoft Entra ID Security Baseline: Best Practices 2025. LA NET Azure. https://lanet.co.uk/blog/microsoft-entra-id-security-baseline/

(April 19, 2025). Widespread Microsoft Entra Lockouts Disrupt Organizations Globally – April 2025. ZeroDaily. https://www.zerodaily.me/blog/2025-04-20-microsoft-entra-mace-lockout

The Hidden Risks of “All Users” in Conditional Access