Hi Patrice Côté ,
Yes, Conditional Access policies are evaluated after the users enter their credentials. This is because the Conditional Access policy needs to identify who the user is in order to apply the policy. So the user needs to authenticate and the conditional access policy will either block or allow the user based on whether the user has met the conditions. Reference: Conditional Access Overview.
Conditional access prompts for additional verification after the initial first-factor authentication and then provides or blocks access accordingly.
However, one option as an additional layer of protection would be to use Identity Protection risk policies to block the users by identifying risky behavior. For example, you can Enable user risk policy for password change to require users to update their passwords before signing in. The risk is assessed based on whether their usernames and passwords match pairs that have been identified as compromised.
If you are concerned about DDoS attacks, Azure DDoS Protection is an additional layer of protection that can be applied. [https://learn.microsoft.com/en-us/azure/ddos-protection/ddos-protection-overview
Let me know if this helps meet any of your requirements. You can also leave feedback directly for the product team in the Ideas forum. I'm happy to reach out on your behalf as well if you would like to share more details about your business case.
Updating the answer:
Smart lockout would probably provide the closest solution to what you are looking for, since it applies to primary authentication attempts. Conditional Access and Identity Protection only apply after the primary authentication is successful [https://learn.microsoft.com/en-us/azure/active-directory-b2c/threat-management
-
If the information helped address your question, please Accept the answer. This will help us as well as others in the community who might be researching similar concerns.