Secure Your Environment by Managing User Consent to Applications in Azure AD (Entra ID)
Why Should You Do This?
Managing user consent to applications in Azure AD (Entra ID) is crucial to enhance security and protect your organization’s sensitive data. Unaware users may inadvertently approve malicious apps that request access to resources like OneDrive files or SharePoint sites, even offline. This can lead to data theft through phishing or compromised accounts, bypassing multifactor authentication (MFA) as certain protocols (e.g., SMTP, POP3, IMAP) are not covered post-authentication.
Default Settings and Risks
Default Azure AD settings allow users to approve third-party apps without administrator oversight, increasing the risk of data breaches. Users are often the weakest link in security, making stricter settings essential.
How to Configure User Consent
You need a user account with a Global Administrator role to manage these settings. The following options are available:
- Do Not Allow User or Group Owner Consent
- Blocks all users from approving apps.
- Steps:
- Log in to the Azure portal.
- Go to Azure Active Directory > Enterprise Applications > Consent and Permissions > User Consent Settings.
- Select "Do not allow user consent" and save.
- Allow Consent Only for Apps from Verified Publishers
- Restricts user consent to apps from Microsoft-certified publishers.
- Steps:
- Go to Azure Active Directory > Enterprise Applications > Consent and Permissions > User Consent Settings.
- Select "Allow users consent for apps from verified publishers" and save.
- Go to Azure Active Directory > Enterprise Applications > Consent and Permissions > User Consent Settings.
- Enable Admin Consent Workflow
- Allows users to request admin approval for apps they cannot consent to themselves.
- Steps:
- Go to Azure Active Directory > Enterprise Applications > User Settings.
- Set "User can request admin consent to apps they are unable to consent to" to "YES" and save.
Conclusion
By implementing these settings, you reduce your attack surface and safeguard your organization’s data from unauthorized access. Choose the method that best aligns with your security needs.
Kommentarer
Skicka en kommentar